It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
Cybercrime is big business. By many estimates, cybercrime is now a $1 trillion dollar industry. Every higher education institution is vulnerable to attack and the growing sophistication of cyber criminals and their evolving tactics only increases the chance of a security breach involving the theft of sensitive data.
A Security Transformation is happening in Higher Education IT – an evolutionary shift in the security framework that’s turning the tide in the battle between institutions and those who seek to use technology to harm them. This presentation will explore how UW-Madison is working to provide advanced threat protections to ensure valuable data stays in the right place.
Bob Turner is the Chief Information Security Officer at the University of Wisconsin-Madison where he leads the development and delivery of a comprehensive information security and privacy program by collaboratively implementing information security controls to protect UW-Madison information and its infrastructure from external or internal threats, and to assure that UW-Madison complies with statutory and regulatory requirements regarding information access, security and privacy. Prior to joining the UW-Madison, Bob was Senior Associate with the strategy and technology consulting firm of Booz Allen Hamilton where he focused on cybersecurity policy and compliance with assessment and approval of information systems along with cyber security inspection as principal strengths. Before Booz Allen Hamilton, Bob had a 23 year Navy career in telecommunications and information systems management.
Having a successful technology project requires a lot of communication, risk analysis with proper mitigation plans and the cme’s to make all the gears go in the right place and turn in synchronization. But that’s not all. There is a hidden project in every implementation called implementing operational mode which is making sure the project that was so hard to get implemented keeps working, and metrics are in place to let sponsors and managers know things are healthy along with triggers in place to proactively keep things healthy.
Moderated by: Jim Padley • Director of Information Technology, Stoughton Trailers
The enterprise has changed. More applications are “critical” to operations, more people need access to information, and they need it anytime and everywhere. Join us for an informative session to learn why virtualization is critical to the “Always on Enterprise”, as well as simplifying multiple hypervisors in a virtual environment for backup, recovery and management. We will also touch upon how availability is about more than just backups and disk backup needs to be production-ready.
User and Entity Behavior Analytics (UEBA) can be used to complement and extend an enterprise security program to detect and remediate against an active intrusion by highlighting anomalous account behavior. The ability to conduct UEBA in order to accurately detect suspicious activity has long been considered the holy grail of information security. Previous attempts have fallen short because of reliance on a single data type, such as logs and events programed to be generated by a device. This doesn’t allow for the context needed to accurately define normal and anomalous behavior.
This presentation will discuss various models and dive into the idea of a UDAPE™ model (User, Device, Application, Process, Endpoint) in order to build the context necessary to accurately establish baselines, detect true anomalies, and find potential bad actors in whatever form they take.
|BobTurner||Chief Information Security Officer||University of Wisconsin|
|Brian Sagedal||President Elect||PMI|
|Erik Lindwall||Director of Information Technology||C.D.Smith Construction|
|Gustavo Hinojosa||Outreach Coordinator||ISSA|
|Jay Walker||Information Technology Director||Net Technology (PMI)|
|Jeffrey Jones||Director, Information Technology||MetalTek International|
|Jennifer Jirochvong||Information Technology Applications Supervisor||Agnesian HealthCare|
|Jim Padley||Director, Information Technology||Stoughton Trailers, LLC.|
|Ken Shaurette||Director Information Technology Services||Fipco|
|Kurt Moore||Chapter Chair||ASIS|
|Mike Block||President||ISSA Milwaukee|
|Rod Gabriel||Co-Leader||Wisconsin VMUG|
|Roland Welsch||Manager, Information Technology||Jefferson County, WI|
|Scott Noles||Manager, Information Technology||J.H. Findorff & Som INC.|
|Tammy Goss||Vice President of Programs||ARMA|
|Yvonne Subak||Vice President of Membership||ARMA|
The Monona Terrace parking ramp has approximately 400 spaces for general event use during normal business hours Monday through Friday. An additional 200 spaces are available on evenings and weekends. For current rates, please consult with your Event Coordinator
Check Back Soon for Directions