It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
Your screen freezes and a dialogue box pops up to tell you that your computer is locked and your files will all be gone forever if you don’t pay up. Since many victims are willing to pay the ransom, this type of cryptomalware is on the rise, netting millions of dollars for cybercriminals looking for a substantial return on their minimal investment.
During this session, you will hear from Kaspersky Lab on what they as a security vendor are seeing in this growing area of focus for both security vendors and cybercriminals. Areas of focus will include:
In order to protect your computer environment from the broad range of attacks in today’s electronic world, it’s imperative to implement multiple security layers to effectively secure your infrastructure. In this presentation, we will discuss the shortcomings and vulnerabilities of a single layer solution. In addition we will show you how investing in a multilayer approach that recognizes the strengths and limitations of each type of security product provides superior protection of your data.
This session will provide information about current and upcoming wireless standards; including tips on proper radio configuration, channel selection, and power settings. Lastly, best practices will be demonstrated concerning deployment for high user/device concentration as well as wireless troubleshooting techniques.
Join our panel of Local IT experts as they discuss new methods in IT Security and what the future holds…
Panel Moderated by: Kym Patterson • Information & Cyber Security Officer, Centennial Bank
David Mccoy • IT Security Manager, Acxiom
Melissa Bridges • Network Security Manager, City of Little Rock
Chris Wilkins • Director , IT Security, Arkansas Children’s Hospital
InfraGard has a total of over 85 InfraGard chapters, with more than 35,000 members working with the FBI through their field offices to ward off attacks against critical infrastructure that can come in the form of computer intrusions, physical security breaches, or other methods. InfraGard members represent state, local, and tribal law enforcement, academia, other government agencies, communities, and private industry.
We have always lived in a data-driven world. Recently our capacity to produce and consume data has begun to grow at a staggering rate. In the same way that good data enriches our world and our lives, bad data has the potential to destroy lives. We’ll look at some stories of how bad data comes in to being through simple activities, like trying to make better barbecue, we’ll examine some of the consequences, and we’ll attempt to answer the question, is there life after death?
BIO: An authority on assuring the reliability and security of information systems, Don Faulkner has analyzed, architected, and tested some of America’s largest commercial and government information systems. He has over 20 years experience stress-testing mission critical software, from nuclear power station modeling to commercial middle-ware products.
As Chief Information Security Officer at the University of Arkansas, Don is challenged daily to find elegant solutions to interesting problems ranging from identity and access management to cloud security to policy development. Previously, he was a professional security consultant with many clients in the Fortune 500 and the public sector.
A proponent of open systems, he’s interested in emerging technologies dealing with how information flows between people and computers, how it works for us, and how individuals stay in control.
Mr. Faulkner holds a B.S. in Computer Engineering along with multiple certifications, and is active in a number of information security communities.
If there is one constant in the security space, it’s that threats will continue to grow and evolve. It can often be a struggle to keep up and not one security control can solve all of your problems. In this presentation, we will talk about several trends in the security space and what can be done about it. There are a range of security solutions that can help meet multi-layered malware and ransomware protection needs. Is your company looking to unify their security and systems management and/or adding third-party patching? Maybe they are looking to adopt a more simple, but also granular access control or provide robust security management. Either or, securing a digital workplace can help without disrupting productivity and business operations, while creating more work for IT.
Most organizations have a collection of backup and disaster recovery (BDR) solutions that they have accumulated over time. Corporate backups, department level backups, even unprotected servers will complicate your disaster recovery process. Recovering from a failure or a cyber-attack could take hours or days, causing unplanned downtime and lost revenue.
Discover how next-generation vulnerability management can help you see and understand assets and threats that have never been visible before. Assets and vulnerabilities can appear and disappear within seconds. Discover how to see unknown and shadow assets and eliminate vulnerability blind spots. Also, learn how to gain critical context on a deeper, real-time prioritized scope, while understanding which corrective actions to take first and why they’re important.
The shift to cloud is on. The challenge of this is to adopt the right mix of cloud models for your organization. Public cloud is setting the pace with agility and scale … and that has inspired a few myths (that we’ll de-bunk). But, can private cloud and the IT department keep pace? We’ll make the case for a building block architecture, while introducing public cloud-like web services in your data center. We will also share the stories of organizations that have deployed this type of enterprise cloud to guarantee performance, enable self-service, quiet shadow IT and manage a massive footprint with a fraction of the effort.
Veteran IT security practice manager Alan Brians shares from his own Team’s experiences. Real stories on IT security nightmares are both entertaining and educational. Practical guidance from leading security Vendors on newer threat-prevention technologies helps IT professionals with the growing challenge of keeping their own networks secure.
Of the 5,000 customers that route all of their Internet traffic through Zscaler, over 700 are using Office 365, amounting to over 1.2 petabytes (!) of Office 365 traffic alone each month — and growing daily. With this much experience, we would like to share what it takes to make the network, the business, and careers truly shine as cloud platforms such as this become the new normal. In the process, we will cover the objectives, metrics, and value that leading organizations require. We’ll even show you how to succeed without the need for a costly proof-of-concept (PoC)!
The adoption of a digital business model is requiring networks to evolve rapidly, requiring applications, data and services to flow faster across an increasingly diverse landscape of users, domains, and devices. The Fortinet Security Fabric provides a new, intelligent architectural approach to security that, for the first time, enables enterprises to weave together all of their discrete security solutions into an integrated whole.
Today, the Enterprise perimeter has been stretched so far that it’s no longer recognizable. From the mobile workforce, to the data center, public and private clouds and the Internet of things – the attack surface has increased dramatically, making the extended enterprise more difficult to define and secure. The Fortinet Enterprise Firewall Solution enables immediate, responsive, and intelligent defense against malware and emerging threats with a security fabric that extends across the border-less network.
IT Security is in the forefront of the minds of school administrators. Data breaches, website defacement, viruses, malware, compliance and even DDos attacks impact education organizations across the higher education learning environment. Fortinet E-Rate Eligible solutions for education networks include Caching, NGF, Wireless Networking, Network Switches. DDos Protection, Web Application Firewall, Email Security, Application Delivery, Two Factor Authentication should be considered for these special networks as well.
Running a small business today is challenging enough without the ever-changing technology requirements due to mobility, BYOD, cloud adoption, and the increasingly sophisticated threat landscape. With Unified Threat Management solutions, you can simplify your network infrastructure, while delivering top-rated protection.
How can today’s retailers protect themselves cost effectively without endangering their competitive posture? What are the advantanges and disadvantages of centralized architeture vs distributed enterprise architecture? What is needed for today’s complex in-store security? Sandbox and secure access are key in today’s retail security play.
|Al Videtto||Director, Technology & Engineering||City of Lincoln|
|Amber Styles-Emberson||President||Arkansas InfraGard|
|Barry Centers||Senior SharePoint Analyst||Winrock International|
|Brody Walker||Vice President, Information Technology Manager||First Security Bank|
|Chase Conyer||Manager, Information Systems||Arkansas Science & Tech Authority|
|Chris Glewen||Information Systems Coordinator||Arkansas Community Corrections|
|Chris Moss||Information Security Officer||Arkansas Tech University|
|Chris Wilkins||Director, Information Technology Security||Arkansas Children’s Hospital|
|Cindy Chambers||Network Security Manager||State Of Arkansas|
|David Glover||Chief Information Officer||Pulaski Technical College|
|David Mccoy||Information Technology Security Manager||Acxiom|
|David Nicpan||Director, Information Technology||Pulaski County Assessors Office|
|Don Faulkner||Chief Information Security Officer||University of Arkansas|
|Dustin Brock||Information Systems Coordinator||Arkansas State Library|
|Greg Starnes||Network Coordinator||Families, Inc|
|Ivana Cojbasic||Vice President of Information Technology||FIS Global|
|James Honeycutt||Systems Administrator||National Guard Professional Ed. Center|
|Jim Seaman||Manager, Information Technology||Arkansas State University|
|John Gibson||Manager, Information Technology Operations||Dillards|
|John Rathje||Chief Information Officer||University of Arkansas-Little Rock|
|Joseph Friend||Manager, Information Technology||Arkansas Economic Development Commission|
|Ken Wester||Director, Office of Information Systems||Arkansas Tech University|
|Larry Casey||Director, Information Technology||Winrock International|
|Letty Hardee||Computer Services Chief||Ar Dept of Environmental Quality|
|Marcus Pierce||Manager, Information Assurance||Arkansas National Guard|
|Mark Richmond||Systems Administrator||US Bankruptcy Court|
|Melissa Bridges||Network Security Manager||City of Little Rock|
|Mike Thompson||Director, Information Technology||FutureFuel Company|
|Nan Harrell||Manager, Information Systems & Security||Arkansas Office of Health Technology|
|Randy Foshee||Director, Information Technology||City of Little Rock|
|Rick Martin||Network Architect||State Of Arkansas|
|Tammalah Matlock||Manager, Plans & Resource||189 AW Communications Flight|
|Wade Graham||Manager, Information Technology||Faulkner County Sheriff Dept.|
|Walter McCloud||Network Administrator||Air National Guard|
|Warren Navarre||Manager, Information Technology||Sanders Supply|
|Whitney Bell||Director, Security and Privacy||Verizon|
|Will Reid||Chief Technology Officer||Pulaski County Special School Dist.|
Statehouse Convention Center
101 E Markham St
Little Rock, AR 72201
A beautiful, spacious facility physically attached to the Little Rock Marriott, the Statehouse Convention Center offers large exhibition halls and versatile meeting rooms.
Just a short drive from the Little Rock National Airport with convenient interstate access, our downtown convention centers offer the perfect location for meetings and events of all sizes. An easy-to-navigate downtown area and ample convention center parking decks provide delegates with stress-free access to our two outstanding facilities.
For our guests’ convenience, the Little Rock Convention and Visitors Bureau operate three parking decks and one additional surface parking lot in close proximity to our convention centers:
In addition, several hundred on-street parking spaces are available within a few blocks of Statehouse Plaza.