It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
Your screen freezes and a dialogue box pops up to tell you that your computer is locked and your files will all be gone forever if you don’t pay up. Since many victims are willing to pay the ransom, this type of cryptomalware is on the rise, netting millions of dollars for cybercriminals looking for a substantial return on their minimal investment.
During this session you will hear from Kaspersky Lab on what they as a security vendor are seeing in this growing area of focus for both security vendors and cybercriminals. . Areas of focus will include:
Information security policies provide the critical foundation for governance and implementation of security controls in an organization. Gather in a conversation with your peers about typical shortcomings and gaps in information security policies. Take this opportunity to leverage the insight of others to examine the effectiveness, efficiencies, and practicalities in your own policies. As technology pervades every corner of the workday, what policy-level guidance is missing in your organization?
Panel Moderated by Di Brown • IT Director, Washington Schools Risk Management Pool
Evan Walker • IT Infrastructure Manager, TalkingRain Beverage Company
William Lidster • Manager of IT Security Infrastructure, Puget Energy
April Mardock • Information Security Manager, Seattle Public Schools
Let’s face it, the evolution of technology has moved so quickly over the last few years that is nearly impossible to keep up. While you may be utilizing cloud solutions right now, you have questions. Join Blue Coat Systems and the Advisory Council for an interactive panel discussion that will cover data visibility; security; vendor management and much more. You must always have control of your data and you will hear plenty of advice about the proper management of your cloud providers. Also, we will cover what you need to know about your providers and how this pertains to your operations.
Many needs, lots of ideas, and multiple voices can create chaos and confusion across the organization as it addresses its most pressing problems and as it pursues new opportunities is a fast-paced world. Today, it seems that all projects involve IT, so succeeding as a CIO involves building partnerships internally across the organization. Likewise, the CIO needs to work with vendors so they become partners to create a win-win relationship. In this presentation, John Krull, the Seattle Public Schools CIO with over 15 years at the helm in IT in the public and private sector talks about calming the chaos and confusion within the organization through building partnerships internally and externally. John will cover building those relationships through research, communication, trust, and risk-taking. To describe this approach, John tells the story of innovation and transformation to show how IT leaders can help their organization and partners sail through calm seas to the peak of success.
John was recently Chief Technology Officer at Oakland Unified School District in the San Francisco Bay Area. John led all technology strategy and worked closely with his team, stake holders, and partners to create a robust infrastructure for blended and personalized learning for all Oakland students. He had a penchant for working with Silicon Valley start-ups and stalwarts towards the goal of an equitable, supportable, and secure environment to improve teaching and learning. John was previously the CTO at Fremont Unified School District and the Vice President for Technology at Envision Education both in the Bay Area. Before leading IT in Education, John worked for 10 years in IT and web services at Microsoft, Virage, and Autonomy.
John earned a B.A. and Master’s Degree from the University of Washington. He has certifications as a Microsoft Certified Systems Engineer, a Network Operations Manager, Chief Technology Officer, and Teacher.
In today’s world of security breaches that cost companies millions, understanding how incidents can occur gives insight into protecting the network and managing risk. With the number of incidents on the rise, it’s no longer an option to simply be content with mitigating a breach after the fact, you must also detect any breaches of security before they can cause damage and prevent further intrusions.
The Engineers at Fortinet will walk you through the life cycle of advanced threats, pointing out their common methods of avoiding detection. Additionally, you’ll be shown how a proper security framework gives you multiple options to detect and mitigate an attack before it has the opportunity to inflict damage; costing you time, money, and public confidence.
How often do you hear the phrase “The WiFi here is crap”? As the number of connected devices and bandwidth-hungry applications continues to grow, so do the demands on your network. As you ponder the next generation of WiFi, you might wonder whether a Tri-Radio AP is all it’s cracked up to be. The short answer: Yes. We invite you to join us as we discuss the actual challenges posed by dual radios, and why Tri-Radio is essential to WiFi design in any high-density environment.
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why unsupervised machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
Innovation Matters. Without innovation IT is stuck in the 80/20 rule. IT can’t keep up with data demands, data protection and data mobility. Innovation is important to IT as we try to help reduce costs and manage data.
The world of Identity Management is dangerously fragmented and needlessly complex. Don’t settle for half a solution when you need full protection for both end users and privileged users. Secure enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. Protect against the leading point of attack used in data breaches compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.
In this session, we will discuss a platform approach to securing enterprise identities and:
Traditional datacenters small and large have been plagued for years by many of the same issues. Whether it is skyrocketing costs, inefficiency in the datacenter, increased complexity, data growth and data-access explosions, and so many others. Many organizations find innovation and attempts to modernize the data center to be paralyzing, often resorting to doing nothing or maintaining yesterdays technology at the cost of change or moving out of their comfort zones. This in-action often comes at a hefty cost, usually referred to as “the cost of keeping the lights on”, leaving minimal budgets for new projects to take up the reigns of new technology to advance the data center and more importantly, the business.
This presentation will not only address some of these issues and actionable steps IT organizations small and large can adopt, but it will position you to adopt advantages of the next generation data center by taking advantage of a unique combination of People, Process, Technology and so much more.
No one thinks they need disaster recovery until they do. The fact is that most “disasters” and datacenter outages are not caused my hurricanes or severe weather. Random power outages, human errors and many other non-weather factors are the typical causes of service interruptions. Join us to see the results of a survey of IT professionals just like you and learn:
We will cover two use cases which outline gaps in their DR strategy and how you are able to overcome these gaps. Join us to learn more!
To kill threats quickly, you need to accelerate time to detection and time to response. This requires efficiency of operations and a well-enabled team.
Join LogRhythm Sales Engineer, Peter McNaull, as we discuss how a security strategy that is focused on detection is required in today’s threat environment. Peter will demonstrate how to use your own security intelligence to efficiently reduce your mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR).
There are several steps that IT departments can take to gain control of SaaS usage. Join us for an illuminating discussion that will teach you how to empower your workers while protecting corporate data.
Today, Software-Defined WAN helps IT approach these challenges with a vision for a service delivery network “”fabric”” that can transparently aggregate and deliver services across enterprise datacenters and external clouds. SD-WAN ensures the user experience at the branch and mobile level are just as rich and seamless as at headquarters. And because SD-WAN reduces bandwidth requirements and simplifies branch networking, it’s cost-effective. Attend this session and learn why SD-WAN technology makes so much sense for business.
Join us for an interactive discussion and review of current pain points in providing secure and manageable access to devices brought from home or used by guests. As an answer to the problem, Aruba will explain ClearPass, a vendor-agnostic and complete authentication, access, BYOD, on-boarding, posturing and guest management system that works on any wired or wireless network.
For years, you’ve feared intrusion by Managed Service Providers – those job-stealing, faceless conglomerates whose primary goal is to make you and your team look bad to upper management. In reality, Managed Service Providers offer you a great shot at upward mobility. They WILL steal your job – but only the low-end, commoditized portion of it – freeing you to do more sophisticated (and more valuable) work. But how to pick the right one? Attend our session to learn why managed services are a boon to your business, how to avoid posers and hacks, and what Managed Service Providers REALLY think of you and your team.
Attend this session by Pure Storage, inventors of the all-flash enterprise storage solution, to learn how Smart Storage turbo-charges your applications, cloud and business. Hear the latest information about breakthrough advances in performance, reliability, and automation powered by all-flash.
A Software-Defined Secure Network offers end-to-end network visibility that secures the entire network, physical and virtual. It leverages cloud economics to find and stop threats faster, and it transforms a network into a single, holistic defense domain where every element becomes an enforcement point. Join this presentation for a foray into the future of the secure network.
|Alex Charbonneau||Manager, Information Technology||Alderbrook Resort & Spa|
|Ashley Riggs||Information Technology Operations Manager||City of Auburn, Wa|
|Ben Calvert||Manager, Information Technology||Wagstaff Consulting, LLC|
|Bob Johnson||Manager, Technology Services||Turner Construction Group|
|Brandon Hampshire||Manager, Information Technology||Inslee Best Doezie & Ryder|
|Brian Moore||Information Technology Director||Tacoma-Pierce County Health Department|
|Carmen Rahm||Chief Information Officer||Kent School District|
|Charlie Sizemore||Vice President||A & H Stores, Inc.|
|Chip McElhany||Director, Information Technology||Guardian Security Systems, Inc.|
|Christopher Maddux||Senior Architect, Systems||T-Mobile|
|Crystal Hayes||Manager, IP Compliance||The Boeing Company|
|Dean Haverstraw||Director of Information Technology||Samson Inc.|
|Dee Hathaway||Director, Information Technology||911 Norcom|
|Di Brown||Director, Information Technology||Washington Schools Risk Management Pool|
|Don Hendrix||Senior Technology Security Manager||AT&T|
|Eddy Cruz||Interim President||InfraGard|
|Erik Peterson||Global Information Security Manager||Crane Co.|
|Evan Walker||Information Technology Infrastructure Manager||TalkingRain Beverage Company|
|Gary Chrysler||Manager, Information Technology||Skagit County Public Utilities|
|Gregg Seko||Director of Information Technology||Filson|
|Harald Upegui||Network & Information Systems Administrator||HealthPoint|
|Janet Kerns||Director, Information Technology & Security||AT&T Services, Inc.|
|Jeff Cummings||Director, Information Technology||G2 Web Services|
|Jim Rawley||Network System Operations Lead||City of Bellevue|
|Jim Young||Manager, Information Technology||Seattle Public Schools|
|John Forrister||Director, Networking and Information Security||Tgen|
|John McRoberts||Senior Technical Director||AT&T|
|John Mulhall||Director, Information Technology||Sno-Isle Libraries Foundation|
|John Tolbert||Vice President of Cyber Security||Queralt|
|Justin White||Vice President||ISSA Puget Sound Chapter|
|Keith Messner||Manager, Information Technology||Pierce Transit|
|Kenneth Silsbee||Senior Business Information Risk Manager||Xerox Information Security Office|
|Lawerence Kane||Senior Leader, Information Technology Infrastructure||Boeing Company|
|Lionel Roberts||Manager, Information Technology||Emerald Services|
|Mark Alia||Information Technology Manager||James Farrell & Co.|
|Michael Middlebrooks||Director, Information Technology Infrastructure & Operations||University of Washington|
|Michael Secright||Chief Information Officer||Goodwill|
|Michael Whitehead||Manager, Information Technology||West Sound Utility District|
|Peter Hansen||Manager, Information Systems||OKI Developments, Inc.|
|Randall Kintner||Chief Information Officer||LifeSpan BioSciences, Inc.|
|Randall Rusher||Information Technology Manager||Meteorcomm|
|Ren Guardiano||Technical Manager, Enterprise Applications||Seattle Childrens Hospital|
|Richard Hill||Solutions Architect & Cyber Security||The Boeing Company|
|Robb Montejano||Director, Information Technology||Era Living|
|Rodney Dye||Director, Information Technology||Stemilt Growers, LLC|
|Ron Tiedeman||Director, Information Technology||City of Milton|
|Russ Humberd||Manager, Information Technology Operations||Port Blakely Companies|
|Russell Turley||Manager, Information Technology||Romac Industries, Inc|
|Shannon Boldt||Manager, Information Systems||Point No Point Treaty Council|
|Skylar Shaw||Director, Information Technology||First Financial Northwest Bank|
|Tim Crawford||Director ITS, Network Services||Federal Way Public Schools|
|Tim Pugil||Manager, Information Technology Operations||Harborstone Credit Union|
|Victor Adamson||Manager, Database Administration||Continental Mills|
|Ward Naf||Director, Information Technology||Whatcom Community College|
|William Lidster||Manager, Information Technology Security Infrastructure||Puget Energy|
Washington State Convention Center
800 Convention Pl
Seattle, WA 98101
Metro’s Convention Place Station is a convenient hub for many bus routes and is located just one block north of the Convention Center on 9th Avenue at Pine Street.
The Convention Center Main Garage is located onsite. The main entrance to the garage is on 8th Avenue between Seneca and Pike Streets. The garage is open seven days a week, from 5:00 a.m. until midnight. Parking is paid at the time of exit. Fees range from $4-$16, based on hourly rates.
The Freeway Park Garage is located next to the Convention Center. The main entrance to the garage is at 1300 Hubbell Place (between Seneca and Pike Streets). A convenient pedestrian walkway connects the garage directly to the Convention Center. Fees range from $3-$15, based on hourly rates. Hours: Mon – Fri, 6:00am to 9:00pm.
For more information visit: http://www.wscc.com/about_us/directions_parking.aspx