It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
Even if we focus on the nuanced sophistication of external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply insufficient to combat new and evolving attacks; no human cyber analyst can watch or react quickly enough. In order to avoid full-blown crises, a new fundamental approach to cyber defense is imperative in order to detect and investigate preexisting threats inside the network.
Self-learning systems represent a critical step-change in automated cyber defense. Organizations around the world rely on these systems, which can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s “patterns of life.” Hence, such security systems can spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
When it comes to cybersecurity, the threat landscape is changing every day. From ransomware attacks to the security of the Internet of Things, there’s a lot to take in. Let our experts break it down for you. Join Kaspersky to learn about trends from the past year and predictions for the future of cybersecurity. This talk will give you a sharper focus on how to protect your business and how to plan for your future IT security needs.
With the growth of IoT and Cloud, the attack surface that enterprises must protect is expanding dramatically. Unique regulatory requirements by industry vertical are also placing extra pressure on Security Officers and their teams. How can CISOs effectively respond? First and foremost, taking an architectural approach, one that includes network segmentation, will create the best chance of solving Enterprise security holistically and for the long term. Key capabilities must include visibility of all security elements and the communications these systems and devices generate and, even more importantly, automation of operations and response. With the current cybersecurity skills gap that many enterprises experience today, the ability to quickly and effectively audit, recommend and automatically fix the entire network security architecture is critical.
The Cyber San Diego panel discussion will provide both cyber, and non-cyber leaders with information on the public, academic, and non-profit resources in the San Diego region. This distinguished panel will discuss topics including the cyber economy, perspectives on cyber executive education, law enforcement, and resources for online public safety.
Matthew E. Miller • Private Sector Program Manager, San Diego Law Enforcement Coordination Center
Rusty Sailors • President / CTO at LP3 | Director, Board of Directors, InfraGard San Diego
Jodi Waterhouse • MHA, University of San Diego | Director, Business and Community Engagement
Joe Oregon • Information Security Program Manager, San Diego Law Enforcement Coordination Center
Gary Hayslip • VP & Chief Information Security Officer, Webroot Inc.
A myriad of research illustrates enhanced business outcomes such as increased sales revenue, more customers, greater market share and greater relative profits when women and other underrepresented groups hold substantial and innovative leadership positions in tech. And yet, companies continue to miss out on highly qualified candidates, vital contributions and increased productivity and profit, as the numbers in tech’s diversity percentages plummet. Come listen to this diverse panel of women share their narratives about what it’s like to be a woman in tech and what advice they have for those considering career options. Each panelist will explain how she has navigated the discourse and tech paths as women in the field. The discussion will highlight the adversities and obstacles they’ve encountered over the years, but will also speak to their positive experiences of female advocacy and especially meaningful and impactful exchanges and support from male colleagues.
This panel and forum is a unique and necessary opportunity to ask questions and learn promising practices for addressing the barriers to women’s participation in tech, along with ways to support your organization’s efforts toward change and multifold advancement.
Donna Hale • VP of Technology, Evans Hotel
Amy Benton • Senior Director of IT, Retrophin, Inc.
Pauline Mulvey • VP of Enterprise Technology, Mitchell, Inc.
Shifra Baltinester • Director of Technology, San Diego Jewish Academy
Chief Marketing Officers spend more on technology than most of their peers in the C-suite, including the CTO. In most cases, the CMO has been trained to focus more on brand and creative than on the technology that enables today’s marketing strategies. However, marketers now need to either build the acumen or partner with the technologists who can help them be successful in marketing in an increasingly complex, technology-first world. Perhaps more importantly, technologists need to be a proactive and effective partner to enable marketing or they risk straining the company’s lifeblood: Sales.
We will talk about the explosion of marketing technology and how technologists can either play a supporting role or, if they’re bold, take the lead.
With nearly 20 years of digital marketing experience, Reid Carr has built Red Door Interactive, a full-service marketing and advertising agency with hubs in San Diego, Denver and Orange County, to change how marketing firms service brands that are fighting for market share. He has built a fiercely independent agency over the last 15 years that has been awarded for both fast growth and effective culture by Advertising Age, Inc Magazine and San Diego Business Journal, to name a few. His emphasis on informed storytelling begins at the heart of the brand, is shaped by data, and then told through integrated and interactive marketing campaigns. Reid has become a leader beyond the marketing and advertising industry as a finalist for Entrepreneur of the Year from E&Y, Most Admired CEO by the San Diego Business Journal, as well as through his philanthropic efforts for the United Way, Rotary and Voice of San Diego. He is a frequent speaker and contributes regularly to various media outlets.
We will present the keys to implementing a successful DR plan that goes well beyond backing up your data.
The data storage market is going through tectonic shifts these days. Flash is being used to accelerate applications and IT leaders are moving from project based purchasing to building private clouds to concurrently hosting a multitude of applications. Join this session and learn how to take advantage of these changes; hear how IT leaders at a national credit union are consolidating workloads to increase IT agility while conserving budgets.
Virtualization, the cloud, and the promise of containers have evolved the data center, bringing better application delivery and cost reduction. With these benefits come new risks that include increased East/West traffic and the potential for new cyber threats. Adaptive micro-segmentation is transforming and improving security inside the data center and clouds while speeding up app delivery.
As corporations are moving to infrastructure service providers, line of business applications are also moving to the hosted cloud. The traffic patterns for today’s corporations are changing. Gone are the days of a central data center with a hub and spoke designed WAN with one Internet connection.
Today, the traffic patterns are different and the demands are higher for reliable efficient Internet services. In addition, the volume of Internet traffic is growing exponentially and the size of Internet connections required for organizations to compete in this economy are growing at an increasing rate. The goal is to provide reliable services to the user at an affordable price to the organization. One of the keys to this solution is a new technology called software defined wide area network. Come learn how this technology is helping to define the new corporate topography and help control Internet traffic.
Today’s rapid pace of technological innovation is forcing digital and physical worlds to collide – and it’s also transforming the way organizations operate in every industry. This digital transformation can either make or break your business. Because, in the digital world, customers expect 24.7.365 Availability. No longer do businesses need to think in hours or days – they can think in minutes or seconds instead – for all applications, data, and workloads.
In this presentation we will learn how to create a powerful data protection solution for all types of customer environments by combining high-performance storage with integrated data protection to meet the “Always-On Enterprise” SLAs.
|Amy Benton||Senior Director of IT||Retrophin, Inc. (RTRX)|
|Blair Baker||Chief Information Officer||1903 solutions|
|Brad Williams||Director of Information Technology||Petco|
|Brian Kramer||Facility Chief Information Officer||US Dept of Veterans Affairs|
|Chris Fuller||Director of Information Technology||Bumble Bee Seafoods|
|Donna Hale||Vice President, Technology||Evans Hotels|
|EJ Watson||Cloud Architect||San Diego State University|
|Evan Donaldson||Vice President, Programs||HDI|
|Frank Bunton||Vice President, Chief Information Security Officer||MedImpact Healthcare|
|Fred Del Rosario||Associate Director, Information Technology||Ignyta, Inc.|
|Guillermo Perez||Director of Information Technology||San Diego Union Tribune|
|Jamie Valdez||Vice President, Information Technology||Buffini and Company|
|Jared Sanerson||Director, Programs Chair||AITP|
|Jeromy Giacossa||Director, Information Technology||Accriva Diagnostics|
|John Vickery||Director, Information Services||Chula Vista Electric Co.|
|Jonathan Behnke||Chief Information Officer||City of San Diego|
|Leon Noteware||Senior Manager, Information Security||Dexcom|
|Lynne Ewing||Chief Information Officer||San Diego Convention Center|
|Matt Miller||Director, InfraGard national board of Directors||InfraGard|
|Mike Nevlida||Senior Director, Global IT Infrastructure and Support Services||Callaway Golf|
|Parul Shroff-Shah||President||IIBA San Diego Chapter|
|Pauline Mulvey||Vice President Enterprise Technology||Mitchell Inc.|
|Peter Skibitzki||Director of Information Technology & Communications||Placer County Office of Education|
|Randy Krzyston||Director of Information Technology||Jazzercise|
|Raymond Kelly||Senior Director of Information Technology||The Retail Equation|
|Ricardo Fitipaldi||Security Analyst||San Diego State University|
|Rick Beliotti||Director, Innovation and Small Business Development||San Diego International Airport|
|Robert Kuhn||Manager, Information Technology||Retrophin, Inc. (RTRX)|
|Rusty Sailors||Board Member||InfraGard|
|Ryan Bates||Manager, Information Technology||Accriva Diagnostics|
|Scott Kennedy||Security Manager||Intuit|
|Shifra Baltinester||Director of Technology||San Diego Jewish Academy|
Town and Country Resort
500 Hotel Circle North
San Diego, CA 92108
Interstate 8 East (El Centro)
Take 2nd Hotel Circle Exit and turn left going under the overpass.
Interstate 8 West (Beaches)
Exit Hotel Circle and turn right.
Interstate 5 North or South
Exit onto Interstate 8 East (El Centro) and exit 2nd Hotel Circle exit, turn left continuing under the overpass.
Interstate 805 North or South
Interstate 15 North or South & Hwy 163. Exit onto Interstate 8 West (Beaches), exit Hotel Circle and turn right.