In a world where cybercrime has become commoditized, and both large corporations and small businesses find themselves frequently beset by malware, being able to thread security devices together to assemble an overall picture of what’s transpiring on your network will reduce your attack surface and response times while elevating your overall security posture.
Your screen freezes and a dialogue box pops up to tell you that your computer is locked and your files will all be gone forever if you don’t pay up. Since many victims are willing to pay the ransom, this type of cryptomalware is on the rise, netting millions of dollars for cybercriminals looking for a substantial return on their minimal investment.
During this session you will hear from Kaspersky Lab on what they as a security vendor are seeing in this growing area of focus for both security vendors and cybercriminals. Areas of focus will include:
Will shifting to the Cloud improve or weaken your organization’s security posture? Do you know the right questions to ask of all of your Cloud partners to make that determination? Information security is hard enough when assets are within your physical control, but how do you ensure compliance when you are working through one or more service providers, each with their own published (and unpublished) practices? In this session, Nextrio will provide a roadmap to guide your Cloud planning and a framework for measuring your initial and ongoing assessment of continuous compliance.
The panel will provide various perspectives, answer questions and share experiences in many of the issues faced when developing a security plan. Raising awareness of important first step to consider when developing a plan and how to gain the necessary knowledge to start.
Education is one of the important components of security, as end users present the biggest risk to the company. Discussions will be around types of education, budgeting and convincing stake holders that money needs to be spent in this area.
Building Layered protection is the Security Key as companies cannot rely on just one solution to protect the network and data. Discussion around reaching decisions on where to start layering, hardware or software solutions to consider and budget
Changing the stake holders preconceived notions on ROI when it comes to allocating spending dollars on IT. Explaining Mitigation of Risk- outlining “what’s at risk” and justification of expenses. And removing the Myth: IT is not a money maker but rather a money consumer.
Panel Moderated by: Michael Connor • Information Security Manager, Vantage West Credit Union
Chuck Boyer • Director of IT – Town of Oro Valley
Kevin Dignum • Network Administrato, Radiology Associates
Sean Thomas • Director of Technology, BeachFleischman PC
Organizations of all sizes, and across all industries, are turning to information security frameworks for best practices and direction for improving their security program. Security framework adoption helps organizations understand, communicate, and manage risk, and it provides crucial guidance for reinforcing security controls while maintaining a focus on both business objectives and privacy considerations.
Today’s Cyber Landscape, Who is Who at the Federal Level regarding Cyber activities, some examples of the changing risk, and some things folks can do to take action.
Bio: Linda R. Medler is the Chief Information Security Officer at Raytheon Missile Systems. Raytheon Company (NYSE: RTN), with 2016 sales of $24 billion and 63,000 employees worldwide, is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. Raytheon is headquartered in Waltham, Massachusetts.
In her current role, Medler is responsible for fostering business relationships and integrating information security technologies and best practices to achieve strategic business goals. She originally joined Raytheon in June 2015 as the director of Cyber for the RMS Advanced Missile Systems product line in Tucson, Arizona. In this role, she was responsible for synchronizing, testing and incorporating cyber initiatives and capability development across RMS products lines in accordance with Office of the Secretary of Defense guidance and directives.
Before joining Raytheon, Medler was president and CEO of LA Medler and Associates, LLC, providing cyber strategy consulting services to commercial clients and numerous Department of Defense customers and academic institutions. In 2014, she retired from the U.S. Air Force as a brigadier general and as director of Capability and Resource Integration for the United States Cyber Command. In this role, she orchestrated the development of the current DoD Cyber Mission Force strategy and resourcing plan. Medler’s previous assignments included director of Communications and Networks for the Joint Staff, Joint Chiefs of Staff deputy CIO, chief of staff for Air Force Materiel Command, Secretary of Defense corporate fellow, and presidential communications officer at the White House Communications Agency. She commanded at the squadron, group and wing level, and deployed to Afghanistan to lead more than 100 coalition personnel responsible for fielding the Afghan National Army. In 2005, she commanded the 97th Air Expeditionary Group to provide humanitarian relief operations in the wake of Hurricane Katrina.
Medler currently sits on the National Board of Operation Homefront, a national philanthropic organization assisting wounded warriors and their families. She is a member of the Arizona Secretary of State’s Technology, Transparency and Commerce Council and a special advisor to the Arizona Cyber Threat Response Alliance. She is a board member of the United Way of Tucson and Southern Arizona, a member of the National Board of Advisors for the Eller College of Management at the University of Arizona, and a member of the Board of the Arizona State University Research Enterprise. She holds a bachelor’s degree in business management and management information systems from the University of Arkansas at Little Rock. She has also earned master degrees in business administration and management information systems from the University of Arizona, and in national strategic studies from the Naval War College.
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true Disaster Recovery for the business. What types of disasters will impact the business? Learn about Disaster Recovery scenarios, and also the questions to ask and answer when planning your Disaster Recovery solution to drive true IT resilience. Learn which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Today’s rapid pace of technological innovation is forcing digital and physical worlds to collide – and it’s also transforming the way organizations operate in every industry. This digital transformation can either make or break your business. Because, in the digital world, customers expect 24.7.365 Availability. No longer do businesses need to think in hours or days – they can think in minutes or seconds instead – for all applications, data, and workloads.
In this presentation we will learn how to create a powerful data protection solution for all types of customer environments by combining high-performance storage with integrated data protection to meet the “Always-On Enterprise” SLAs.
The presentation will cover the evolution of backup and Disaster Recovery space and how recovery automation and cloud based DR is changing the way companies protect their critical systems (data, OS and applications). With a unified BDR solution, you can quickly bring critical systems back on line locally or remotely for a few servers or your entire critical server environment with just a couple clicks.
If Ransomware is a topic of concern, most companies have security systems in place to catch and prevent the latest Ransomware from causing havoc. But what happens when Ransomware is ahead of your own security controls? Ransomware is difficult to prevent…but there are ways to quickly recover after its caused havoc. In the case of a Ransomware incident, there are solution available that will allow you to ignore any ransom demands from ever being considered and get the affected server/s back on line in minutes. Finally, there will be a brief demo to highlight the core functionality of an automated BDR solution and the process for critical system failover.
Geographically distributed enterprises are embracing SD-WAN at an accelerating pace. As applications continue to move to the cloud, networking professionals are quickly realizing that traditional WANs were never architected for a dynamic, internet-based environment and recognize that backhauling traffic from the branch to headquarters doesn’t make sense. Furthermore, end users often find their business apps run faster over their home Internet service, or even on their mobile device.
Protecting your organization’s data is more important now than ever. As compute resources and data move to the private and public clouds, new threat vectors are introduced. As compute resources and data become more distributed between on-premises and the cloud, the same security measures need to be implemented to protect, backup, archive and restore your data. Users continue to “accidentally” delete their data and hackers continue to perform malicious act. We will discuss powerful, yet easy to manage solutions for protecting both your on-premises and hosted SaaS/IaaS infrastructures.
The data storage market is going through tectonic shifts these days. Flash is being used to accelerate applications and IT leaders are moving from project based purchasing to building private clouds to concurrently hosting a multitude of applications. Join this session to learn how to take advantage of these changes and hear how IT leaders at a national credit union are consolidating workloads to increase IT agility while conserving budgets.
|Aaron Johnson||Vice President of Information Technology||Tucson Federal Credit Union|
|Albert Magallanez||Director of Technology||Continental ESD #39|
|Alex Liebeskind||Owner||On Top of IT|
|Britt Adams||Director, Information Technology||Technology Solutions|
|Chris Bierman||Computer Applications Analyst||Eastern Arizona College|
|Christopher Lovatt||Information Technology Infrastructure Manager||Tohono O’Odham Gaming Enterprise|
|Chuck Boyer||Director, Information Technology||Town of Oro Valley|
|Dan Hunt||Information Security Officer||Pima County IT|
|Doug McLemore||Supervisory Information Technology Specialists||US Department of Health and Human Services|
|Frank Grimmelmann||President, Chief Executive Officer||ACTRA/ACTIC|
|Howell Herring||Deputy Director, Information Technology||City of Tucson|
|Jason Carlson||Information Technology Operations Manager||University of Arizona Foundation|
|Jeff Auerbach||Chief Executive Officer||EMR Group|
|Jeffery Mayger||Director of Information Technology||Unimin a division of Sibelco Group|
|Keith Stocks||Chief Information Security Officer||Blue Cross Blue Shield of Arizona|
|Kevin Dignum||Network Engineer||Radiology Associates|
|Leo Haugel||President||Sonoran Desert Security Users Group|
|Michael Conn0r||Information Security Manager||Vantage West Credit Union|
|Michael Keeling||Partner Attorney||Keeling Law Offices, PC|
|Raj Murthy||Chief Information Officer||Pima Community College|
|Sean Smith||Director, Network Operations||Simpleview Inc.|
|Sean Thomas||Director, Technology||BeachFleischman PC|
|Steve Waibel||Director, Information Technology||Brake Masters|
|Thomas Wolfe||Chief Information Officer||Easter Seals Blake Foundation|
Tucson Convention Center
260 S Church Ave
Tucson, AZ 85701
The Tucson Modern Streetcar
The 3.9-mile modern streetcar route will connect major activity centers: The University of Arizona, University of Arizona Medical Center, University Main Gate Business District, 4th Avenue Business District, Congress Avenue Shopping and Entertainment District and the Mercado District.
From Interstate 10
Exit at the Congress/Broadway exit.
Travel East on Broadway approximately 1.5 miles.
Turn right on Church Ave.
The Tucson Convention Center Parking Lot A is located on the right side of the street before you reach Cushing St.
From East Tucson
Travel west on Broadway.
As you approach downtown stay in the left-hand lane and merge onto Congress St.
Travel West on Congress approximately 1.5 miles.
Turn left on Church Ave.
Proceed south, crossing Broadway Blvd.
The Tucson Convention Center Parking Lot A is located on the right side of the street before you reach Cushing St.