It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch this much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to threats that are already inside the network before they turn into a full-blown crisis.
Self-learning systems, which represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life’. They can spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat. Discover why autonomous response and machine learning are the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
To maximize the return on cloud security investments, CISOs need a seat at the table. Unfortunately, getting them there isn’t always simple, especially when security is often handled in a clandestine way that doesn’t always clearly demonstrate its value. However, security doesn’t have to be a dark and mysterious force in order to work effectively. It needs to be flexible, reliable and, most importantly, transparent. This is how you state the case not just for the relevancy of security to the organization, but how it can be a business enabler. Wayne Reynolds, VP of Security Operations, Armor, explores key steps that security professionals can employ to get their security program “out of the black box” and into their organization’s cloud strategy.
In a world where cybercrime has become commoditized, and both large corporations and small businesses find themselves frequently beset by malware, being able to thread security devices together to assemble an overall picture of what’s transpiring on your network will reduce your attack surface and response times while elevating your overall security posture.
Companies are faced with multiple compliance requirements (SOX, Data Protection/Privacy, Export Control, Life Science Regulations, etc.) All statutory requirements expect the private companies to have effective controls over its information technologies in order to protect data integrity, confidentiality, and availability. However, many companies highly leverage IT 3rd party vendors today. Implementing an effective IT Vendor Management program helps minimize both compliance risks and costs.
Millennials, on average, make up 40% of the workforce. Depending on the type of company and the location, that percentage can climb as high as 70-80%. We are currently in a very competitive job market, and we all want the best and brightest working for us. Small and mid-size companies are competing for talent with the likes of Google, Microsoft, Facebook, and Amazon. Millennials are the most educated, tech-savvy generation the U.S. has ever seen, so it is critical to understand how to attract and retain them. In this talk, we will study the case of “JD”, a Millennial in his early twenties working in the IT industry. Using this case study, we will look at common Millennial traits in hopes of understanding what makes them tick. We will discuss practical techniques and initiatives in the areas of hiring, evaluations, work culture, and compensation; these areas must be given attention to keep all employees (not just Millennials) happy and maintain low turnover rates. Finally, we will talk about how to hold effective one-on-one weekly or bi-weekly meetings with team members – perhaps the most important ritual every manager should perform. These meetings go much further in engaging employees than fancy offices and catered lunches (though those things certainly don’t hurt). Ultimately, we shall conclude that there is no silver bullet when it comes to hiring and retaining the best talent. Everyone is motivated by different things, and the key is to listen and take action.
Kenny is ecstatic to be making his first conference presentation at INTERFACE, Orange County. Throughout his 14-year career as a Software Engineer, and now as a Manager of Software Engineering, Kenny’s interests have leaned more towards people vs. technology- though Kenny does love writing and optimizing SQL queries! Kenny graduated from UC Irvine (Zot! Zot!) in 2003 with a B.S. in Information and Computer Science. After graduating, Kenny joined a small company in Irvine called The Retail Equation as an intern on a 2-person software development team, helping build the company’s core product. 14 years later, Kenny is still with the same company, now known as Appriss Retail, and Kenny is fortunate enough to manage a team that he looks forward to working with every day.
A myriad of research illustrates enhanced business outcomes such as increased sales revenue, more customers, greater market share and greater relative profits, when women and other underrepresented groups hold substantial and innovative leadership positions in tech. And yet, companies continue to miss out on highly qualified candidates, vital contributions and increased productivity and profit, as the numbers in tech’s diversity percentages plummet. Come listen to Donna Hale share her story about what it’s like to be a woman in tech and what advice she has for those considering career options. She will explain how she has navigated the challenges as a women she faced when starting her career in Technology; her presentation will highlight the adversities/obstacles she has encountered over her career, but will also share her many positive experiences of female advocacy, especially meaningful and impactful exchanges and support from male colleagues. This presentation is a unique and necessary opportunity to ask questions and learn promising practices for addressing the barriers to women’s participation in tech, along with ways to support your organization’s efforts toward change and multifold advancement.
The data storage market is going through tectonic shifts these days. Flash is being used to accelerate applications and IT leaders are moving from project based purchasing to building private clouds to concurrently hosting a multitude of applications. Join this session and learn how to take advantage of these changes; hear how IT leaders at a national credit union are consolidating workloads to increase IT agility while conserving budgets.
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true Disaster Recovery for the business. What types of disasters will impact the business? Learn about Disaster Recovery scenarios, and also the questions to ask and answer when planning your Disaster Recovery solution to drive true IT resilience. Learn which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
While Internet 1.0 was about networking all PCs and giving users access to the Internet, the current era of Internet 2.0 has been focused on networking everything. These things are being networked and attempts are being made to secure them with no provable identity. Instead, we’re creating complex networking and security policies based on an IP address as identity. This creates exponential attack vectors and makes networking much more complex, costly, and fragile, introducing risk for our mission critical infrastructure. To dramatically reduce the business risks that impact most organizations today, a new identity networking paradigm is required to fix the underlying flaw in IP: a flaw that afflicts all networking and security products. Only through provable device identity can we begin to unify networking and security, overcoming the risk, complexity, and cost of today’s networks. Lowering CapEx and OpEx through radical policy simplification and segmentation, with no disruption to existing infrastructure, is now possible. With Internet 3.0, organizations can securely connect, cloak, segment, move, failover, and disconnect any connected ‘thing’ instantly – anytime, anywhere.
The FBI estimates that, in 2016,victims of ransomware paid $1 billion to get access to their data. Studies
show that the amounts that attackers are demanding are steadily increasing. In this presentation, we will
look at these trends, common ransomware delivery methods and discuss how to build the best possible
Flash memory is revolutionizing data storage, bringing an unprecedented level of performance that legacy storage systems simply can’t match. Learn how to simplify your data management process through deep integration and get the power of array-based snapshots, replication and cloning without being storage experts.
We will cover the key characteristics of “great” Wifi, what to consider when evaluating Wifi, some common pitfalls to avoid during planning and design, how to securely on-board mobile devices, and finally look toward the future of wifi including 802.11AC Wave 2 and beyond!
Come to this session to learn about the technical differences in the SD-WAN vendors and some of the critical features to look for when choosing a vendor.
Geographically distributed enterprises are embracing SD-WAN at an accelerating pace. As applications continue to move to the cloud, networking professionals are quickly realizing that traditional WANs were never architected for a dynamic, internet-based environment and recognize that backhauling traffic from the branch to headquarters doesn’t make sense. Furthermore, end users often find their business apps run faster over their home Internet service, or even on their mobile device.
|Al Murillo||Senior Systems Manager||Teacher Created Materials|
|Albert Gonzalez||Manager of Network Engineering||UC Irvine|
|Alex Solares||International IT Manager||PSAV|
|Anh Tran||Manager, IT||City of El Monte|
|Anthony Rosales||MIS Manager||Kingston Technology|
|Asaf Rapoport||Director IT Network & Support Services||U.S. TelePacific Corp.|
|Becky Christy||Director Business Continuity||Southern Glazer’s Wine & Spirits|
|Ben Strother||Security Architect||Forsythe Technology|
|Bill Neavel||Director, IT||TD Service Financial Corp.|
|Blair Baker||CIO||1903 Solutions|
|Brandon Lashmet||Manager, Information Technology||The Retail Equation|
|Brent Marcus||Director, Information Technology||Reinhold Industries, Inc.|
|Brian Millsap||Sr VP, Chief Information Officer||Hampton Products International|
|Bryan Miott||Sr Project Manager||Toshiba America Information Systems|
|Carl Fong||Exec. Dir., Information Technology||Orange County, CA – Education|
|Carlos Campos||Regional Manager – IT Support Services||Cohn Reznick|
|Chen Ming||Manager, Systems & Storage||Sierra Cedar|
|David Masamitsu||Sr Manager, PMO||Prelude|
|Donna Hale||VP, Technology||Evans Hotels|
|Gary Guppy||Director of Information Technology||Aviva Family and Children’s Services|
|Giueseppe Ippolito||Sr Director, Information Technology||AEM Performance Electronics|
|Jeromy Giacossa||Director, IT||Accriva Diagnostics|
|Jillian Williams||Manager, Information Technology||Netreo|
|Jim Guzik||President & CIO||Spectrum Networks|
|Joseph Crisologo||Sr Homeland Security Engineer||CA Water Resources Control Board|
|Joseph Wolfgram||Chief Technology Officer||Hoag Health System|
|Josephine Young||CIO||TelePacific Communications|
|Kevin Mcdonald||EVP and CISO||Alvaka Networks|
|Kevin Brockenborough, Jr.||Director, Information Technology||Antimite Termite & Pest Control|
|Kim Wilson||Director, IT||Relax the Back|
|Kyle Butts||Associate Director, IT||Pitzer College|
|Linda Tuthill||Business Mgr.||Claremont McKenna College|
|Michael Hanken||VP, IT||Multiquip, Inc.|
|Michael Koetsier||Director – Athletics Network & Technology Services (ANTS)||UC Irvine|
|Ming Chen||Manager, Systems & Storage||Sierra Cedar|
|Nam Pham||SR. Network System Analyst||Canon|
|Patrick O’Donnell||Manager, Information Technology||Cerritos College|
|Phil Headley||Manager, Information Technology||Sanitation Distrcits of Los Angeles County|
|Phillip Lyle||Director, Enterprise Infrastructure||Chapman University|
|Raj Karnik||Director of Technology||Teacher Created Materials|
|Randy Torgerson||Private Investigator||Somatic Global Corporation|
|Ray Kelly||Sr. Director of Information Technology||The Retail Equation|
|Rick Buddine||CIO||BIT Corporation|
|Stephen Alford||Chief Information Officer||Worldwide Environmental Products|
|Stephen Laughlin||Chief Information Officer||Worldwide Environmental Products Inc.|
|Susan Thompson||Sr Manager, Client Liaisons||Etech-360|
|Susan Zielan||Business Continuity Manager||UC Irvine|
|Terry Embry||Sr Security Analyst||ADP|
|Victor Huynh||Director, Risk Management Service||Allergan|
|YP Chien||Ph.D., CISSP||Kingston Technology Company|
|Ernst Gangnes||Communications Chair||ARMA.AIIM Greather LA|
777 W. Convention Way
Anaheim, CA 92802
From the North: Take the I-5 South, exit Harbor Blvd., turn right onto Harbor Blvd., and then turn right onto Convention Way to the hotel.
From the South: Take the I-5 North, exit Katella/Disney Way, turn left onto Katella, drive about a mile to Harbor Blvd., turn left on onto Harbor Blvd., then turn right onto Convention Way to the hotel.
Travel from the Anaheim Resort with ease on the Anaheim Resort Transit (ART). Daily service to Disneyland, dining, shopping, and entertainment. All day access starts at $5 for adults and $2 for children. ART Schedule varies by destination. Visit our kiosk to purchase tickets right outside the main entrance of the hotel.
For more information visit: