It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
In today’s world of security breaches that cost companies millions, understanding how incidents can occur gives insight into protecting the network and managing risk. With the number of incidents on the rise, it’s no longer an option to simply be content with mitigating a breach after the fact, you must also detect any breaches of security before they can cause damage and prevent further intrusions.
The Engineers at Fortinet will walk you through the life cycle of advanced threats, pointing out their common methods of avoiding detection. Additionally, you’ll be shown how a proper security framework gives you multiple options to detect and mitigate an attack before it has the opportunity to inflict damage; costing you time, money, and public confidence.
When it comes to cybersecurity, the threat landscape is changing every day. From ransomware attacks to the security of the Internet of Things, there’s a lot to take in. Let our experts break it down for you. Join Kaspersky to learn about trends from the past year and predictions for the future of cybersecurity. This talk will give you a sharper focus on how to protect your business and how to plan for your future IT security needs.
Cyber-attacks were once mainly the concern of governments, large corporations and other highly visible networks. Not anymore. The financial rewards generated from the theft of credit card information and other sensitive data gave rise to a new breed of malware, the polymorphic threat, and with it, the amount of malware has skyrocketed.
Most of today’s malware is polymorphic and highly adept at changing its identity to evade standard, signature-based security platforms. Alone, these platforms will not recognize many of these threats. Advanced persistent threats, or APTs, increase the threat level by employing sophisticated evasion capabilities to get payloads past a network’s defenses where they persist, undetected. APTs are targeted to an organization or a specific technology and often leverage zero day vulnerabilities – flaws for which no patch is available and no signature has been written. Any organization can become a victim.
Women may represent half of the US workforce, but only hold a quarter of the tech jobs. At Women in Technology of Tennessee, we’re helping to educate and inspire women with the necessary skills that enable them to pursue technology careers. Join WiTT’s chapter Vice President, Rita Rediker, to talk about tomorrow’s Women in Technology.
Rita Rediker is the Vice President of Women in Technology of Tennessee (WiTT) and she is on the IBM Analytics Sales Team representing customers in Financial Services. She is a native Nashvillian ad loves living in Nashville. She has built many long-term business relationships in her successful career in Information Technology and enjoys serving in the non-profit technology community. As the upcoming President of Women in Technology of Tennessee, she is focused on making a positive difference in her community and providing opportunities for women of all ages through education, mentoring, networking and outreach.
Rita earned her Masters in Science in Telecommunications and Information Systems Management from Christian Brothers University. She also recently completed the Healthcare Information Technology Certificate from Belmont University and the highly acclaimed IBM Global Sales School Certification. Rita is passionate and dedicated to her client’s success by proposing innovation that matters to their business and to the world, through relationships that are built on trust and personal responsibility. She is excited to be part of the new Insight Economy and the Cognitive Era where Big Data is changing the way we think!
Come join a break-out session of security controls and migration experiences from legacy to cloud infrastructures with members of Nashville’s HCA IT&S. Topics will revolve around infrastructure challenges and security constraints, both relating to cloud adoption.
Joey Brakefield • Consulting Private Cloud Architect at HCA IT&S
Bill Moyer • Security Architect, IS Information Security at HCA IT&S
Shane Jones • Team Lead, Cloud Services Messaging at HCA IT&S
Joshua Surre • AVP, IS Svc Mgmt Delivery Admin at HCA IT&S
Bob Gilbert • VP of Product Marketing from Netskope at HCA IT&S
Join some of Nashville’s premier strategic IT & InfoSec leaders as they discuss regulatory compliance management.
Don Baham • President of InfraGard – Middle Tennessee
Frank Platt • Information Security Management Consultant at InfoSec Alliance
Tim Agee • Partner at FDH Consulting, LLC
Rob Preininger • Partner at Business Survival Partners, LLC
Anthony McFarland • Member, Bass, Berry & Sims
It’s a really bad day when Special Agents Scott Augenbaum and Victor Rodriguez of the Federal Bureau of Investigation’s Cyber Task Force show up at your organization and inform you that the crown jewels of your organization (money, intellectual property, PHI or PII) are gone forever. Scott and Victor have been working together for close to nine years, and they have seen threats morph and severely impact numerous organizations. In this talk, they will take the lessons they have learned from hundreds of data breaches and acts of Cyber Crime and provide you with what they have learned so you can best protect your organization’s infrastructure. They’ll offer a number of common technical, managerial and incident response mistakes that could have saved a number of organizations from becoming victimized. They have one goal, and that’s to keep you from having the answer the next door they knock on.
Innovation Matters. Without innovation IT is stuck in the 80/20 rule. IT can’t keep up with data demands, data protection and data mobility. Innovation is important to IT as we try to help reduce costs and manage data.
As cloud security concerns continue to rise with the increase in EFSS adoption, enterprises must employ overarching policies, such as intelligent key management, to protect their data and decrease their overall risk of security breaches. This presentation will look at three EFSS adoption workplace security scenarios facing IT Professionals today and how best to mitigate them.
In the last few years, ransomware has taken the cybercrime world by storm. CryptoWall 3.0, one of the most lucrative and broad-reaching ransomware campaigns, was alone responsible for 406,887 infection attempts and accounted for about $325 million in damages in 2015. And, according to the Institute for Critical Infrastructure Technology, ransomware promises to wreak more havoc in 2016. While individual users were once the preferred target of ransomware, perpetrators have increasingly set their sights on businesses and organizations. And you can bet that with larger targets, the ransom demands will increase accordingly.
Are you prepared for such an attack? Learn how ransomware can impact your business and why legacy security solutions don’t stand a chance against such threats.
Ransomware is a growing threat to business operations and reputation. In this presentation, Matt Burns will address how business continuity and disaster recovery technologies can help to provide protection against such attacks.
Every day seems to bring with it news of another ransomware attack or a new strain of the malware. It seems likely too, that there are a lot more incidents than we read about. There have been incidents where companies paid up rather than openly declared they had been targeted and that their data had been at risk. The simple fact is that ransomware attacks are working. Data is one of the most important assets an organization has and the price of paying the ransom is often lower than losing the company’s data, reputation and possibly the entire business. With strains evolving in sophistication and now reportedly capable of encrypting an entire network, no company is safe sticking to the narrow view of ‘keep the virus out’.
|Aaron Butorac||Director, Applications Development||Permanent General Companies, Inc.|
|Adam Nunn||Vice President, Information Security Officer||RegionalCare Hospital Partners|
|Alex Curtis||Board Member||Nashville Technology Council|
|Blake Lasson||Senior Manager EDSC Data Center||Deloitte LP|
|Bradley Lide||Director of Business Enablement||SertintyONE|
|Bryan Huddleston||Board Member||Nashville Technology Council|
|Chip Parsons||Manager IBM Systems Infrastructure||Ingram Book Company|
|Cindi Parmenter||Vice President of Operations||Nashville Technology Council|
|D. Jerry Imsand||Director of Information Management||State of Tennessee – Dept. of Child Services|
|Don Baham||President||Kraft Technology Group, LLC|
|Jon Puncochar||Director, Surgical Services OSG||HCA IT&S|
|Jon Shaw||Director Data Services||Corrections Corporation of America|
|Julian Mitchell||Managing Director||GENCO|
|Keith Durbin||CIO/Director of IT||Metro Nashville and Davidson County|
|Kendrick Watts||Director Member Engagement||Nashville Technology Council|
|Lawrence Blank-Cook||Technology Director||Deloitte LP|
|Morvan Perez||Security Analyst||Deloitte LP|
|Nicole Tremblett||Vice President & Information Services Executive||HCA IT&S|
|Paul Connelly||VP, Privacy & Security||HCA IT&S|
|Ron Balcarras||Senior Manager 1||Deloitte Services LP|
|Sam Womble||Critical Infrastructure Engineer||Asurion|
|Shahzad Fakhar||VP IT&S of Infrastructure Services & Operations||HCA IT&S|
|Steve Hackney||Director BA Center of Excellence||HCA IT&S|
|Tommy York||Business Solutions Analyst||HCA IT&S BACoE|
|Vincent Walker||Director Network Services||State of Tennessee|
From the North on I-65—Take I-65 South toward Nashville. Keep left to continue on I-24 East. Follow signs for I-24/I-40 E/Chattanooga/Knoxville. Take exit 49 for Shelby Avenue. Turn left onto Shelby Avenue. Continue onto Korean Veterans Boulevard. Located on right at 600 Korean Veterans Boulevard. Turn right on 6th Avenue for entrances to the garage.
From the South on I-65—Take I-65 North toward Nashville. Take I-65 North to I-40 East merge, exit 82B towards Knoxville and KEEP RIGHT. Immediately take exit 210C, 4th/2nd Avenue. Stay straight, and in the middle lane. Turn left onto 2nd Avenue South. Continue on 2nd Avenue until Koreans Veterans Boulevard, and turn left. Located on right at 600 Korean Veterans Boulevard. Turn right on 6th Avenue for entrances to the garage.
Our garage is located on 6th Avenue and Demonbreun, directly across from the south entrance to Bridgestone Arena, and we are within easy walking distance to all downtown attractions. There are three entrances to the garage: one on 7th & Demonbreun and two on 6th Avenue between Demonbreun and Korean Veterans Boulevard. It is recommended that attendees park in P1 for easier access to the Davidson Ballroom.