It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
When it comes to cybersecurity, the threat landscape is changing every day. From ransomware attacks to the security of the Internet of Things, there’s a lot to take in. Let our experts break it down for you. Join Kaspersky to learn about trends from the past year and predictions for the future of cybersecurity. This talk will give you a sharper focus on how to protect your business and how to plan for your future IT security needs.
Cyber-attacks once were mainly the concern of governments, large corporations and other highly visible networks. Not anymore. The financial rewards generated from the theft of credit card information and other sensitive data gave rise to a new breed of malware, the polymorphic threat, and with it, the amount of malware has skyrocketed.
Most of today’s malware is polymorphic and highly adept at changing its identity to evade standard, signature-based security platforms. Alone, these platforms will not recognize many of these threats. Advanced persistent threats, or APTs, increase the threat level by employing sophisticated evasion capabilities to get payloads past a network’s defenses where they persist, undetected. APTs are targeted to an organization or a specific technology and often leverage zero day vulnerabilities – flaws for which no patch is available and no signature has been written. Any organization can become a victim.
The world of Identity Management is dangerously fragmented and needlessly complex. Don’t settle for half a solution when you need full protection for both end users and privileged users.
Centrify secures enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.
In this session, we will discuss a platform approach to securing enterprise identities and:
To pay or not pay: The future of Ransomware. What’s working, What’s not, and what’s next?
Panel Moderated by Brian White • Sr. VP, Information Services, Hiway Federal Credit Union
Christopher Miller • GRC, Program Manager/Architect, HealthEast
John Jeries • CIO, St. Catherine’s University
Charles Kilmer • Security Officer, NetGain Technology, Inc.
Many organizations have environments that include human, network, mobile, endpoint, virtualized and cloud resources, and assets. Understanding what the Kill Chain is and leveraging services, resources, and technologies to account attacker methods and activities can lead to breaking the Kill Chain.
You’ve read the headlines. Unfortunately, the question now is not if your information is going to be accessed or stolen, but when. Perhaps surprisingly, IT professionals are not immune to these attacks. In an effort to inform the attendees of current developments in the digital underground as well as provide realistic advice for cyber protection, Mark Lanterman will be discussing recent high profile cyber-crime events, including Web Site breaches impacting retailers, banks and government agencies. Mark will also discuss particularly dangerous types of threats that might effect individuals such as the Dark Web, the Internet of Things, phishing, and wifi attacks.
Mark Lanterman is the Chief Technology Officer of Computer Forensic Services. Before entering the private sector, Mark was a member of the U. S. Secret Service Electronic Crimes Taskforce. Mark has 28 years of security and forensic experience and has testified in over 2000 cases. He is an adjunct instructor at the University of Minnesota, Mitchell Hamline Law School and the National Judicial College in Reno, Nevada.
Mark provides regular commentary on cyber security issues for national print and broadcast media, including NBC, ABC, Bloomberg, and The Wall Street Journal.
It’s 2016, but organizations still struggle to deliver consistent and predictable performance for their cloud and virtualized applications. Even with advances in flash technology, storage remains designed for physical, not virtual, workloads, and it shows with unpredictable performance, difficult troubleshooting and fragile scalability. Storage needs to be aligned to virtualization, but what is VM-Aware Storage besides a buzzword? We will investigate the five requirements of VM-Aware Storage, and which technologies enable those requirements.
No one thinks they need disaster recovery until they do. The fact is that most “disasters” and datacenter outages are not caused my hurricanes or severe weather. Random power outages, human errors and many other non-weather factors are the typical causes of service interruptions. Join us to see the results of a survey of IT professionals just like you and learn:
We will cover two use cases which outline gaps in their DR strategy and how you are able to overcome these gaps. Join us to learn more!
In today’s world of security breaches that cost companies millions, understanding how incidents can occur gives insight into protecting the network and managing risk. With the number of incidents on the rise, it’s no longer an option to simply be content with mitigating a breach after the fact, you must also detect any breaches of security before they can cause damage and prevent further intrusions.
The Engineers at Fortinet will walk you through the life cycle of advanced threats, pointing out their common methods of avoiding detection. Additionally, you’ll be shown how a proper security framework gives you multiple options to detect and mitigate an attack before it has the opportunity to inflict damage; costing you time, money, and public confidence.
Even with a focus on business outcomes, many technology decisions are still made short-sided without ensuring the purchase is future-proof and modular enough to meet future needs. Cloud-based security has inherent flexibility that can meet security objectives while also enabling IT and business strategy.
Innovation Matters. Without innovation, IT is stuck in the 80/20 rule. IT can’t keep up with data demands, data protection and data mobility. Innovation is important to IT as we try to help reduce costs and manage data.
|Ash Dhandhusaria||Infrastructure Manager||TAJ Technologies|
|Ashish Vashishtha||Manager, Information Risk Management||Optum|
|Beth Jacobsen||Chapter President||HDI Minnesota|
|Betty Smothers||Systems Analysis Unit Supervisor||MNIT Services|
|Bill Flatley||Information Technology Manager, Clinical Applications||Children’s Minnesota|
|Bill Harding||Manager, Infrastructure||Red Wing Shoes, Inc|
|Brian Steingraber||Information Technology Director||Kidney Specialists of Minnesota|
|Brian Wallisch||Partner||Manage Infinity|
|Brian White||Senior Vice President, Information Services||Hiway Federal Credit Union|
|Brian Withrow||Security Manager, Information Tech.||Voya Financial|
|Carl Skildum||Manager, Information Systems||Tactile Systems Technology|
|Carol Ford||Vice President, Information Technologyemail@example.com|
|Charles Killmer||Security Officer||Netgain Technology|
|Chris Herbst||Information Technology Manager||Metal-Matic|
|Chris Miller||Program Manager/Architect||HealthEast|
|Chris Waterbury||Director, Information Technology||MacPhail Center for Music|
|Chris White||Information System Security Officer||GovDelivery|
|Dan Bick||Chief Information Security Officer||Minnesota Department of Corrections|
|David Bruess||Director, Information Technology||Saint Therese|
|Derek McGowan||Information Technology Security Specialist||Voya Financial|
|Derek Montplaisir||Director, Information Technology||First National Bank of Elk River|
|Donald Aslett||Chief Executive Officer||The Marlin Guild, Inc|
|Frank Dailey||Information Security Officer||Wells Fargo Bank|
|Gene Schaff||Director, Information Technology||Tiller Corporation|
|Glenn Marshall||Manager, Policy Management||US Bank|
|Howard Uhr||Business Information Security Officer||Experian|
|James Kauth||Information Systems Director||Minnesota Dept of Enterprise Technology|
|Jason McCrory||Information Technology Manager||Unified Screening|
|Jim Fyksen||Manager, Technical Services||YMCA of the Greater Twin Cities|
|John Crouch||Director, Information Technology||ME Global Inc.|
|John Jeries||Chief Information Officer||St Catherine University|
|Jon Hallberg||AVP, Director of Network Operations||US Federal Credit Union|
|Kevin Lemke||Vice President of Information Technology||Logistics Intternational, LLC|
|Kim Evers||Information Technology Manager||Meyer Borgman Johnson|
|Laly Larson||Senior Vice President, Chief Information Officer||Lake State Credit Union|
|Mark Mclain||Global Network Director||Stratasys|
|Marlene Trageser||Chief Information Officer||First Farmers & Merchants Bank|
|Paul Gerlach||Global Security Operations Manager||US Bank|
|Paul Meekin||Chief Information Officer||MN Dept of IT Services|
|Paul Skavnak||Manager, Infrastructure Operations||Edmentum|
|Phil Mccullough||Director, Information Technology||The American Registry of Radiologic Technologists|
|Rich Hintz||Vice President, Information Technology||Daktronics|
|Robyne Rohde||Information Technology Director||Best Buy|
|Ryan Dunton||Director, Information Technology||Crew2|
|Shane Lindstrom||Chief Manager||Digital Winter, LLC|
|Sheri Elston||Information Technology Services Supervisor||MNIT Services|
|Stan Bush||Chief Information Officer||VA Midwest Healthcare Network|
|Steven Johnson||Manager of Information Technology||Aeroism Technologies|
|TR Piller||Information Security Officer||Arkray USA|
|Valerie Bock||Information Security Officer||Wells Fargo Bank|
|Valerie Mooney||Vice President, Information Technology Risk Management||US Bank|
From the West (I-94)
Take the 4th Street exit from I-94 and proceed to 2nd Avenue South. (Do NOT turn right onto 2nd Avenue North.) Turn right on 2nd Avenue South and go 8 blocks to Convention Center.
From the West (I-394)
Take Downtown exit (12th Street): follow 12th Street South to 2nd Avenue South and turn right. The Convention Center is on your left.
From the East (I-94)
Take the 11th Street exit: follow 11th Street South until you reach 2nd Avenue South, turn left onto 2nd Avenue South and cross 12th Street South. The Convention Center is on your left. The Underground Plaza Parking Ramp is on your right.
From the South (I-35W)
Follow downtown exit signs to the 11th Street exit and follow 11th Street to 2nd Avenue South. Turn left on 2nd Avenue South and go 1 block to Convention Center.
From the North (I-35W)
Take I-35W to Hwy 280. Follow Hwy 280 to I-94 west. Follow I-94 to the 11th Street exit (NOT 11th Avenue exit). Follow 11th Street to 2nd Avenue South. Turn left on 2nd Avenue South and go 1 block to the Convention Center.
From the Airport Main Terminal
Take Hwy. 55 exit from the airport. Follow Hwy. 55 west to Minneapolis. This will become Hwy. 62 west. Follow Hwy. 62 to I-35W north to Minneapolis downtown exits. Then take the 11th Street exit. Follow 11th Street South to 2nd Avenue South. Turn left on 2nd Avenue South and go 1 block to the Convention Center.
Entrances/Exits to Underground Plaza Parking Ramp
Enter either on 2nd Avenue South, or on 12th Street South. The Plaza Ramp has handicap parking – elevators and a skyway connect the Ramp to the Convention Center, allowing easy access for wheelchairs.