It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
There are plenty of lists telling you best practices for many areas of the modern data center; but what about the pitfalls to avoid? What do you need to know NOT to do so that you can ensure the highest levels of availability? Attend this session from Veeam with Ben Beckham and learn immediate practical tips on how to increase your data center availability. Takeaways from this webinar include:
• Identifying data surfaces that may be missing from your backup strategy
• A list of pitfalls to avoid from changes in the modern data center of today
• Tips for increasing your data center availability, including via free tools
Your screen freezes and a dialogue box pops up to tell you that your computer is locked and your files will all be gone forever if you don’t pay up. Since many victims are willing to pay the ransom, this type of cryptomalware is on the rise, netting millions of dollars for cybercriminals looking for a substantial return on their minimal investment.
During this session you will hear from Kaspersky Lab on what they as a security vendor are seeing in this growing area of focus for both security vendors and cybercriminals. Areas of focus will include:
• Common ransomware scenarios and delivery mechanisms
• Trends in this growing form of cybercrime
• Recommendations to help your organization avoid being a victim
This session will discuss the current state of platform security, and explore alternative approaches proposed by leading members of the security industry. It will include discussions around Cloud, CASB, Google’s BeyondCorp framework, and others. The intent is to bring to light why so many industry leaders are calling for a new approach to security, and define what is needed in this new model.
This panel discuses an age old problem often ignored: IT’s lack of involvement in the beginning stages of major projects. Often due to WHO’s lack of experience, or the Project Manager’s previous troubles with IT’s vetoing patterns, IT has been left out. But this is not a sustainable solution we week. Rather, we must discuss how to deal with and negotiate objections. How can we engage Best Practice and IT’s real world experience in order to engage IT at the onset of projects, or have them continuously help shape and transform existing projects? How do we incorporate IT as a resource rather than an obstacle?
Moderator: Daniel Hanttula • Director of Information Security, OMES
Brandy Semore • President & Founder, Oklahoma Women in Technology
Lora McCoy • President, IIBA
Barbara McCrary • Chief Information Security Officer, Oklahoma State Regents for Higher Education
Many companies today are either moving to, or thinking about moving to the Cloud. With risk being one of the number one concerns, how can we place corporate data and services without impact or risk to the company?
Moderator: Clint Lawson • CISO, MidFirst Bank
Trey Gonzales • Technical Infrastructure Engineer, American Fidelity
Aaron Baillio • Manager of Security Operations, University of Oklahoma
Ronnie Nunn • Sr. Security Architect of IT, Hertz Global
If we graded ourselves on the progress we’ve made in IT over the past 20 years, would we be satisfied with the results? There are many common challenges which have persisted throughout the years. The question is this: are the solutions out of reach or do our actions fall short of our intentions? In this talk, Matt Harper will share his perspective (and a few confessions) of the constant struggle to “walk the talk” across information security and infrastructure operations.
Bio: Matt Harper serves as the Director of Information Security & Infrastructure for Devon Energy Corporation, a Fortune 500 oil & gas Company headquartered in Oklahoma City. His responsibilities include leading the execution of Devon’s technology strategy and managing cyber risk to Devon’s technology and data.
Mr. Harper serves as a board member for the Oil & Gas ISAC, is an active member of the American Petroleum Institute IT Security Subcommittee, and the Chair of the Oil & Gas Sector Coordinating Council collaborating with the Department of Energy and Department of Homeland Security on energy security policy.
Prior to joining Devon, Harper served as a Special Agent with the Federal Bureau of Investigation where he specialized in cyber investigations, critical infrastructure protection and intelligence matters. Harper has been on the front lines on numerous computer intrusion investigations involving state sponsored attacks, terrorist groups, organized crime and hacker groups. While in the FBI, Mr. Harper created the Cyber Program and founded the Oklahoma InfraGard chapter.
Harper is a Certified Information Systems Security Professional (CISSP), holds numerous technical certifications and Bachelor’s and Master’s degrees from the University of Missouri.
Security concerns continue to grow. Organizations are under attack from more and more malicious invaders to their environment. It is not a case of if, but when an organization will be attacked. But, through effective use of offense, defense, and backups, one can mitigate the adverse affects of ransomware and other malicious malware.
Phishing, ransomware, and advanced persistent threats (APTs) are a serious and growing problem. The success of ransomware alone (from the perspective of attackers) is so great that the FBI estimates that it cost businesses over $250 Million in 2016—and that is just one report! This big money game is allowing attackers to increase their sophistication by plowing money back into their R&D organizations to enable even more sophisticated attacks.
What is cyber liability insurance and why do you need it? We will also discuss the importance of understanding why this is important in today’s evolving digital workplace.
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why unsupervised machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
Business demands on IT infrastructure are increasing while the pace of change accelerates– in order to support business requirements, companies must understand the value that new storage tecnologies may provide. Storage technologies are emerging that provide benefits beyond those already delivered by Flash and SSDs. In order to evaluate and plan for these new technologies, it is important for companies to know how to evaluate their business needs in light of these emerging technologies.
This session will cover the economic and performance benefits of non-volatile, memory-based storage technologies, along with new access methods know as NVMe.
This presentation explores the realities of Linux vulnerabilities and outlines how additional security is required to secure the modern data center. Join this session to learn how industry leaders are using a connected threat defense strategy taking the best of cross generational strategies to secure their journey to the cloud.
In order to protect your computer environment from the broad range of attacks in today’s electronic world, it’s imperative to implement multiple security layers to effectively secure your infrastructure. In this presentation, we will discuss the shortcomings and vulnerabilities of a single layer solution. In addition we will show you how investing in a multilayer approach that recognizes the strengths and limitations of each type of security product provides superior protection of your data.
As an industry, we have spent $75B on InfoSec, yet the breaches keep coming. What has lead us to this place, and how can we establish a solid foundation on which to build an Information Security System that can adapt to, and potentially get ahead of the coming waves of global attacks? We will review the history, the technological changes, the successes and the mistakes that have created an environment in which the networks users operate on are irrelevant and the attackers use terms like “conversion rates” and “campaign success”.
Usually when you hear someone talking about fast Disaster Recovery, they’re referring to fancy new technologies that may give you a leg up on your recovery process. Sure, virtualization, image-based backup, and cloud computing can all contribute to quick recoveries, but there’s another solution to fast, reliable recoveries and it doesn’t cost a dime. In this presentation, we’ll show you how to create solid documentation and make a plan, from start to finish.
|Aaron Baillio||Manager, Security Operations||University of Oklahoma|
|Allan Abrams||Director, Governance and Compliance||Teleflora|
|Andrew Nowlin||Director of Information Technology||Tate Publishing|
|Barbara McCrary||Chief Information Security Officer||Oklahoma State Regents for Higher Education|
|Brad Coats||Director of Information Technology Operations||Life.Church|
|Brad Johnson||Chief Information Officer||MIT Group|
|Brandy Semore||President||Oklahoma Women in Technology|
|Chad Kliewer||Information Security Officer||Pioneer Telephone|
|Chase Newby||Chief Information Officer||Funk Companies|
|Chris Kosciuk||Network Analyst||Oklahoma State University|
|Chris Portwood||Supervisor of Information Technology||OKC-County Health Department|
|Clint Lawson||Director of Cyber Ops & Threat Intelligence||Hertz Global|
|Dana Harper||Special Agent/Liaison||FBI/InfraGard|
|Daniel Hanttula||Director, Information Security||OMES (Office of Management and Enterprise Services)|
|David Skrdla||Information Technology Audit Manager||University of Oklahoma|
|Ed Eckenstein||Principal Consultant & Trainer||Smartly Secured, LLC|
|Eric Hileman||Executive Director, Information Technology Services||Oklahoma City Public Schools|
|Eryn Tribble||Vice President||ACP|
|Fred Keller||Director Information Technology Facilities||University of Oklahoma|
|Gordon Rudd||Vice President/Chief Information Security Officer||RCB Bank|
|Ian Anderson||Information Technology Security Manager||City of Oklahoma City|
|Jeff Story||Chief Information Security Officer||The Bankers Bank|
|Jerreld Underwood||Vice President of Technology||Vison Bank|
|Joe Sullivan||Network Security Admin||RCB Bank|
|Jon Kirchen||Information Systems Manager III||OMES|
|Kent Lewis||Director, Information Technology||Southwest Medical Center|
|Kevin Caldwell||Director, Information Technology||Dickson School|
|Mario Cruz||Chief Information Officer||OFMQ|
|Mike Erhart||Director, Information Technology||R.K. Pinson & Associates|
|Mike Wood||Information Security Officer||INTEGRIS Health|
|Neil Gray||Manager, Information Systems||City of Nichols Hills|
|Nelson Morgan||Director, Information Technology||Oklahoma Housing Finance Agency|
|Ronnie Nunn||Information Technology Senior Security Architect||The Hertz Corporation|
|Scott Tyree||Senior Manager Application Services Systems||American Cancer Society|
|Tim Frisby||Director, Information Technology||Samco Enterprises, Inc.|
|Tim Marley||Information Technology Audit Director||University of Oklahoma|
|Todd Park||Vice President, Information Technology||W&W Steel|
|Tony Haskins||Information Technology Director||High Plains Technology Center|
Cox Convention Center
Exhibit Hall One
1 Myriad Gardens
Oklahoma City, OK 73102
Traveling east on I-40
Exit at Shields and proceed north toward downtown.
Turn left on SW 4th St.
Turn right on S. Robinson Ave.
Proceed north past Reno to the parking garage entrance.
Traveling west on I-40
Exit at Robinson Ave.
Proceed north past Reno to the parking garage entrance.
Traveling south on I-235 (Broadway Ext.)
Exit at N.W. 6th and proceed west to Broadway.
At Broadway, turn left and proceed south in the left lane until you veer into E.K. Gaylord.
The parking entrance is just south of Sheridan.
Traveling north on I-235
Exit at Sheridan and proceed to the bottom of the ramp.
Follow Sheridan west through Bricktown to E.K. Gaylord and turn left to access the underground parking garage.
Traveling south on I-35
Exit west on I-40 and follow directions listed above.
Traveling north on I-35
Exit to I-235 or to westbound I-40 and follow the directions listed above.