It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
This session will show the benefits of having a SAN of any type in a virtual environment and explore the different kinds of SANs: disk based tiering, Hybrid, and flash based.
A paradigm shift has occurred in enterprise data management as datasets grow at an ever increasing rate. Data management practices from yesteryear are unable to keep pace with datasets growing from gigabytes to terabytes and terabytes to petabytes with full backup windows increasing from hours to days and days to weeks in some cases. This exposes organizations to data loss in the event of disaster, ransomware, or human error. This presentation will address the challenges involved in protecting your business’ data. These techniques will also limit your company’s exposure to regulatory compliance issues. To implement 3rd generation data management techniques, administrators need to understand what their data is, what its usage patterns are and whether or not the data has changed. Many tools are available to classify data and move it to less expensive or more durable tiers of storage, including RAID, Object Storage, Tape, Public and/or Private Cloud. Data that changes should be protected with snapshotting of enterprise disk arrays, along with traditional batch backup to De-duplication appliances, tape media or the cloud. Infrequently accessed unstructured data should be tiered to less expensive storage or archived, but made transparently available to end users using automated retrieval processes. Intelligently managing your organization’s data can help save thousands to millions of dollars annually.
Innovation Matters. Without innovation IT is stuck in the 80/20 rule. IT can’t keep up with data demands, data protection and data mobility. Innovation is important to IT as we try to help reduce costs and manage data.
The panel will provide various perspectives and share experiences in the Cyber Security realm. Cyber Security has been the top priority of NACIO and every information technology service provider’s priority list for the past five years. The bar to build a resilient Cyber Security infrastructure protecting digital information and business assets has been raised to unprecedented high level. The scope of Cyber Security protection has also been drastically expanded.
Promoting and raising security awareness is one of the most important first step to achieve Cyber Security readiness. Information security is not just the IT’s responsibility, but everyone’s business. Everyone has the responsibility to protect the security, integrity of information systems, and assets. The foundation to build effective information security is on the three pillars or the security golden triangle of people, process, and technology. Besides protecting the workplace from security intrusion, an effective security policy and process should not only be based on the company or business’s own workplace, but also be extended to each employee’s home information security practice. To prevent the security risks potentially coming from each employee’s home or personal computing devices, security education and practical security measures must be implemented to help employees to protect their home computing environment.
Jay Song, Chief Technology Officer • California Highway Patrol
Keson Khieu , Information Security Officer • State of California
Shelia Howell, Chief Information Officer • California Prison Industry Authority
When most people discuss Disaster Recovery, it is seen as the responsibility of IT. It is our responsibility to protect data and restore the infrastructure when a disaster occurs. However, Business Continuity is more than just Disaster Recovery. Business Continuity involves people from every part of the business, the business processes and protocols that drive the business, and the technology that supports those processes.
Panel Moderated by Tony Coronas • Director of Information Technology, Roebbelen Contracting, Inc.
Mike W. Reese • Chief Information Officer, USA Properties Fund
Ryan Tcruz • Director of Information Technology, Farmers’ Rice Cooperative, Sacramento, CA
Information Technology (IT) continues to play an essential role in both the public and private sectors. At the same time, IT is often relegated to a literal or virtual basement. During the past five decades, IT roles have transitioned from reactive, to proactive, to strategic partner; and yet, IT often continues to struggle for a legitimate place at the decision-making table.
Sometimes considered merely a utility or cost center, IT can be an asset for any organization with the right formula. Dynamic, stereotype-debunking leadership, a commitment to specialized communication, and ‘metric marketing’ are tools for changing perceptions, and IT leaders and practitioners often need to cross-train, take on new roles, and/or develop new competencies to demonstrate value to their organization. Developing new competencies can also create new professional opportunities that lend themselves to reducing burnout, increasing job satisfaction, and finding or rekindling your passion for a career in IT.
Dr. Christine Miller will share insights from her 25-year career and facilitate discussion on these topics.
Dr. Christine E. Miller joined California State University, Sacramento, in September 2014 as the Associate Chief Information Officer. She currently serves as Interim Vice President for Information Technology and Chief Information Officer. Previously, Dr. Miller served as Assistant Dean and IT Executive Director for the Franklin College of Arts and Sciences at the University of Georgia. Dr. Miller has 25 years of experience working in information technology, academic technology, and higher education.
Under her leadership at the University of Georgia, she participated in shared governance and partnered with other divisions to achieve campus-wide goals, as well as implementing an eAdvising platform, virtualizing server infrastructure, supporting accreditation, developing paperless workflows for academic and administrative processes, initiating site licenses for campus software, participating in the launch of the office of online learning, and identifying resources to make core services sustainable.
Dr. Miller holds a Bachelor’s degree in English, a Master’s in Instructional Technology, and a Ph.D. in Higher Education, all from the University of Georgia. Dr. Miller’s doctoral studies were completed in concert with the John N. Gardner Institute for Excellence in Undergraduate Education, where she honed her passion for using data and technology intentionally and collaboratively to achieve campus goals. In her current role, she serves as the technical sponsor for Smart Planner, Platinum Analytics, and other student and academic success projects.
As corporations are moving to infrastructure service providers, line of business applications are also moving to the hosted cloud. The traffic patterns for today’s corporations are changing. Gone are the days of a central data center with a hub and spoke designed WAN with one Internet connection. Today the traffic patterns are different and the demands are higher for reliable efficient Internet services.
In addition, the volume of Internet traffic is growing exponentially and the size of Internet connections required for organizations to compete in this economy are growing at an increasing rate. The goal is to provide reliable services to the user at an affordable price to the organization. One of the keys to this solution is a new technology called software defined wide area network.
Come learn how this technology is helping to define the new corporate topography and help control Internet traffic.
Today’s rapid pace of technological innovation is forcing digital and physical worlds to collide – and it’s also transforming the way organizations operate in every industry. This digital transformation can either make or break your business. Because, in the digital world, customers expect 24.7.365 Availability. No longer do businesses need to think in hours or days – they can think in minutes or seconds instead – for all applications, data, and workloads.
In this presentation we will learn how to create a powerful data protection solution for all types of customer environments by combining high-performance storage with integrated data protection to meet the “Always-On Enterprise” SLAs.
Join us for a presentation from the INTERFACE Advisory Council. Malspam continues to pester and impact organizations despite significant investments in protective security controls. Ransomware is a common payload of these messages. In this session, we will cover what these things are and discuss options for improving protection of your organization from them.
The shift to cloud is on. The challenge of this is to adopt the right mix of cloud models for your organization. Public cloud is setting the pace with agility and scale … and that has inspired a few myths (that we’ll de-bunk). But, can private cloud and the IT department keep pace? We’ll make the case for a building block architecture, while introducing public cloud-like web services in your data center. We will also share the stories of organizations that have deployed this type of enterprise cloud to guarantee performance, enable self-service, quiet shadow IT and manage a massive footprint with a fraction of the effort.
From insiders to sophisticated external attackers, the reality of Cybersecurity today is that the threat is already inside. Legacy approaches to Cybersecurity, which relies on knowledge of past attacks, and are simply not sufficient enough to combat new, evolving attacks. Also, a human Cyber analyst can only watch so much or react quickly enough. A fundamentally new approach to Cyber defense is needed to detect and investigate these threats that are already inside the network; before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life.’ They can therefore spot abnormal activity as it emerges and can take precise, measured actions to automatically curb the threat.
Discover why unsupervised machine learning is the future of defense and how the ‘immune system’ approach to Cybersecurity provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
In a world where cybercrime has become commoditized, and both large corporations and small businesses find themselves frequently beset by malware, being able to thread security devices together to assemble an overall picture of what’s transpiring on your network will reduce your attack surface and response times while elevating your overall security posture.
|Ann Shook||President||WITI Sacramento|
|Caleb Gibbs||Director, Information Technology||Weintraub Tobin|
|Chad Swaim||Director of Technology||Wheatland School District|
|Christiana Mbome||Manager, Information Technology Audit||California Public Employee Retirement System|
|Christine Miller||Interim Chief Information Officer||Sacramento State University|
|Darryl Young||Assistant Deputy Director & Chief Technology Officer||CA Lottery|
|David Brockmyer||Information Security Manager||Intel|
|David Eisenlohr||Director, Information Systems||Contra Costa County -EHSD|
|Ethan Eldridge||Solutions Architect||VSP Global/Eyefinity|
|Fredrick Gomez||Chief, Information Technology||California Department of Transportation|
|Glen Carson||Chief Information Security Officer||California Natural Resources Agency|
|Harry O’Laughlin||Chief Information Security Officer||California Department of Insurance|
|Heather Pettit||Chief Information Officer||Superior Court of California, Contra Costa County|
|Howard Duck||President||ISACA Sacramento|
|Jay Song||Chief Technology Officer||California Highway Patrol|
|Juliet Hakopain||Manager, Information Technology||Terra Nova Counseling|
|Keson Khieu||Information Security Officer||State of California|
|Maisha Dottery||Project Manager||California State treasurers office|
|Manish Ved||Senior IT Solutions Architect||Centene Corporation|
|Maria Gregorio||Vice President||ISACA Sacramento|
|Mart Brown||Manager, Information Technology||Butte County Public Health|
|Michael Gardella||Vice President, Systems & Business||California Bank & Trust|
|Michael Hull||Information Technology Support Manager||HDR Inc.|
|Michael Reese||Chief Information Officer||USA Properties Fund|
|Patrick Wilson||Chief Information Security Officer||Contra Costa County, Health|
|Peter Skibitzki||Director of Information Technology & Communications||Placer County Office of Education|
|Ren Johnson||Vice President of Information Technology||Acclamation Insurance Management Services (AIMS)|
|Reza Yazdi||Chief Information Officer||CA Public Utilities Commission|
|Shelia Howell||Chief Information Officer||California Prison Industry Authority|
|Sundar Pasupathy||Information Technology Manager||Delta Dental|
|Tammy Sanders||Manager, Information Technology||Devine Intermodal|
|Thaine Carter||Chief Security Officer||CTI (Corporate Tax Incentives)|
|Tim Taylor||Chief, Enterprise Solutions Development Division||CalPERS|
|Tony Coronas||Director of Information Technology||Roebbelen Contracting, Inc|
|Wayne Turnbow||Senior Information Technology Consultant||AAC Utility Partners|
|Paul Gue||Chief Information Officer||HealthPort Technologies|
|Phillip Mahan||Director, Risk Services||Williams & Garcia|
|Reggie Brinson||Chief Information Officer||Clark Atlanta University|
|Robbie Hudec||Global IT Security Lead||Novelis Corporation|
|Robert Mims||Chief Information Security Officer||AGL Resources, Inc.|
|Sazid Golandaz||Global Director, IT Strategic Sourcing||Global Director, IT Strategic Sourcing|
|Shane Mohr||SVP & Director of Information Technology||Southcrest Financial Group|
|Tamika Bass||Information Security Manager||Capegemini|
|Trevor Horwitz||Chief Information Security Officer||TrustNet|
|Venkat Krishnamoorthy||Chief Information Officer||Auto Auction Services Corp.|
|Victor Robinson||Senior Information Technology Network Design||AT&T Global Services|
|Viola Maxwell-Thompson||Executive Director||ITSMF|
|Wolf Halton||Senior Data Security Consultant||Elavon, Inc|
Sacramento Convention Center
1400 J Street
Sacramento, CA 95814
FROM SAN FRANCISCO I-80 (DAVIS, VALLEJO, OAKLAND, SAN JOSE)
Take I-80 East to Sacramento
Continue on US -50 East Toward Sacramento/South Lake Tahoe
Take I-5 Freeway (Redding turn-off)
Take “J” Street Exit (one-way street, East)
Take “J” Street to 14th Street
Convention Center on right hand side
FROM RENO I-80 (ROSEVILLE, AUBURN)
Take I-80 West toward Sacramento
Take I-5 South to Los Angeles
Take “J” Street Exit (one-way street, East)
Take “J” Street to 14th Street
Convention Center on right hand side
— Or —
Take I-80 West to Sacramento
Take Capitol City Freeway turn-off Business 80
Take the “J” Street exit
Bear left on 29th Street
Take a right on “L” Street
Take a right on 13th Street, Convention Center ½ a block on right hand side