As IT has evolved, our ability to see and understand what’s happening in our environments has lagged. In a world of virtualized infrastructure, hybrid datacenters, ephemeral microservices, our monitoring tools and techniques have failed to keep up. What worked in the past won’t work in the future. During this session, we’ll look at how monitoring is evolving to meet the needs of tomorrow’s application-focused enterprises, and how cloud-based machine learning will focus your energies and improve your datacenter, be it a closet with a rack or a warehouse with a raised floor.
When it comes to cybersecurity, the threat landscape is changing every day. From ransomware attacks to the security of the Internet of Things, there’s a lot to take in. Let our experts break it down for you. Join Kaspersky to learn about trends from the past year and predictions for the future of cybersecurity. This talk will give you a sharper focus on how to protect your business and how to plan for your future IT security needs.
In a world where cybercrime has become commoditized, and both large corporations and small businesses find themselves frequently beset by malware, being able to thread security devices together to assemble an overall picture of what’s transpiring on your network will reduce your attack surface and response times while elevating your overall security posture.
How secure is your network? Have you ever had your security tested? This talk focuses on defending against hackers, phishers, and other on-line miscreants leveraging many tools you already have.
This panel discussion will provide information on how to develop a security program with limited resources. Discussions will include the importance of using a security framework, performing an inventory and assessment, and educating the end user as the front-line defense. It will also include steps for implementation, a simple implementation plan, and resources available to assist with the program.
Advisory Council Members leading this discussion:
James Cox • Director of Information Technology, Tamarack Management, Inc.
Jason Schaller • Information Security Officer, Glacier Bank
Lynne Pizzini • Chief Information Security Officer, State of Montana
Brad Kowalski • Sr Director of Information Technology, Marcus Daly Memorial Hospital
How can we as technology leaders find new ways to work together to achieve our goals and objectives? During this presentation, we will unpack this topic and look at a number of different ways we can collectively work together across Montana to better ourselves and our organizations.
A mission driven executive known for leading complex business and technology initiatives in acute, ambulatory and ancillary settings including strategic planning, new service lines, major system selection and implementation, data center migrations and upgrades, IS consolidations, mergers, and closings. A high visibility results oriented collaborator during periods of growth and change.
Last year, over $80 billion was spent on cyber security (Gartner), yet two-thirds of organizations were still breached (Forrester). The reason? 81% of data breaches involved weak, default, or stolen passwords (Verizon). Current threats and today’s hybrid IT environment require changes to old security models. Learn how Identity Services defend your organization against the most common cyberattacks.
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true Disaster Recovery for the business. What types of disasters will impact the business? Learn about Disaster Recovery scenarios, and also the questions to ask and answer when planning your Disaster Recovery solution to drive true IT resilience. Learn which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
There are several factors to consider when building your infrastructure today. Perhaps most importantly is your level of resiliency: keeping it available when things don’t go as expected. Join this session from Veeam and Nimble to learn advanced technical skills on how to design a comprehensive availability infrastructure. Specific points in this session include Backup Strategies for Modern Data Centers, Deep Data Analytics concerning storage, and more.
Join Ivoxy Consulting for a look at Disaster Recovery planning. We will discuss concepts and common terms used in DR discussions, the questions you need to ask to create a successful DR strategy, and then take a look at an overview of a DR design for a web facing application and the back off infrastructure and applications that support it.
The presentation will cover advanced computer security threats and how to prevent compromise. We will discuss methods of infiltration, the players, and how to protect your company assets in today’s fast evolving cyber threat landscape.
This presentation will use recent project experience to describe a process through which communities, local government or educational institutions can evaluate the feasibility of building their own fiber network versus leasing lit or dark services.
The story begins with an old system, poor documentation and hard to recognize models with frequent down time, followed by a step up that was a significant improvement, but still not where we needed to be for density. Next, an upgrade to a new solution that took us from 109 access points in one building to 88 where we experienced significant gains in both density and coverage and a manageable guest network. Finally, recent firmware updates that isolate bonjour traffic when much of our environment is talking bonjour protocol.
Come and learn the fundamentals of Voice over IP telephony. We’ll cover the basic jargon, how different VoIP technologies work inside and outside the corporate firewall, how newer technologies can work in harmony with older technologies, and some “gotchas” to look out for before venturing into VoIP.
Server-centric security: get away from the DVR and get into total security coverage. Security camera systems have traditionally taken a Digital Video Recorder (DVR) appliance perspective. Older analog cameras use coaxial cable jammed directly into limited DVRs, forcing users to navigate multiple devices to see the whole picture. Learn how you can leverage your existing traditional security camera infrastructure while branching into newer, higher quality IP-based cameras, all while unifying your security console for one-stop shopping. See real-world demonstrations of advanced features like campus map overviews and mobile app viewing!
The real world is not flat after all, so why constrain our classrooms to experience the digital world on a flat screen? The shift from 2D to 3D immersive learning is as natural as the shift of adding color to movies and television in the 1950’s. In many ways, this addition is even more impactful. Virtual Reality is transforming education. What started out as something that was simply “cool” has become a way to engage learners like never before. Join Anna Hanson and Jodi Pritchett of ByteSpeed, as they walk you through the “how to’s” of bringing your classroom to the cutting edge of 21st century learning.
|Adrian Irish||Information Security Officer||University Of Montana|
|Andy Metroka||Director, Information Technology Architecture||MT State Fund|
|Brad Kowalski||Senior Director, Information Technology||Marcus Daly Memorial Hospital|
|Brett Weisz||Associate Chief Information Officer||Montana State University, Billings|
|Chris Hunt||Director, Information Technology||Madison County|
|Don Warner||Director, Information Technology||Miles Community College|
|Erika Billiet||Director, Information Technology||City of Kalispell|
|Greg Hess||Manager, Network Services||Montana State University|
|James Cox||Director, Information Technology||Tamarack Management, Inc.|
|Jason Emery||Director of Technology||Missoula County|
|Jason Murphine||Manager, Information Technology||Billings Clinic|
|Jason Schaller||Information Security Officer||Glacier Bank|
|Jeff Prather||Principal||Beartooth Data Solutions|
|Jerry Hall||Director of Information Technology||1st Liberty Federal Credit Union|
|Jerry Kozak||Manager, Information Technology||Montana Board of Crime Control|
|Jody Troupe||Bureau Chief||MT Department of Administration|
|Josh Pallister||Senior Security Specialist||MT State Fund|
|Lynne Pizzini||Chief Information Security Officer||State of Montana|
|Margaret Kauska||Chief Security Officer||Mt Department of Revenue|
|Mark Simon||Senior Vice President, System Chief Information Officer||Benefis|
|Michele OBrien||Director of Information Technology||Easter Seals|
|Mike Bousliman||Chief Information Officer||Montana DOT|
|Misty Denny||Chief Information Officer||Rocky Boy Health Board|
|Pat Weichel||Information Technology Director||Century Companies, Inc|
|Peter Martinson||Information Technology Services Director||Gallatin County|
|Rick Carl||Chief Information Officer||Pacific Steel and Recyclilng|
|Rico Patacini||Manager, Infrastructure||Town Pump, Inc.|
|Ron Baldwin||Chief Information Officer||State of Montana|
|Russ Hendrickson||Senior Information Systems Manager||Missoula County Public Schools|
|Seth Decker||Chief Information Officer||Bank of Bridger|
|Shane Kolwyck||Director, Information Technology||Torgerson’s LLC|
|Tom Yampradit||Manager, Information Technology Operations||First Interstate Bank|
Montana State University-Strand Union Building
751 West Grant Street
Bozeman, MT 59715
Bozeman, Montana is located on I-90. Two interstate exits will bring you to the MSU campus in Bozeman.
From the West
From the East
Parking is available Monday-Friday 6am-6pm in the pay lot at the corner of Seventh Ave and Grant Street for $8/day until 8pm. Additionally, $4 hang tags can be purchased at the University Police Department on the corner of Grant and Kagy, which allows visitor parking in any lot marked “S/B” or “E”.