It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
In today’s world of security breaches that cost companies millions, understanding how incidents can occur gives insight into protecting the network and managing risk. With the number of incidents on the rise, it’s no longer an option to simply be content with mitigating a breach after the fact, you must also detect any breaches of security before they can cause damage and prevent further intrusions.
The Engineers at Fortinet will walk you through the life cycle of advanced threats, pointing out their common methods of avoiding detection. Additionally, you’ll be shown how a proper security framework gives you multiple options to detect and mitigate an attack before it has the opportunity to inflict damage; costing you time, money, and public confidence.
When it comes to cybersecurity, the threat landscape is changing every day. From ransomware attacks to the security of the Internet of Things, there’s a lot to take in. Let our experts break it down for you. Join Kaspersky to learn about trends from the past year and predictions for the future of cybersecurity. This talk will give you a sharper focus on how to protect your business and how to plan for your future IT security needs.
What exactly is Ransomware? We’ll take a look at Ransomware, its historical presence and evolution into today’s most common threats, like CryptoLocker and CryptoWall. Most importantly, we will share best practices for Ransomware defense – how to prepare, prevent and respond.
Let’s face it, the evolution of technology has moved so quickly over the last few years that is nearly impossible to keep up. While you may be utilizing cloud solutions right now, you have questions. Join Symantec + Blue Coat and the Advisory Council for an interactive panel discussion that will cover data visibility, security, vendor management, and much more. You must always have control of your data and you will hear plenty of advice about the proper management of your cloud providers. Also, we will cover what you need to know about your providers and how this pertains to your operations.
Small Businesses all the way up to large Universities have the same needs when it comes to your IT infrastructure. IT is looked at to improve all business processes and keep information secure. This session will be an open discussion on the correct strategy to use your budget to produce maximum results in structure and operation.
Kevin McDonald, EVP and CISO • Alvaka Networks
Raj Karnik, Director of Technology • Teacher Created Materials
Let’s take your Wheaties and Cheerios off the table, and then remove your eggs & bacon. Following that, we’ll take your glass of water and your heat (no tea, coffee or gas fireplace…let alone central heating). Quite simply, if your capabilities to provide for yourself don’t extend beyond the keyboard, you should come to this talk with a bottle of BBQ sauce and a self-adhesive sticker. Be prepared to lather yourself in the sauce and scribe “eat me” on the label. Accept you are nothing more than a walking snack for the rest of us.
We started by focusing on extending research we’d done a few years ago on crop production…and ended up removing all the basic survival requirements for the civilized human race.
Yesterday’s normal doesn’t cut it in today’s environment, and what does work today will be of little service in the future, is what you will typically hear from Chris Roberts – One of the world’s foremost authorities on IT Security. His presentations are a mix of complex IT topics, combined with a dose of reality and topped off with dry wit and humor. Entertaining and engaging, you’ll be sure to walk away with a new way to look at IT and the world around you.
Usually when you hear someone talking about fast disaster recovery, they’re talking about fancy new technologies that give you a leg up on your recovery. Sure, virtualization, image-based backup, and cloud computing can all contribute to fast recoveries, but there’s something else you can do to make sure you have fast, reliable recoveries and it doesn’t cost you a dime. What is it? Creating solid documentation and using it to make a plan. In this presentation, we’ll show you how to actually do this, from start to finish.
As enterprises look beyond traditional IT workloads including cloud-native applications and DevOps, they should consider how technologies such as software-defined infrastructure and cloud can drive real-world benefits. Learn how IT can move away from traditional environments to hyperconverged infrastructure and onward to Enterprise Clouds to handle all their challenging applications and business needs with clear agility, productivity and availability/security benefits.
It’s 2016, but organizations still struggle to deliver consistent and predictable performance for their cloud and virtualized applications. Even with advances in flash technology, storage remains designed for physical, not virtual, workloads, and it shows with unpredictable performance, difficult troubleshooting and fragile scalability. Storage needs to be aligned to virtualization, but what is VM-Aware Storage besides a buzzword? We will investigate the five requirements of VM-Aware Storage, and which technologies enable those requirements.
Rethinking Your Threat Management Strategies Threats Have Evolved — Has Your Security Program? To kill threats quickly, you need to accelerate time to detection and time to response. This requires efficiency of operations and a well-enabled team.
Join LogRhythm Sales Engineer, Peter McNaull, as we discuss how a security strategy that is focused on detection is required in today’s threat environment. Peter will demonstrate how to use your own security intelligence to efficiently reduce your mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR).
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why unsupervised machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
Data center storage is on the verge of another significant shift in architecture. Flash storage is now mainstream as evident from the availability of many flash storage arrays and the increase in server based flash that is leveraged within platforms such as hyper converged infrastructures (HCI). The shift is causing changes in economics – the cost of storage, performance – the placement of storage, and manageability – the administration of storage. Virtualization is driving this change with private cloud results driving the momentum. This session will review trends and developments in the data center storage solutions and how Datrium is working within this evolving open convergence technology base.
Innovation Matters. Without innovation IT is stuck in the 80/20 rule. IT can’t keep up with data demands, data protection and data mobility. Innovation is important to IT as we try to help reduce costs and manage data.
Are you challenged by managing and protecting ever-increasing amounts of data and how to do so at less cost? Deploying an effective backup storage solution requires deduplication but how you implement it will have a major impact on virtually every area of backup performance. During this presentation, you’ll learn what to look for in a disk storage with data deduplication solution to ensure you make the right decision. Discover how to achieve the fastest backups for the shortest backup window, fastest restores, Instant VM recoveries in seconds to minutes, a fixed length backup window even as data grows, and fast, reliable offsite disaster recovery with ExaGrid’s high performance, scalable disk backup with deduplication solution.
The cost and consequences of downtime and lost data pose a significant challenge to ensuring business continuity and the availability of applications and data. Join us for a discussion on how to deliver Availability for the Always-On Enterprise through integration with your storage provider. This discussion will detail how an Availability Suite takes advantage of this integration and how your organization can leverage this to perform frequent crash-consistent and application-consistent storage snapshots. As well as replicate to a secondary array for lower a lower RPO, meet strict RTO’s by performing granular recoveries from snapshots on both primary and secondary arrays, and finally how backups from storage snapshots will significantly reduce the impact from data protection activities on production workloads.
The adoption of Software-as-a-Service and Cloud technologies is adding more pressure to Network Administrators who manage Wide Area Networks. More than ever before, end users expect to be connected at all times and have their applications load immediately. In this demanding environment, it’s important to quickly detect and troubleshoot network and application issues. A new breed of monitoring tools, based on active sensors, is deployed in today’s networks to simplify troubleshooting. In this session, we will review how Network Administrators can efficiently manage and support large and complex enterprise networks.
The world of Identity Management is dangerously fragmented and needlessly complex. Don’t settle for half a solution when you need full protection for both end users and privileged users. Secure enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. Protect against the leading point of attack used in data breaches compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.
In this session, we will discuss a platform approach to securing enterprise identities and:
No one thinks they need disaster recovery until they do. The fact is that most “disasters” and datacenter outages are not caused my hurricanes or severe weather. Random power outages, human errors and many other non-weather factors are the typical causes of service interruptions. Join us to see the results of a survey of IT professionals just like you and learn:
We will cover two use cases which outline gaps in their DR strategy and how you are able to overcome these gaps. Join us to learn more!
|Albert Gonzalez||Manager of Network Engineering||UC Irvine|
|Alex Solares||International Information Technology Manager||PSAV|
|Anh Tran||Manager, Information Technology||City of El Monte|
|Asaf Rapoport||Director IT Network & Support Services||U.S. TelePacific Corp.|
|Bala Palanisamy||Chief Technology Officer||Fine Hospitality Group|
|Becky Christy||AVP, Business Continuity Analyst||Banc of California|
|Bill Neavel||Director, Information Technology||TD Service Financial Corp.|
|Blair Baker||Chief Information Officer||1903 solutions|
|Brandon Lashmet||Manager, Information Technology||The Retail Equation|
|Brent Marcus||Director, Information Technology||Reinhold Industries, Inc.|
|Brian Millsap||Senior Vice President, Chief Information Officer||Hampton Products International|
|Bryan Miott||Senior Project Manager||Toshiba America Information Systems|
|Carl Fong||Executive Director, Information Technology||Orange County, CA – Education|
|Carlos Campos||Regional Manager – IT Support Services||Cohn Reznick|
|Gary Guppy||Director of Information Technology||Aviva Family and Children’s Services|
|Jeromy Giacossa||Senior Director, Information Technology||Pico Holdings|
|Jim Guzik||Chief Technology Officer||Spectrum Networks|
|Kevin Brockenborough, Jr.||Director, Information Technology||Antimite Termite & Pest Control|
|Kim Wilson||Director, Information Technology||Relax the Back|
|Kyle Butts||Associate Director, Information Technology||Pitzer College|
|Michael Koetsier||Director – Athletics Network & Technology Services (ANTS)||UC Irvine|
|Michael Rembis||Associate Director Business IT Operations||Gilead Sciences|
|Ming Chen||Manager, Systems & Storage||Sierra Cedar|
|Patrick O’Donnell||Manager, Information Technology||Cerritos College|
|Phil Headley||Manager, Information Technology||Sanitation Distrcits of Los Angeles County|
|Phillip Lyle||Director, Enterprise Infrastructure||Chapman University|
|Raj Karnik||Director of Technology||Teacher Created Materials|
|Randy Torgerson||Private Investigator||Somatic Global Corporation|
|Raymond Kelly||Senior Director of Information Technology||The Retail Equation|
|Stephen Alford||Chief Information Officer||Worldwide Environmental Products|
|Stephen Laughlin||Chief Information Officer||Worldwide Environmental Products Inc.|
|Susan Zielan||Business Continuity Manager||UC Irvine|
|Tony Rosales||Information Systems Manager||Kingston Technology|
From I-5 South
Take exit 110A Blvd toward Convention Center, then keep right at the fork and follow the signs for Harbor Blvd S & merge onto S Harbor Blvd. Turn right onto W Convention Way & make a U-turn; destination will be on the right.
From I-5 North
Take exit 109 toward Katella Ave/Disney Way/Civic Center/Disneyland. Merge onto S Anaheim Way, turn left to E Katella Ave. Take another left onto S Harbor Blvd & make the first turn onto W Convention Way followed by a U-turn; destination will be on the right.
Parking lot is provided by Anaheim Marriott. $24/Self – $30/Valet.
For more information visit: