It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch this much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to threats that are already inside the network before they turn into a full-blown crisis.
Self-learning systems, which represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life’. They can spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat. Discover why autonomous response and machine learning are the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
When it comes to cybersecurity, the threat landscape is changing every day. From ransomware attacks to the security of the Internet of Things, there’s a lot to take in. Let our experts break it down for you. Join Kaspersky to learn about trends from the past year and predictions for the future of cybersecurity. This talk will give you a sharper focus on how to protect your business and how to plan for your future IT security needs.
This session will discuss the current state of platform security, and explore alternative approaches proposed by leading members of the security industry. It will include discussions around Cloud, CASB, Google’s BeyondCorp framework, and others. The intent is to bring to light why so many industry leaders are calling for a new approach to security, and define what is needed in this new model.
How does your organization find harmony in security, governance, risk and compliance? Does your organization know what regulations they must follow? How is compliance managed, check the box or a risk-based approach? Why is using a common control framework beneficial? Many organizations worldwide are heavily regulated and often forced to choose security best-practice or meeting compliance. Some implement control frameworks and processes to identify changes to regulations and review them for impacts to the operation. Come join an open roundtable discussion with members of the 2017 Interface Advisory Council as we discuss the juggling act companies are facing and options to managing it effectively.
The OneIT initiative was launched this past March within the University of Nebraska. The goals are to keep service levels high, improve our security, and to significantly reduce operating costs. The strategies to accomplish these goals will be discussed along with an update on progress to date.
Technology has reached the point where it can support just about anything that anyone wants to do, but the toughest challenge for IT leaders of an organization is convincing other stakeholders to embrace change. The State of Nebraska is reinventing its culture with a brand new IT infrastructure model. A little over a year ago, State CIO Ed Toner launched a statewide “hybrid” IT model that many said could never be done. He’s proving them wrong. The transformation is proceeding at a record pace and with remarkably tremendous support. Lessons he took from his career in the private sector can be applied to Nebraska’s successes. In this session, Ed shares his personal insights into how and why leadership is the key for each of us to successfully transform the enterprise.
Ed Toner was appointed by Governor Pete Ricketts as Chief Information Officer for the State of Nebraska on June 9th, 2015. He has spent the last 20+ years in the Information Technology field, and has held IT leadership positions at both First Data and TD Ameritrade in Omaha, NE. A Nebraska transplant (native of Texas), Ed has significant international experience, having managed IT teams in both the UK and Argentina. His background also includes Industrial Engineering positions in Manufacturing prior to moving into the Information Technology field.
Since taking over as Nebraska’s chief information officer, Ed Toner has consolidated key information technology systems, resources and services which has positioned the state to provide quality support at lower costs earning him the StateScoop 2016 National “Up and Comer Award” and the 2017 “State Executive of the Year.” Ed earned his Bachelor of Science degree from the Dwight Look College of Engineering at Texas A&M University.
Flash memory is revolutionizing data storage, bringing an unprecedented level of performance that legacy storage systems simply can’t match. Learn how to simplify your data management process through deep integration and get the power of array-based snapshots, replication and cloning without being storage experts.
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true Disaster Recovery for the business. What types of disasters will impact the business? Learn about Disaster Recovery scenarios, and also the questions to ask and answer when planning your Disaster Recovery solution to drive true IT resilience. Learn which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Geographically distributed enterprises are embracing SD-WAN at an accelerating pace. As applications continue to move to the cloud, networking professionals are quickly realizing that traditional WANs were never architected for a dynamic, internet-based environment and recognize that backhauling traffic from the branch to headquarters doesn’t make sense. Furthermore, end users often find their business apps run faster over their home Internet service, or even on their mobile device.
This presentation will discuss the boundaries of responsibility governed by user agreements, privacy regulations and technical controls. We will cover the needs of the modern enterprise moving data from the traditional server architecture into the current distributed structures of the Cloud, mobile devices, and virtualized infrastructure.
Cyber Threats are only increasing. Attackers are shifting their tactics as we shift our security strategies. Join us for a discussion about the ever changing threat landscape and how you can more effectively protect your company from these threats. In this session we will talk about how cyber threats increased in 2016, where attackers are shifting to, and what industry experts are recommending to address these shifts.
|Aaron Grothe||Board Member||NEbraskaCERT|
|Amber Roberts||Sr. IT Support Analyst||Gavilon Group, LLC|
|Bawn Froning||CIO||Southern Carlson|
|Beverly LaNoue||Director, Information Security||Kiewit|
|Eric Matulka||Vice President, Information Technology||DEI Communities|
|Fred Hackett||Manager, IT Infrastructure||Stillwater Insurance Group|
|Gary Lovely||Director, IT||Bailey Lauerman|
|Jay Garren||Board Member||Omaha CIO Forum|
|Jay Gnuse||Director, Information Technology||Chief Industries|
|Jeffrey Cochran||Information Security Manager||Nebraska Book Company, Inc.|
|Jody Brott||Director, Information Technology||CDM Service Group|
|Krista Freimuth||IT Capacity Manager||CSG International|
|LaVelle Henderson||IT Support Specialist||Boys & Girls Club of the Midlands|
|Lisa McKee||IT Internal Audit Manager||ACI|
|Mark Doyle||Sr VP & CIO||Metropolitan Utilities District|
|Matt Morton||CISO & Assistant CIO||University of Nebraska at Omaha|
|Michael Perdunn||Project Manager||University of Nebraska, Omaha|
|Robert LaMagna-Reiter||Sr. Director, Information Technology||First National Technology Solutions|
|Ronald Woerner||Information Security Professor||Bellevue University|
|Ross Koster||Director, Server Engineering||Sitel|
|Scott Morin||Director, Information Technology||Midland Computer|
|Sean McCary||Board||Omaha CIO Forum|
|Stacey Cottone||Clinical Informatics & IT||Midwest Surgical Hospital|
|Steve Heller||Board President||AITP Omaha Chapter|
|Tom Rolfes||Administrative Services Manager||Nebraska Information Technology Commission|
|Trista Renstrom||Service Desk Specialists||Woodmen of the World|
|Ed Toner||CIO||State of Nebraska|
|Jeremy Witmer||Special Agent||FBI, Omaha Division|
455 N 10th St
Omaha, NE 68102
Surface parking is $8. Garage parking (when available) is $12. Cash payment and the following credit cards are now accepted: Visa, MasterCard, Discover, and American Express.
In/Out Parking is not allowed
Parking is on a first-come, first-served basis in designated parking lots. Holding or saving parking spaces is not permitted. Drive lanes in parking lots must be kept clear at all times. Overnight parking is not allowed in any MECA controlled parking lots. ADA parking is available in MECA controlled parking lots.
Distribution of promotional items or other forms of solicitation are not permitted. Personal golf carts, Segways and skateboards are not allowed in MECA controlled parking lots. MECA controlled parking lots will open 2-3 hours prior to the start of an event. MECA controlled parking lots will close 90 minutes after the event. MECA reserves the right to revoke daily or season parking passes of those who do not comply with any parking guidelines. All vehicles are parked at the owner’s complete risk.
For more information visit: CenturyLink Center Map and Directions page