It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
The world of Identity Management is dangerously fragmented and needlessly complex. Don’t settle for half a solution when you need full protection for both end users and privileged users. Secure enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. Protect against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.
In this session, we will discuss a platform approach to securing enterprise identities and:
When it comes to cybersecurity, the threat landscape is changing every day. From ransomware attacks to the security of the Internet of Things, there’s a lot to take in. Let our experts break it down for you. Join Kaspersky to learn about trends from the past year and predictions for the future of cybersecurity. This talk will give you a sharper focus on how to protect your business and how to plan for your future IT security needs.
As cloud security concerns continue to rise with the increase in EFSS adoption, enterprises must employ overarching policies, such as intelligent key management, to protect their data and decrease their overall risk of security breaches. This presentation will look at three EFSS adoption workplace security scenarios facing IT Professionals today and how best to mitigate them.
The landscape that today’s CISOs operate in and the role they fill has fundamentally changed. In today’s role as a CISO, one finds that not only must CISOs understand the technical side of cyber security, they now must equally understand enterprise risk management and how both disciplines impact their organization’s ability to successfully conduct business. In today’s dynamic environment, companies that lead their industries are now recognizing that cyber security is a board-room priority. These companies have now come to the realization that through their CISO they can become “Operationally Resilient.”
This interdisciplinary panel of experts from the fields of intelligence, critical infrastructure protection, and cybersecurity will discuss evolving technologies and ideas which will shape the future of homeland security. Join us for a look at a new era of smart cities, unmanned aircraft, and the globalization of the emerging threats.
Tony Miller • Critical Infrastructure Program Manager, San Diego Law Enforcement Coordination Center
Tiffany Vinson • Senior Homeland Security Coordinator, City of San Diego Officer of Homeland Security
Joe Oregon • Information Security Manager, San Diego Law Enforcement Coordination Center
Kathleen Rhodes • Intelligence Analyst, San Diego Law Enforcement Coordination Center
Last year National Geographic named San Diego a World Smart City. San Diego is projecting 49% population growth by 2050 and the City of San Diego has developed a Climate Action Plan that includes a goal of 100% renewable energy by 2035. As CIO for the City of San Diego, Jonathan Behnke will tell how San Diego has transformed into a Smart City and about the digital transformation of government services.
Jonathan Behnke serves as the Chief Information Officer for the City of San Diego. He has over 20 years of IT experience managing and implementing technology for a broad range of industries including public sector, contract services, oil, construction, automotive, distribution, consulting, and manufacturing. He also serves on the Board of Directors for SanGIS, a joint powers authority between the City and County of San Diego responsible for maintaining a regional GIS land base and data warehouse. In support of CA Governor’s Office of Emergency Services, he also serves on the California Cybersecurity Task Force.
No one thinks they need disaster recovery until they do. The fact is that most “disasters” and datacenter outages are not caused my hurricanes or severe weather. Random power outages, human errors and many other non-weather factors are the typical causes of service interruptions. Join us to see the results of a survey of IT professionals just like you and learn:
We will cover two use cases which outline gaps in their DR strategy and how you are able to overcome these gaps. Join us to learn more!
It’s 2016, but organizations still struggle to deliver consistent and predictable performance for their cloud and virtualized applications. Even with advances in flash technology, storage remains designed for physical, not virtual, workloads, and it shows with unpredictable performance, difficult troubleshooting and fragile scalability. Storage needs to be aligned to virtualization, but what is VM-Aware Storage besides a buzzword? We will investigate the five requirements of VM-Aware Storage, and which technologies enable those requirements.
Join us for an exploration into the mind of a hacker and how to stop them. We’ll cover best security practices from securing your wireless, what to address with your network users, addressing the APT kill chain, and more.
The emerging threat landscape is more dynamic than ever. Threat actors and the attack vectors they leverage are constantly evolving – leaving security professionals engulfed in the ongoing struggle to keep up. Adding to this challenge are the operational obstacles that security organizations face during remediation of security incidents – often times disparate point solutions fall short with integration and interoperability. Security leaders struggle to understand if the large number of different security controls, actually provide effective overall prevention.
In this talk, we will look at real-world use cases that outline how organizations can improve their security posture with a unified security architecture and effective operational processes that reduce point product sprawl, promote a methodology of immediate prevention, and bolster your organization’s ability to combat advanced threats.
In today’s world of security breaches that cost companies millions, understanding how incidents can occur gives insight into protecting the network and managing risk. With the number of incidents on the rise, it’s no longer an option to simply be content with mitigating a breach after the fact, you must also detect any breaches of security before they can cause damage and prevent further intrusions.
The Engineers at Fortinet will walk you through the life cycle of advanced threats, pointing out their common methods of avoiding detection. Additionally, you’ll be shown how a proper security framework gives you multiple options to detect and mitigate an attack before it has the opportunity to inflict damage; costing you time, money, and public confidence.
Nabbing criminals would be easy if they just wore orange jumpsuits in public…but they don’t. Stopping malware is no different. Despite this fact, the majority of enterprises rely on security controls that have one shot at accurately separating good traffic from bad. This approach not only creates a significant point of failure, but the average enterprise has massive blind spots due to their network architecture, corporate policies and misplaced trust.
|Bill Bonney||Principal Consulting Analyst||TechVision Research|
|Bill Higgs||Security and Privacy Consultant||SoCal Privacy|
|Blair Baker||Chief Information Officer||1903 solutions|
|Blake Zimmerman||Security and Compliance Officer||Encore Capital Group/ISACA|
|Bob Bermingham||Manager, Information Technology Operations||InnovaSystems International, LLC.|
|Brad Williams||Director of Information Technology||Petco|
|Brian Dahill||Vice President – SAP Practice||Alpha Sirius|
|Brian Kramer||Facility Chief Information Officer||US Department of Veterans Affairs|
|Chris Fuller||Director of Information Technology||Bumble Bee Seafoods|
|Clint Schmucker||Vice President, Information Technology||Realty Income|
|EJ Watson||Cloud Architect||San Diego State University|
|Evan Donaldson||Vice President, Programs||HDI|
|Evelyn Travnik||Senior Director, Information Services||Genomatica|
|Faith Thomas||Director of Business Development||PM Talent Global|
|Ford Winslow||Chief Business Officer||Centrex|
|Frank Bunton||VP, Chief Information Security Officer||MedImpact Healthcare Systems|
|Fred Del Rosario||Associate Director, Information Technology||Ignyta, Inc.|
|Gary Hayslip||Chief Information Security Officer||City of San Diego|
|Guillermo Perez||Director of Information Technology||UT San Diego|
|James Acerra||Chief Information Officer||Taranet Inc.|
|Jennifer Greulich||Senior Security and Compliance Analyst||Charlotte Russe|
|Jeromy Giacossa||Senior Director, Information Technology||Pico Holdings|
|Jonathon Behnke||Chief Information Officer||City of San Diego|
|Juanita Schoen||Program Manager||Tridea Partners|
|Karl Flores||Chief Technology Officer||Training Solutions|
|Leo Maduzia||Sr. VP, Chief IT Compliance Risk Officer||San Diego Community Credit Union|
|Lynne Ewing||Chief Information Officer||San Diego Convention Center|
|Matt Miller||Director||InfraGard national board of Directors|
|Mike Nevlida||Sr. Director, Global IT Infrastructure and Support Services||Callaway Golf|
|Pauline Mulvey||Vice President Enterprise Technology||Mitchell Inc.|
|Randy Krzyston||Director of Information Technology||Jazzercise|
|Raymond Kelly||Senior Director of Information Technology||The Retail Equation|
|Rick Beliotti||Director, Information Technology Services||San Diego County Airport Authority|
|Robert Kuhn||Manager, Information Technology||Retrophin, Inc. (RTRX)|
|Ryan Fay||Director, Information Technology & Purchasing||ACI Specialty Benefits|
|Scott Kennedy||Security Manager||Intuit|
|Shannon Moran||Senior Director, Project Management||Tillster, Inc.|
|Shrifa Baltinester||Director of Technology||San Diego Jewish Academy|
|Zane Allyn||Manager, Information Systems||Palm Springs Art Museum|
|Zubin Chandran||User Support Manager||Missouri Botanical Garden|
Interstate 8 East (El Centro)
Take 2nd Hotel Circle Exit and turn left going under the overpass.
Interstate 8 West (Beaches)
Exit Hotel Circle and turn right.
Interstate 5 North or South
Exit onto Interstate 8 East (El Centro) and exit 2nd Hotel Circle exit, turn left continuing under the overpass.
Interstate 805 North or South
Interstate 15 North or South & Hwy 163. Exit onto Interstate 8 West (Beaches), exit Hotel Circle and turn right.