It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
Usually when you hear someone talking about fast disaster recovery, they’re talking about fancy new technologies that give you a leg up on your recovery. Sure, virtualization, image-based backup, and cloud computing can all contribute to fast recoveries, but there’s something else you can do to make sure you have fast, reliable recoveries and it doesn’t cost you a dime. What is it? Creating solid documentation and using it to make a plan. In this presentation, we’ll show you how to actually do this, from start to finish.
Your screen freezes and a dialogue box pops up to tell you that your computer is locked and your files will all be gone forever if you don’t pay up. Since many victims are willing to pay the ransom, this type of cryptomalware is on the rise, netting millions of dollars for cybercriminals looking for a substantial return on their minimal investment.
During this session, you will hear from Kaspersky Lab on what they as a security vendor are seeing in this growing area of focus for both security vendors and cybercriminals. Areas of focus will include:
What exactly is Ransomware? We’ll take a look at Ransomware, its historical presence and evolution into today’s most common threats, like CryptoLocker and CryptoWall. Most importantly, we will share best practices for Ransomware defense – how to prepare, prevent and respond.
Panel Moderated by Ryan Smith, Senior Systems Engineer, Security Analytics
Panel Presented by Blue Coat + Symantec
Let’s face it, we live in a post prevention world. When an attack happens, the CISO (and the board) will be asking “Who did this and how did they get in? What systems were impacted? What data exfiltration techniques were involved? Can we be sure it’s over? How can we prevent it from happening again?” While you may be utilizing intrusion detection tools and have a forensics team in place, you are likely experiencing a lot of “false positives”. Join Blue Coat (now Symantec) and the INTERFACE-Advisory Council for an interactive panel discussion that will cover the anatomy of an attack, cyber forensic best practices, post breach investigation, remediation tools and tactics, and much more. It’s critical to be prepared for a breach and you will hear plenty of “lessons learned” about breach preparedness.
For medium and small businesses, you have the same expectations in protecting company data as anyone else in IT. However, with limited financial resources, the task can seem daunting at times. Join the INTERFACE Advisory Council for an interactive panel discussion on picking up tips about securing data in all settings. Whether you are migrating data in the cloud or securing every day information, you need to be prepared. Bring your questions and have a chance to hear from other end users that have the same issues.
Panel Moderated by Matt Huff, Chief Information Officer • Tanner Co. Accounting Firm
David Bailey, Senior Information Security and Risk Manager • LDS Church
Jake Schroeder, Infrastructure Security Manager • HireVue
David Clark, Director of Information Technology • Kirton McConkie
Today, it seems that all innovation is driven by technology (social, mobile, analytics, cloud). If that is the case, IT leaders and teams should be perfectly positioned to lead the digital transformation. But, to lead this revolution what must be true? In this presentation, Niel Nickolaisen, CTO of OC Tanner, winner of the 2015 ProphIT award and author of the Agile Culture and Stand Back and Deliver, describes the specific things IT leaders and teams can do to ensure they lead the digital transformation. These things include: Focus innovation where it matters most, clean up our legacy messes, define the business architecture and change how we lead. To describe this approach, Niel tells the story of the in-process transformation of OC Tanner.
Niel Nickolaisen is the CTO at OC Tanner. He has held technology executive and operations executive positions; typically in turnaround roles. He has a passion for helping others deliver on what he considers to be the three roles of IT leadership: 1) Enable strategy and 2) Achieve operational excellence and 3) Create a culture of trust and ownership.
Niel holds a MS in Engineering from MIT, a BS in Physics from Utah State University, and an MBA from Utah State University. He writes an enterprise CIO column for SearchCIO. He is the author of “The Agile Culture” (2014, Addison Wesley) and “Stand Back and Deliver” (Addison Wesley, 2009). Niel was the winner of the 2015 Prop IT award.
Innovation Matters. Without innovation IT is stuck in the 80/20 rule. IT can’t keep up with data demands, data protection and data mobility. Innovation is important to IT as we try to help reduce costs and manage data.
In today’s world of security breaches that cost companies millions, understanding how incidents can occur gives insight into protecting the network and managing risk. With the number of incidents on the rise, it’s no longer an option to simply be content with mitigating a breach after the fact, you must also detect any breaches of security before they can cause damage and prevent further intrusions.
The Engineers at Fortinet will walk you through the life cycle of advanced threats, pointing out their common methods of avoiding detection. Additionally, you’ll be shown how a proper security framework gives you multiple options to detect and mitigate an attack before it has the opportunity to inflict damage; costing you time, money, and public confidence.
Location matters, even in the cloud. Most organizations have very specific needs and requirements for their IT infrastructure. One component that often gets overlooked is where their hosting environment is, or will be, located.
In this presentation, we will discuss why ‘location matters’ when deploying a cloud solution. We’ll look at several reasons why location should be considered for your hosting environment, including: latency, regulatory mandates for compliance, specific performance requirements, corporate governance, disaster recovery needs, and more. This topic will also include key points of consideration that should be reviewed before choosing a provider for your hosting environment.
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why unsupervised machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
The world of Identity Management is dangerously fragmented and needlessly complex. Don’t settle for half a solution when you need full protection for both end users and privileged users. Secure enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. Protect against the leading point of attack used in data breaches compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.
In this session, we will discuss a platform approach to securing enterprise identities and:
Traditional AV products are going away as more options are available to run AV technology over the IT network. This session will discuss the different standards available for both audio (AVB, CobraNet, DANTE, and Q-Lan) and video (HDBaseT, JPEG2000, and H.264) and the pros and cons of each.
This session will show attendees how flash technology in the datacenter is transforming applications, performance, and the financial impacts of this revolution. This presentation will demonstrate the impact that legacy storage platforms have on your applications, and how the next generation of all flash arrays address the shortcomings of disk technologies. We will also attempt to dispel some of the myths that make customers hesitant to seek out all-flash alternatives to traditional storage arrays.
Are you challenged by managing and protecting ever-increasing amounts of data, and how to do so at less cost? Deploying an effective backup storage solution requires deduplication, but how you implement it will have a major impact on virtually every area of backup performance. During this presentation, you will learn what to look for in a disk storage with data deduplication solution to ensure you make the right decision. Discover how to achieve the fastest backups for the shortest backup window, fastest restores, instant VM recoveries in seconds to minutes, a fixed length backup window even as data grows, and fast, reliable off-site disaster recovery. Come learn how high performance can effect the scalable disk backup with deduplication solution.
Cyber-attacks are becoming increasingly complex and persistent, making it difficult for security professionals to protect their organizations as they head into the virtualized, IoT era. In this session, Radware will share real world experiences gathered by its Emergency Response Team and discuss how leading enterprises are successfully defending against the latest generation of attacks.
In this presentation, we will discuss the seismic shift within the information technology sector; think video, virtualization, 10G, Bring Your Own Device (BYOD) and the journey to the cloud. These megatrends, along with the influx of data and mobility, accelerate the need for improved management, predictable platforms, and cost-efficient strategies. Solutions discussed to get your business ready for the future will include: business benefits of high-performance connectivity, fiber, different technology types, delivery methods, carrier diversity, and answers to the question “When does it make sense?”
It’s 2016, but organizations still struggle to deliver consistent and predictable performance for their cloud and virtualized applications. Even with advances in flash technology, storage remains designed for physical, not virtual, workloads, and it shows with unpredictable performance, difficult troubleshooting and fragile scalability. Storage needs to be aligned to virtualization, but what is VM-Aware Storage besides a buzzword? We will investigate the five requirements of VM-Aware Storage, and which technologies enable those requirements.
As enterprises look beyond traditional IT workloads including cloud-native applications and DevOps, they should consider how technologies such as software-defined infrastructure and cloud can drive real-world benefits. Learn how IT can move away from traditional environments to hyperconverged infrastructure and onward to Enterprise Clouds to handle all their challenging applications and business needs with clear agility, productivity and availability/security benefits.
No one thinks they need disaster recovery until they do. The fact is that most “disasters” and datacenter outages are not caused my hurricanes or severe weather. Random power outages, human errors and many other non-weather factors are the typical causes of service interruptions. Join us to see the results of a survey of IT professionals just like you and learn:
We will cover two use cases which outline gaps in their DR strategy and how you are able to overcome these gaps. Join us to learn more!
The cost and consequences of downtime and lost data pose a significant challenge to ensuring business continuity and the availability of applications and data. Join us for a discussion on how to deliver Availability for the Always-On Enterprise through integration with your storage provider. This discussion will detail how an Availability Suite takes advantage of this integration and how your organization can leverage this to perform frequent crash-consistent and application-consistent storage snapshots. As well as replicate to a secondary array for lower a lower RPO, meet strict RTO’s by performing granular recoveries from snapshots on both primary and secondary arrays, and finally how backups from storage snapshots will significantly reduce the impact from data protection activities on production workloads.
Data breaches are unfortunately the new norm. The challenges are growing as the amount of data in organizations continue to increase at unprecedented rates. While organizations may have strong controls in place to secure their applications, they are still exposed and vulnerable to great risk because they do not have visibility over who has access to data stored on file shares, collaboration portals, email and cloud-based storage systems. By governing access to unstructured data organizations can identify where sensitive data is located, identify who has access to it, and implement controls to protect it. Attend this session to learn why unstructured data is so difficult to protect, why it should be a top priority in your identity governance program, and how to mitigate unstructured data risks in less than one month.
|Abraham Kololli||Deputy Chief/Information Services Manager||Utah Transit Athourity|
|Adam Deason||Information Technology Operations Manager||Bear River Mutual|
|Al Delacruz||Manager, Information Technology||Cookietree Inc.|
|Andre Finlinson||Director, Technical Operations||LBiSat, LLC|
|Blaine Carter||Information Security Manager||Franklin Covey|
|Bob White||Director, Information Security||Medicity|
|Brett Cornelius||Manager, Information Technology Security||ModusLink Global Solutions|
|Brian Long||Vice President, Information Technology||Bear River Mutual Ins., Co.|
|Calvin Zulich||Director, Technology||Stevens Henager College|
|Chris Nelson||Manager, Information Technology||ADP AdvancedMD|
|Cory Brown||Director, Information Systems||Consulmed|
|Craig Sanders||Director of Information Technology||Center for Excellence in Higher Education|
|David Bailey||Senior Information Security & Risk Manager||LDS Church|
|David Clark||Director, Information Technology||Kirton McConkie|
|David Fletcher||Chief Technology Officer||State of Utah|
|Derek Howard||Information Technology Manager||Utah State Office of Education|
|Ernie Nielsen||Managing Director, Enterprise Project Management||Brigham Young University|
|George Sturua||Information Technology Infrastructure Director||Stampin’UP! Inc.|
|Jake Schroeder||Infrastructure Security Manager||HireVue|
|Jason Martinez||Information Technology & Project Manager||Q90 Corp|
|Jason Struck||Manager, Network Engineering||Salt Lake City Corporation|
|JD Brown||Chief Information Officer||Prime Holdings Insurance Svcs.|
|Jeff Brohamer||Director, Information Technology||Sera Prognostics, Inc.|
|Jeff West||Director, Information Technology Security||Questar|
|Jim Bolinder||Technical Operations Senior Manager||Nu Skin USA|
|Joe Sferrazza||Director, Information Technology||S*Power|
|John Cockett||Director of Technology||Utah State University|
|John Coker||Manager, Information Systems||Central Utah Water Conservancy District|
|Jon Huntsman||Director of Member Services||Utah Technology Council|
|Jon Shurtliff||Director, Information Technology||3-Form|
|Josh Hood||Director of Information Technology||Health Equity|
|Karl Oldroyd||Director of Security and Application Support||Select Health|
|Keming Zhou||Principal Advisor, Information Systems||Rio Tinto|
|Kim Schroeder||Chief Technology Officer||Data2Logistics LLc|
|Kirby Glad||Chief Technology Officer||Cerenimbus Software|
|Matt Huff||Chief Information Officer||Tanner LLC|
|Matthew Mills||President||AITP Chapter|
|Michael Wilkinson||Director, Information Technology||Spillman Technologies|
|Neal Francom||Chief Information Security Officer/Chief of Staff||LDS Church (ISSA as well)|
|Nyle Stoddard||Manager, Information Security||RR Donnelley|
|Paul Gonzales||Chapter Chair||ASIS|
|Paul Hardin||Senior Project Manager, Office of Information Technology||BYU|
|Randall Crowther||Manager, Information Technology||Cache County, UT|
|Rich Moss||Director, Information Technology||National Benefit Services|
|Rick Widner||Director, Network Administration||MTC|
|Riley Johnson||Manager, Information Technology||ZERO Manufacturing, Inc.|
|Robert Frailey||Information Systems Manager||Utah Medical Products|
|Robert Gray||Manager, Global Infrastructure & Information Systems||Henry Schein Practice Solutions|
|Roger Partovi||President/CEO||IT Unite Technologies|
|Ron Boyer||Director, Information Technology||Summit County, UT|
|Scott Foster||Assistant Vice President, Network and Security Manager||Merrick Bank|
|Scott Olson||Senior Director Strategic Projects||Autoliv|
|Scott Rushforth||Vice President, Information Technology||Horizon Credit Union|
|Sebastian Jakins||Information Technology Manager||Clinical Innovations|
|Shawn Young||Manager, Technical Services||Barnes Aerospace|
|Shelly Belflower||Director, Academic Technologies||Weber State University|
|Steve Howard||Manager, Information Technology||Alliant Techsystems|
|Steve Tanguay||Date Center Supervisor||Nu Skin USA|
|Toby Garcia||Director, Information Technology||Visit Salt Lake|
|Todd Neilson||Chief Information Security Officer / Co-founder||Secuvant Security Services|
|Tom Judd||Manager, Information Technology||Hotdocs|
|Vaughn Peterson||Vice President Information Technology||Cyprus Credit Union|
UTA’s Temple Square Station (#2) is a convenient hub for many bus routes and is located just one block north of the Convention Center on South Temple, near the intersection with West Temple.
Parking at the Salt Palace Convention Center (SPCC) is available seven days a week. The SPCC offers two convenient covered parking garages with great customer service staff to help you with your needs, and 24×7 security. One garage is located at 200 South 185 West (south end has 600 stalls) and the other garage is located at 50 South 300 West (north west end has 400 stalls). The current parking rate is $7 per day, payable upon entry.
For more information visit: https://www.visitsaltlake.com/salt-palace-convention-center/