The second wave of wireless networking gear based on the 802.11ac standard – collectively, “wave 2” – is the current cutting edge of Wi-Fi technology. Not only has the Wave 2 802.11ac transformed wireless LAN technology, it has increased significantly in performance. Due to market-trends pushing technology for higher speeds & efficiences, there are pathways to adopting this type of wireless network which are beneficiall. Come learn how this type of networking gear can help you.
When it comes to cybersecurity, the threat landscape is changing every day. From ransomware attacks to the security of the Internet of Things, there’s a lot to take in. Let our experts break it down for you. Join Kaspersky to learn about trends from the past year and predictions for the future of cybersecurity. This talk will give you a sharper focus on how to protect your business and how to plan for your future IT security needs.
Join us for an exploration into the mind of a hacker and how to stop them. We’ll cover best security practices from securing your wireless, what to address with your network users, addressing the APT kill chain, and more.
Public, private and most recently hybrid cloud services have proven to have long term staying power by reducing capital costs, accelerating time to market, improving scalability and enhancing security. Organizations are now wanting to become more strategic about which services are optimized for which business systems and processes. Learn what Hybrid IT really means and why organizations are in the process of adopting this transformative strategy.
With new breaches reported nearly every day, IT professionals have an increasing list of security challenges to deal with. Join us for a session designed by the INTERFACE-Spokane Advisory Council. This panel will cover topics around security training in the disciplines of identity management, secure software development, and cyber threat intelligence sharing and usage.
Moderated By: Karen Thurston • Cybersecurity Training and Operations Center, University of Idaho
Paul Carugati • CISO, Ecova
Michael Meline • President, Community Security Coalition
Steve Sims • Senior Principal Security Consultant, 3D Technology Group
Dan Wordell • Information Security Manager, Kochava
Gerard Johansen • Information Security Consultant, Intrinium
The cyber threat landscape continues to shift, and adversary tactics are increasingly dynamic. Detective and preventative technologies evolve with newly discovered attacked but always one step behind. True Operational Security (OpSec) is strongest using layered defenses the most of important of which is education. Do not underestimate the value that end users can contribute to the prevention model. Continual user awareness of modern cyber-attacks will prove to be the greatest weapon to mitigate enterprise security risk. This keynote will present the modern threat landscape focused on social engineering, review real world examples of common cyber-attacks and how next generation skills are necessary to defend corporate and personal assets in the digital world.
Paul Carugati is a seasoned IT and Information Security leader with over 15 years’ experience across multiple commercial industries. He currently serves as Director of Information Security (CISO) at Ecova, Inc. where he leads their global security program focusing on business enablement, threat intelligence, risk and incident management, and protection awareness. He is an in-demand speaker who holds many accreditations and industry certifications showcasing his technical and business prowess. Paul and his family recently located to the Inland Northwest and look forward to growing the technical and security educational landscape within the region.
The cost and consequences of downtime and lost data pose a significant challenge to ensuring business continuity and the availability of applications and data. Join us for a discussion on how to deliver Availability for the Always-On Enterprise through integration with your storage provider. This discussion will detail how an Availability Suite takes advantage of this integration and how your organization can leverage this to perform frequent crash-consistent and application-consistent storage snapshots. As well as replicate to a secondary array for lower a lower RPO, meet strict RTO’s by performing granular recoveries from snapshots on both primary and secondary arrays, and finally how backups from storage snapshots will significantly reduce the impact from data protection activities on production workloads.
Managing storage continues to be complex, and often expensive. Something needs to change and it certainly won’t be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, tightly coupled with NFS/SMB, enables organizations to seamlessly grow from a few TBs to PBs with inline deduplication, compression, and a global namespace. Whether you’re looking for primary storage or a disk-based backup target, in this session we’ll show you how a next generation object storage solution seamlessly grows capacity, availability, and performance with zero-configuration.
In the Idea Economy – where everything is digital and everyone is connected – anyone can change the world. Every organization, no matter the size or location, can be a disruptive force in any industry if it sees itself as a digital business and leverages powerful new tools to improve network agility, expedite application deployment, and lower TCO. Enter Software Defined Networking – the ability to apply business logic to network behavior in a dynamic fashion. With industry experts predicting SDN adoption and deployment rates of up to 60 percent in the Service Provider industry and up to 23 percent among commercial businesses in 2016 alone, this is a technology worth understanding. Join our presentation for a discussion of the history and future of SDN, and see why this technology is coming soon to a network near you.
Be Prepared! The scout motto. Yet when facing one of the greatest dangers a business can face, many organizations are woefully unprepared. In this conversation, Sephen Heath and Gerard Johansen will take you on a tour of what modern incident response looks like and will help you be prepared for an inevitable security incident.
No one thinks they need disaster recovery until they do. The fact is that most “disasters” and datacenter outages are not caused my hurricanes or severe weather. Random power outages, human errors and many other non-weather factors are the typical causes of service interruptions. Join us to see the results of a survey of IT professionals just like you and learn:
We will cover two use cases which outline gaps in their DR strategy and how you are able to overcome these gaps. Join us to learn more!
This session will show attendees how flash technology in the datacenter is transforming applications, performance, and the financial impacts of this revolution. This presentation will demonstrate the impact that legacy storage platforms have on your applications, and how the next generation of all flash arrays address the shortcomings of disk technologies. We will also attempt to dispel some of the myths that make customers hesitant to seek out all-flash alternatives to traditional storage arrays.
The world of Identity Management is dangerously fragmented and needlessly complex. Don’t settle for half a solution when you need full protection for both end users and privileged users. Secure enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. Protect against the leading point of attack used in data breaches compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.
In this session, we will discuss a platform approach to securing enterprise identities and:
Innovation Matters. Without innovation IT is stuck in the 80/20 rule. IT can’t keep up with data demands, data protection and data mobility. Innovation is important to IT as we try to help reduce costs and manage data.
It’s 2016, but many organizations still struggle to deliver consistent and predictable performance for their cloud and virtualized applications. Even with advances in flash technology, conventional storage remains designed for physical, not virtual, workloads—and it causes unpredictable performance, difficult troubleshooting and fragile scalability. Storage should be aligned to virtualization, but is VM-aware storage just a buzzword?
Attend this session to understand true VM-aware Storage (VAS) that alleviates the conventional storage burdens. Storage Architect, Storage Administrator, and Storage Performance Analyst roles are intelligently built into the solution by design. Also included are Enterprise core features of Snapshots, Replication, Cloning, and Flash Performance that are a must for any tier 1 storage solution. Join us to learn more!
As our technological capabilities continue to expand exponentially, so too does our ability to simplify, unify, commoditize, and even reinvent these technologies. Converged infrastructure has given way to the creation of the hyper-converged Datacenter. Cloud computing has laid the evolutionary foundation for the hyper-cloud. When will this madness stop, and when will it be safe to jump on board the hype-train? Join us as we dive into your IT design best-practices for today—efficient, scalable, adaptable for the future, and cheaper than the past.
Please join us as we take a foray into the world of flash storage arrays. We will examine the options out there currently and what the future holds. Also, we’ll how you can gather requirements and evaluate the offerings, so that you can pick the solution that fits your unique needs.
Nearly every major security breach starts with an insider, or an attacker using an insider’s credentials.
2015 was a banner year for insider threats. It’s estimated that the average organization suffered from 3.8 insider attacks last year and 45% of businesses can’t tell if they’ve suffered a breach.
In order to combat the insider threat, organizations need to shift their focus from the perimeter to their data itself. They need to secure their data from the inside out.
Join us for a live presentation where you’ll learn our 3-phase Inside-Out approach for preventing insider threats.
|Alan MacPhee||Director of Information Technology||Hecla Mining|
|Alan Nelson||Director of Operations||August Systems|
|Andrew Rausch||Chief Information Officer||Lydig Construction|
|Bill Levine||Information Technology Enterprise Systems Director||PAML|
|Carol Demuth||Database Administrator||Spokane Regional Health District|
|Chad Goodhue||Director, Information Technology Services||Pend Oreille County, WA|
|Cody Down||Director, Information Services||Pacific Northwest University of Health Science|
|Dan Brown||Systems and Security Administrator||Washington State University|
|Derek Southerly||Director, Information Technology||AMX|
|Don Humphrey||Associate Instructor, Information Technology||Columbia Basin College|
|Doug Tapken||Chair, School for Information Technology||ITT Technical Institute|
|Duane Swizer||Senior Vice President/IT Client Services||Banner Bank|
|Eric Scott||Manager, Information Technology||City of Lewiston|
|Frank Larson||Manager, Information Technology||Allied Fire and Security|
|Gary Mallon||Manager, Technology Industry||Greater Spokane inc.|
|Greg Francis||Manager, Information Technology||ALSC Architects|
|Jason Minton||Manager, Information Security||Washington State University, Spokane|
|Jeff Jones||Security Engineer, Information Technology||Avista Corporation|
|Jerry Hindberg||Associate Director, Network Support Services||Lewis-Clark State College|
|Jesse Flowers||Information Systems Director||City of Moscow|
|Joe Sams||Manager, Information Systems||Teck Resources Unlimited|
|Joe Sparks||Network Administrator||KELLYBRADY|
|Kitt Zimmerman||Senior Vice President, Chief Information Officer||Wheatland Bank|
|Larry Greiner||Vice President, Information Technology||United Health Services Credit Union|
|Laurel Caldwell||Information Technology Director||Latah County, ID|
|Mark Curtis||Director, Information Technology||Stevens Country|
|Melanie Ellingson||Director, Information Technology||Empire Airlines|
|Michael Dutcher||Manager, Information Technology||Columbia Basin Hospital|
|Michael Meline||Director, Data Security||Kootnai Health|
|Michael Norton||Manager, Information Systems||Spokane Teachers Credit Union|
|Michael Williams||Information Technology/Information Services Project Manager||Avista Corporation|
|Nathaniel Cook||Manager, Information Technology||Mountain Gear|
|Ruth Walters||Past President||Greater Spokane ISSA|
|Ryan Wilson||Manager, Information Technology||Spokane Public Facilities Dist.|
|Sandy Mangis||Finance Manager, Information Technology Supervisor||Cheyney Federal Credit Union|
|Shane Fuller||System and Network Operations||Community Colleges of Spokane|
|Sterling Lipscomb||Director of Channel Development||Nuvodia|
|Steve Shumski||Director, Information Technology||Newport School District|
|Thomas Ingle||Systems and Network Operations Manager||Community Colleges of Spokane|
|Troy Smith||Director, Information Technology||Iheartmedia|
Spokane Convention Center
334 W Spokane Falls Blvd
Spokane, WA 99201
From I-90 take Division Street (Newport/Colville) Exit 281. Off ramp turns into northbound Division Street Continue north to Spokane Falls Boulevard, turn left onto Spokane Falls Boulevard. Just after the next light, turn right onto Spokane Falls Court. The parking garage is under the Exhibit Halls.
Integra Telecom Ballroom 100BC
From North Division (Highway 2 & Highway 395)
Continue southbound on Division Street (Highway 2/395) to Spokane Falls Boulevard, turn right onto Spokane Falls Boulevard. Just after the next light, turn right onto Spokane Falls Court. The parking garage is under the Exhibit Halls.
There are a variety of choices for parking around the INB Performing Arts Center and the Spokane Convention Center. The most convenient option is our covered parking garage, situated below the Exhibit Halls. Entrance to this lot is located on West Spokane Falls Boulevard and is the same lot used for the DoubleTree Hotel.
For more information visit: http://www.spokanecenter.com/directions.php