It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
BDR technology has evolved. There has been an evolution in what defines a true disaster. No longer are fires, floods and tornadoes the only threat to your business. 93% of all disaster recovery scenarios have nothing to do with natural disasters. In this session, we’ll review the changes and new threats to your business, how the technology has evolved as a result, and what true business continuity looks like.
When it comes to cybersecurity, the threat landscape is changing every day. From ransomware attacks to the security of the Internet of Things, there’s a lot to take in. Let our experts
break it down for you. Join Kaspersky to learn about trends from the past year and predictions for the future of cybersecurity. This talk will give you a sharper focus on how to protect your
business and how to plan for your future IT security needs.
Are cyber criminals hiding in your small business or government agency? Nearly half of small businesses have been victims of a cyber-attack. We will reveal why small and midsize businesses are hackers’ favorite new targets, describe where these new threats are coming from, and explain how to keep them out of your network. Learn how to protect your business, even without big-time IT resources.
Join us for a brainstorming session on what you need to know when it comes to managing your data in the cloud. What are the questions you have? Where do you start? Join Advisory Council member Nelson Morgan for an interactive discussion on managing your data. This is still a new technology that is constantly evolving. Join us to help answer some questions you have, or even formulate the questions you need to ask.
Ed Eckenstein is the founder and principal consultant of Smartly Secured, LLC. Previously, he worked for the State of Oklahoma for 23 years where he held various positions including help desk, systems administrator, web developer, and web systems manager. Ed has expertise in both cybersecurity and training. He holds Security+ and SSCP certifications and has an M.A. degree in Information and Learning Technologies from the University of Colorado Denver. Ed serves as a board member of the Oklahoma Infragard chapter. He is an adjunct instructor at Francis Tuttle Technology Center in Oklahoma City where he teaches personal computer security awareness.
Kristy Hoffman currently leads the Information Security Training and Awareness initiatives at BOK Financial. She holds a Master’s degree from the University of Oklahoma in Organizational Dynamics, (better known as Industrial-Organizational Psychology), with specialization in Human Resources and Project Management. She also has a Bachelor’s degree in Administrative Leadership from OU. She specializes in end-user psychology & behaviors, employee development and organizational change management. She has over 13 years of experience pioneering programs to educate as well as coach employees in highly regulated environments.
Pedro Serrano has over 35 years of experience managing and installing technical controls in networks around the world, 20 of those in military systems. He is the Security Architect for Cimarex Energy Company, an Oil and Gas exploration company and Professor at Phoenix University and ITT Technical Institute teaching infrastructure systems, security controls, and networking. Pedro has two postgraduates degrees one in Telecommunications Management from Oklahoma State University and the other in Computer Science from Tulsa University. Pedro serves as the Active Vice-president of the ISSA chapter in Tulsa, Oklahoma
Dr. Jerri Schoats-Stoutermire has over 20 years of Higher Education Administration experience. This includes a variety of administrative roles in public, private and proprietary institutions of higher education. Regardless of venue, her passion for educating adults remains the focal point of her endeavors. Jerri has earned her doctorate degree from Oklahoma State University, Masters of Education from Langston University and a Bachelor’s in Business Administration Degree from the University of Oklahoma. Dr. Schoats-Stoutermire, currently serves as the Campus Director for ITT-Technical Institute in Tulsa, OK.
Chris Yates • Network Security Architect, INTEGRIS Health
Aaron Baillio • Managing Director, Security Operations and Architecture, University of Oklahoma Information Technology
Alan Brown • IT Systems Security Administrator, National Cowboy & Western Heritage Museum
Stacy Patten • Cyber Security Operations Manager, QuikTrip
BIO: Kent Nabors serves as Chief Information Security Officer, responsible for Information and Physical Security for MidFirst Bank, a $11 billion, privately-owned, multi-state institution. Before joining MidFirst in 1998 he worked in bank examinations with the Federal Deposit Insurance Corporation and the Federal Reserve Bank of Kansas City. At MidFirst, he managed the network infrastructure before establishing the Information Security department. Kent received his MBA from the University of Oklahoma. He is also the co-author of the book “Dissecting the Hack: The F0rb1dd3n Network”. Kent is a supporter of a variety of InfoSec and Security community initiatives including serving on the board for Oklahoma Infragard since 2007, participating in the 2014 FBI Citizens Academy, and assisting in a re-launch of the DefCon Group program in 2015.
In today’s world of security breaches that cost companies millions, understanding how incidents can occur gives insight into protecting the network and managing risk. With the number of incidents on the rise, it’s no longer an option to simply be content with mitigating a breach after the fact, you must also detect any breaches of security before they can cause damage and prevent further intrusions.
The Engineers at Fortinet will walk you through the life cycle of advanced threats, pointing out their common methods of avoiding detection. Additionally, you’ll be shown how a proper security framework gives you multiple options to detect and mitigate an attack before it has the opportunity to inflict damage; costing you time, money, and public confidence.
Join us for an in-depth discussion covering the following areas:
No one thinks they need disaster recovery until they do. The fact is that most “disasters” and datacenter outages are not caused my hurricanes or severe
weather. Random power outages, human errors and many other non-weather factors are the typical causes of service interruptions. Join us to see the results
of a survey of IT professionals just like you and learn:
We will cover two use cases which outline gaps in their DR strategy and how you are able to overcome these gaps. Join us to learn more!
Nobody wants to be ill-prepared for any situation. In this presentation, you will learn what your company should be doing to ensure that it is ready for a computer forensic investigation or eDiscovery request. Topics will include:
Imperva will be discussing the current state of security threats, what made the major breaches of 2015 possible, and the practical steps which organizations must take to defend themselves. Organizations are spreading their efforts too thin by scattering their defenses too distant from the primary target. The primary target of the modern attack is sensitive, private DATA. In this discussion, we will share best practices and lessons learned from consulting with numerous Enterprises, Universities and Governments on DATA and Application security, audit, and governance initiatives for an overall framework for governing access, monitoring activity, and implementing effective security around your critical or private DATA.
Venture Capital money is pouring into companies that promise “next generation” endpoint capability. Us security professionals know that “next gen” is just a marketing term. So what is the reality? This presentation will examine real life attacks on machines with different endpoint technologies and view the efficacy against undetected malware. We will also discuss example requirements to determine when and if evaluating these new tools make sense for your enterprise.
This session is all about system availability and coming to grips with your backups and storage architecture. Engineers from both Veeam Software and Exagrid will come together in this lively session to ensure you leave with industry best practices for “Future Proofing” your backups and achieving “Always On” availability for your enterprise.
Fast-evolving cyber-threats call for a change in the way we protect our most critical information assets, in a digital world that is more connected than ever. Learn how new self-learning technology, known as the Enterprise Immune System, marks a fundamental transition in cyber defense, allowing organizations to gain indispensable visibility into their network, and detect emerging cyber-threats that bypass traditional security controls. Thanks to major advances in mathematics and unsupervised machine-learning developed at the University of Cambridge, UK, fundamentally new and innovative technology is capable of learning what is normal and abnormal within an organization, detecting even the most subtle behavioral anomalies in real time, without the use of rules or signatures.
Many organizations are exerting top-down pressure to examine cloud and as-a-service models in general. To the IT managers and administrators in the data center, losing control of your data and/or applications can be a scary thing. There is also a complex web of fiscal and technical items that must be considered.
In this presentation, we will help you build a base understanding of the three core as-a-service models. We will then go on to discuss what we see working with our customers in the real world; these are opportunities that can offload some of the drudgery in your data center, while at the same time demonstrating to your organization that you are embracing the cloud. This presentation provides an in depth discussion surround the pros and cons of moving applications, and or infrastructure over to cloud and managed services.
The details of this presentation will be available soon. Please check back for updates!
|Aaron Baillio||Manager, Security Operations||University of Oklahoma|
|Alan Brown||Manager, Information Security||Natl Cowboy & Western Heritage Museum|
|Allen Abrams||Director, Governance and Compliance||Teleflora|
|Andrew Nowlin||Director of Information Technology||Tate Publishing|
|Barbara McCrary||Chief Information Security Officer||OK State Regents for Higher Education|
|Brad Johnson||Chief Information Officer||MIT Group|
|Chris Yates||Enterprise Solutions Architect||INTEGRIS Health|
|Craige Baird||Director Technology Services||City of Ponca City|
|Dana Harper||Special Agent/Liaison||FBI/InfraGard|
|Daniel Hanttula||Director, Information Security||OMES (Office of Management and Enterprise Services)|
|Dannie Dixon||Manager Information Systems||State of Oklahoma|
|David Skrdla||Information Technology Audit Manager||University of Oklahoma|
|Dennis Dyer||Director of Information Technology/Chief Information Officer||Citizen Potawatomi Nation|
|Eric Hileman||Executive Director, Information Technology Services||Oklahoma City Public Schools|
|Erin Langston||Senior Manager Global Infrastructure Engagement||Boeing|
|Ian Anderson||Information Technology Security Manager||City of Oklahoma City|
|Jarrod Welch||Chief Technology Officer||Reasors|
|Jeff Story||Chief Information Security Officer||The Bankers Bank|
|Jerreld Underwood||Vice President of Technology||Vison Bank|
|John Hennessey||Director, Information Technology||University of Oklahoma|
|Jon Kirchen||Information Security Manager III||OMES (Office of Management and Enterprise Services)|
|Jonathan French||Director of Information Technology||Kiowa Casino|
|Keith Burlison||Deputy Director, Information Technology||Federal Aviation Administration|
|Kent Lewis||Director, Information Technology||Southwest Medical Center|
|Kerry Seley||Director, Information Technology||Sgt Grit Marine Specialties|
|Kevin Caldwell||Director, Information Technology||Dickson School|
|Mario Cruz||Chief Information Officer||OFMQ|
|Mason Schmidt||Information Technology Operations Manager||ATC Drivetrain|
|Mike Erhart||Director, Information Technology||R.K. Pinson & Associates|
|Mike Wood||Information Security Officer||INTEGRIS Health|
|Mitch Gilreath||Manager, Information Technology Systems||Rural Electric Cooperative|
|Neil Gray||Manager, Information Systems||City of Nichols Hills|
|Nelson Morgan||Director, Information Technology||Oklahoma Housing Finance Agency|
|Pedro Serrano||Security Architect||Cimarex Energy Co|
|Rocky Taylor||Director, Information Technology||OnCue Marketing|
|Scott Tyree||Senior Manager Application Services Systems||American Cancer Society|
|Tim Frisby||Director, Information Technology||Samco Enterprises, Inc.|
|Tim Marley||Information Technology Audit Director||University of Oklahoma|
|Todd Park||Vice President, Information Technology||W&W Steel|
Traveling east on I-40
Exit at Shields and proceed north toward downtown.
Turn left on SW 4th St.
Turn right on S. Robinson Ave.
Proceed north past Reno to the parking garage entrance.
Traveling west on I-40
Exit at Robinson Ave.
Proceed north past Reno to the parking garage entrance.
Traveling south on I-235 (Broadway Ext.)
Exit at N.W. 6th and proceed west to Broadway.
At Broadway, turn left and proceed south in the left lane until you veer into E.K. Gaylord.
The parking entrance is just south of Sheridan.
Traveling north on I-235
Exit at Sheridan and proceed to the bottom of the ramp.
Follow Sheridan west through Bricktown to E.K. Gaylord and turn left to access the underground parking garage.
Traveling south on I-35
Exit west on I-40 and follow directions listed above.
Traveling north on I-35
Exit to I-235 or to westbound I-40 and follow the directions listed above.