The world of Identity Management is dangerously fragmented and needlessly complex. Don’t settle for half a solution when you need full protection for both end users and privileged users. Secure enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. Protect against the leading point of attack used in data breaches compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.
In this session, we will discuss a platform approach to securing enterprise identities and:
In the Idea Economy – where everything is digital and everyone is connected – anyone can change the world. Every organization, no matter the size or location, can be a disruptive force in any industry if it sees itself as a digital business and leverages powerful new tools to improve network agility, expedite application deployment, and lower TCO. Enter Software Defined Networking – the ability to apply business logic to network behavior in a dynamic fashion. With industry experts predicting SDN adoption and deployment rates of up to 60 percent in the Service Provider industry and up to 23 percent among commercial businesses in 2016 alone, this is a technology worth understanding. Join our presentation for a discussion of the history and future of SDN, and see why this technology is coming soon to a network near you.
Cyber-attacks were once mainly the concern of governments, large corporations and other highly visible networks. Not anymore. The financial rewards generated from the theft of credit card information and other sensitive data gave rise to a new breed of malware, the polymorphic threat, and with it, the amount of malware has skyrocketed.
Most of today’s malware is polymorphic and highly adept at changing its identity to evade standard, signature-based security platforms. Alone, these platforms will not recognize many of these threats. Advanced persistent threats, or APTs, increase the threat level by employing sophisticated evasion capabilities to get payloads past a network’s defenses where they persist, undetected. APTs are targeted to an organization or a specific technology and often leverage zero day vulnerabilities – flaws for which no patch is available and no signature has been written. Any organization can become a victim.
If security awareness today is considered the best return on investment when talking about security, then why is it not used or emphasized as much? The overwhelming majority of security issues come from human error, and these issues can be mitigated. This discussion will focus on creating a solid plan of security awareness for all users on your networks. We will also explore the factors that prevent this necessary training. Join us, for this interactive panel discussion from the TechJunction Advisory Council.
Jason Schaller • Information Security Officer, Glacier Bank
Margaret Kauska • Chief Security Officer, Montana Department of Revenue
Brad Kowalski • Sr Director of Information Technology, Marcus Daly Memorial Hospital
Jason Emery • Director of Technology, Missoula County
This session will show attendees how flash technology in the datacenter is transforming applications, performance, and the financial impacts of this revolution. This presentation will demonstrate the impact that legacy storage platforms have on your applications, and how the next generation of all flash arrays address the shortcomings of disk technologies. We will also attempt to dispel some of the myths that make customers hesitant to seek out all-flash alternatives to traditional storage arrays.
The State of Montana is continually addressing challenges and opportunities for information technology. Under Governor Steve Bullock’s leadership, transparency is just one area where the State of Montana has made strides in bringing data to the people. With the creation of the State’s transparency portal, data portal and the business portal, citizens can access the power of data in government.
As we continue to invest in information technology that keeps pace with our global digital world, we must also invest in security to protect the data we are entrusted with safeguarding. Citizen data must be secured against the ever increasing number of sophisticated cyber threats. Addressing cybersecurity is a national and state priority that requires a high level of collaboration and coordination. Governor Bullock has met this challenge head on by issuing an executive order in 2015 to form the Montana Information Security Advisory Council. This keynote will present how it is our job to assimilate government into the digital age.
Ron Baldwin was appointed Montana’s State Chief Information Officer in January 2013. Prior to this position, Ron served four years as the CIO for Montana’s Department of Public Health and Human Services. He has spent over 30 years implementing information technology solutions for government and private industry. Ron holds degrees in Computer Science and in Biology/Chemistry. In addition, he is a certified Project Management Professional (PMP) and is an adjunct professor at a local college.
Every business today relies on applications to support business critical processes, and these applications, in turn, rely on rapid and timely access to data from the underlying infrastructure. When something in the infrastructure layer slows down the applications, it can negatively impact business outcomes – better known as the App-Data gap. This presentation will discuss the infrastructure complexities that drive the App-Data gap and how, through Predictive Analytics and a Unified Flash Fabric, organizations can understand the data derived from applications, compute, networking, storage, converged infrastructure themselves and turn it into meaningful action.
How would you know if your organization had been breached? What would you do? Do you need to call the police? Do you notify your customers? Who makes those decisions? Preparing your organization for the inevitable begins with planning. Responding to incidents requires a multi-disciplinary approach that spans the organization and provides clear authorization for dealing with the incident. The objective of this talk is to provide attendees with a survey of the topics that have to be addressed to adequately respond to incidents.
No one thinks they need disaster recovery until they do. The fact is that most “disasters” and datacenter outages are not caused my hurricanes or severe weather. Random power outages, human errors and many other non-weather factors are the typical causes of service interruptions. Join us to see the results of a survey of IT professionals just like you and learn:
We will cover two use cases which outline gaps in their DR strategy and how you are able to overcome these gaps. Join us to learn more!
It’s 2016, but organizations still struggle to deliver consistent and predictable performance for their cloud and virtualized applications. Even with advances in flash technology, storage remains designed for physical, not virtual, workloads, and it shows with unpredictable performance, difficult troubleshooting and fragile scalability. Storage needs to be aligned to virtualization, but what is VM-Aware Storage besides a buzzword? We will investigate the five requirements of VM-Aware Storage, and which technologies enable those requirements.
As your organization implements more and more digital channels for customer service, how do you keep up with ensuring your contact center is aligned, integrated, and in sync with your organization’s digital strategy?
Protecting your organization’s data is more important now than ever. As compute resources and data become more distributed between on-premises and the cloud, new threat vectors are introduced and the same security measures need to be implemented to protect, backup, archive and restore your data. Users continue to “accidentally” delete their data and hackers continue to perform malicious act. We will discuss powerful, yet easy to manage solutions for protecting both your on-premises and hosted SaaS/IaaS infrastructures.
The Google Apps for Business and Education control panel includes many features to assist technologists to deploy a touch once, manage remotely suite of tools including word processors, spreadsheets and slides, email and much more that benefit both the Education and private sector enterprise environment. If you have a Google Apps for Education or Business account, bring a device and explore the admin panel.
Learn how to leverage various tools to keep data safe, block inappropriate content, create solid backups, build email archives, protect against threats and block SPAM. See examples to help you build a safe and productive network. Gain resources to find the direction you need for each piece of this puzzle. And see how one organization manages all these tools on a daily basis.
We’ll show you how your company can enjoy reliable and secure WiFi with an easy-to-deploy onboarding solution that you can trust to keep your users and staff on-line and stress-free. A one time authentication with a certificate based solution that requires no passwords, makes it easy and secure and allows you to always know who is on your network.
The Cloud is a tool that can be utilized by many different business models, and can be implemented in many different forms. From private cloud to public cloud, and the hybrid cloud in between, different business benefits can be gained by creating a clear plan, choosing the right tools, and implementing the right technologies to leverage the benefits that technology now offers. We’ll review the current and upcoming trends in cloud enablement, how they are used to improve business, and review some of the tools available to get the most benefit from a cloud enabled environment.
|Adrian Irish||Information Security Officer||University Of Montana|
|Art Pembroke||Director, Information Technology & Services||City of Helena|
|Bill McCullough||Director of Information Services||EBMS|
|Brad Kowalski||Senior Director, Information Technology||Marcus Daly Memorial Hospital|
|Brett Schneider||Information Technology Director||St. John’s Lutheran Ministries|
|Brett Weisz||Associate Chief Information Officer||Montana State University|
|Carolyn Bacon||Manager, Information Systems||Barrett Hospital|
|Don Warner||Director, Information Technology||Miles Community College|
|Jason Emery||Director of Technology||Missoula County|
|Jason Rippeon||Systems Architect||Billings Clinic|
|Jason Schaller||Information Security Officer||Glacier Bank|
|Jeff Prather||Principal||Beartooth Data Solutions|
|Jerry Kozak||Manager, Information Technology||Montana Board of Crime Control|
|Josh Winterrowd||Manager, Information Technology||Montana PBS|
|Kevin Guenthner||Chief Information Officer||First Interstate Bank|
|Kyle Brucker||Director of Technology||Billings Schols|
|Lynne Pizzini||Chief Information Security Officer||State of Montana|
|Margaret Kauska||Chief Security Officer||Mt Department of Revenue|
|Michael Barber||Chief Information Officer||Montana State University/Billings|
|Mike Bousliman||Chief Information Officer||Montana DOT|
|Pat Weichel||Information Technology Director||Century Companies, Inc|
|Peter Martinson||Information Technology Services Director||Gallatin County|
|Ric Kesling||Information Technology Director||Lincoln County Montana|
|Rich Shattuck||Security Analyst||Hoplite Industries|
|Rico Patacini||Manager, Infrastructure||Town Pump, Inc.|
|Ron Baldwin||Chief Information Officer||State of Montana|
|Shane Kolwyck||Director, Information Technology||Torgerson’s LLC|
|Tom Yampradit||Manager, Information Technology Operations||First Interstate Bank|
Montana State University
Strand Union Building, Ballroom A-D
South 7th Ave and West Grant St.
Bozeman, MT 59715
Bozeman, Montana is located on I-90. Two interstate exits will bring you to the MSU campus in Bozeman.
From the West
From the East
Please stop by our Parking Information Kiosk (watch for signs directing you to it on South 7th Avenue) for parking information and a campus map. Please park in the Paid Visitor Parking Lot.