2018 Abstracts
Share |
2018 TAGITM Annual Conference Web Banner graphic
CIO/Leadership Track IT Management Track Technical Track Featured Track

Wednesday - April 25, 2018 ~ 10:00 am - 11:00 am


IT Strategic Planning and the Cybersecurity Capability Maturity Model (C2M2): Taking your Cybersecurity From Ad Hoc to Optimized

Breakout Session - CIO/Leadership Track - San Gabriel Room

Education Track Sponsored by: SoftwareONE

Ben Roper - Senior Government Consultant, BerryDunn
Rick Gamache - Senior Government Consultant, BerryDunn

Purpose

Attendees will learn the benefits of including the C2M2 in their strategic technology planning efforts, as well as how to implement the model in their organizations.

Abstract

Many IT leaders are engaged in IT Strategic Planning, but in today’s challenging security environment, it can be difficult to incorporate security into your strategic plan while creating realistic expectations and a sound resource plan for cybersecurity. The C2M2 is a scalable model that is continuously improving cybersecurity programs for the organizations that have adopted it. We will walk you through some familiar, real-world scenarios around cybersecurity, as well as some examples of how the C2M2 has been used to advance cybersecurity in the public sector. You will learn why this framework, which is easy to understand and implement, should have a place in every CIO’s toolbox.

Speaker Bios

Ben Roper, a Senior Consultant in BerryDunn’s Local Government Practice Area, has more than 25 years of service in the public sector, including 10 years as the IT director for the City of College Station, Texas. His clients benefit from his unique mix of hands-on experience, best practice guidance, and understanding of technology trends. Ben was an Affiliate Member of TAGITM while working at the City of College Station from 2005 to 2017. He served on the Website Committee (now the Communications Committee) for four years, including two years as Committee Chair. He has also served as TAGITM Secretary/Treasurer, Vice President, and President (2015-2016). Ben is a Certified Government Chief Information Officer (CGCIO).

Rick Gamache, a Senior Consultant in BerryDunn’s IT Security Practice, is an accomplished leader and mentor with 14 years of information systems security and cyber-threat intelligence experience. As the cofounder of a successful cyber-threat intelligence company, which he took from start-up to $4 million in annual sales in three years, he has managed all aspects of the production and publication of actionable strategic and tactical threat intelligence reports for a network of global security teams. He now leads BerryDunn’s local and state government clients in improving their cybersecurity position through risk assessments, strategic planning, policy development, and sound program management. Rick is a Certified Information Systems Security Professional (CISSP).

 

What a Cooperative Disaster!

Breakout Session - IT Management Track - San Miguel Room

Education Track Sponsored by: Cima Solutions

Greg Elliott - IT Master Architect, Collin County
Chris Edwards - Enterprise Architect, City of Plano

Purpose

The purpose of the presentation is to highlight the working relationship between Collin County and the City of Plano with respect to a county disaster recovery site. The goal is highlight how two local entities are able to leverage excess capacity to meet IT needs while adding value to the taxpayer and reduce expenditure of tax dollars.

Abstract

Through a cooperative effort, Collin County and the City of Plano have been able to re-purpose unused space to provide a county disaster recovery location. Using space within the City of Plano data center, the county and the city built a new data center pod to house county DR equipment. The data center pod, funded by the county, provides DR space a much lower cost to the county taxpayers than was estimated to rehabilitate an existing county facility. The site provides much needed geographic separation for county backup and recovery systems while being close enough to the main county data center that we can run active/active workloads, if desired. Through this presentation, we will highlight how local entities can assist one another to achieve significant cost savings for the taxpayer and assist one another to provide for continuity of government.

Speaker Bios

Greg Elliott, MBA, CGCIO, PMP, ITIL is the Collin County Information Technology Architect and oversees a cross-matrixed team of technologists within the county. The team serves to set architecture standards, assess technical requirements of incoming projects, and plan for capacity needs. Mr. Elliott also manages the technology maintenance budget and is responsible for ensuring licensing requirements are accurate.

Chris Edwards, CISSP is an Enterprise Architect and Security Manager for the City of Plano. Chris works closely with the City’s technology services leadership team to deliver solutions that result in meaningful ROI impact for the organization. The solutions must meet stringent security requirements while supporting end user goals and objectives. With extensive experience in the military and government sectors, his work includes information technology business development, organizational and departmental visioning, and cutting-edge information technology deployment, design, and implementation. Chris holds multiple certifications and has overseen significant infrastructure development and migration projects for complex entities. Outside of the office, Chris is an active volunteer with My Possibilities, a continuing education center for adults with intellectual and developmental disabilities where he provides IT consulting services, and the Information Technology Disaster Resource Center, an organization of IT professionals that provide no cost communication and technology solutions to survivors and responders in crisis.

 

Powered Fiber Cable System - How can I run POE to a security camera up to a mile away from the Data Closet?

Breakout Session - Technical Track - San Augustine Room

Education Track Sponsored by: Bomgar

Kevin Paschal - Field Application Engineer, CommScope

Purpose

To educate the IT directors on new technology available to enable them to run Wifi access points, security cameras POE over a mile away from the closet. Saving time, money and a solution to secure their campuses.

Abstract

Powering WIFI access Points and Security camera's across campuses - where distances up to a mile is now -easy, simple and affordable

The Powered Fiber Cable System improves speed and simplifies installation, powering, and communication of network devices – at 30x the distance of traditional CAT cable systems!

Deployment of HD cameras, Wi-Fi access points, optical network terminals, small cells, and other network-access devices can be challenging, especially in outdoor environments. Many of these devices accept a PoE input for power and communications, but distance limitations, power availability, and device placement throw a wrench in network planning.

In these scenarios, the power must be run to the desired location before installing, but who pays for that power and how will it be monitored? The answer involves back and forth with utility companies and building owners, adding time, hassle, cost and headaches to the process. With CommScope’s Powered Fiber Cable System there’s a better way - a complete “rack to device” solution for powering and communicating with network devices.

The Powered Fiber Cable System:

  • Reduces the need for landlord and utility negotiations
  • Eliminates local power sources
  • Greatly speeds up planning by eliminating DC electrical calculations for voltage/power drop over varying distances
  • Handles up to 64 devices simultaneously from one power supply
  • Contains carrier grade electrical protection
  • Is NEC Class II and SELV compliant
  • Allows for placing devices exactly where they are needed to maximize coverage

The Powered Fiber Cable System is comprised of two main components featuring a hybrid cable and a PoE Extender in addition to cable/fiber management, power transmission management, safety and overload protection as well as a universal power supply (PSU).

Powered Fiber Optic Cable - Single hybrid copper/fiber cable design for simplified cable field access.

Designed for “easy peel” cable access – the cable can be accessed much faster than traditional hybrid cables No special tools needed – one ordinary wire strip tool accesses both the optical fiber and conductor elements Utilizes globally existing, proven and inexpensive FTTH style flat cable hardware

PoE Extender – Solves power and communication challenges with three levels of electrical protection.
  • Termination for hybrid cable input
  • Environmentally sealed closure – IP67
  • Circuit protection electronics
  • Electrical power management
  • Media conversion
  • 1 or 2 PoE+ outputs

Speaker Bio

Kevin Paschal is a Principal Field Application Engineer for CommScope, Inc. He is responsible for providing technical direction, training, and support to the Connectivity Solutions sales teams, Business Partners, and end users for the SYSTIMAX SCS, Uniprise and NETCONNECT families of copper and fiber cabling systems.

Kevin received a Bachelor of Science degree in Mechanical Engineering from North Carolina State University. He has more than 25 years of experience with data and telecommunications solutions, including proficiencies in product management, research & development, engineering, and manufacturing. He holds 5 patents relating to fiber optic cable design.

Kevin can be reached at kpaschal@commscope.com

 

Threat Intelligence, Layered Security, and CIS Controls

Breakout Session - Featured Track - Security - San Juan Room

Education Track Sponsored by: Kofax

Ted Gruenloh - COO, Sentinel IPS
Scott Smith - CISO, City of Bryan, Texas

Purpose

Educate IT departments on the value of threat intelligence for network security, demonstrate how threat intelligence and layered security fit in to the CIS Controls model, and share free resources they can use to protect their networks.

Abstract

The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach based on the CIS Controls model, and demonstrate how Threat Intelligence integrates with existing security methodologies. We also use real-world (free!) examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.

Speaker Bios

Ted Gruenloh has worked with web and network security technologies for more than 15 years. He began his career in technology as a full-stack engineer in web development and design. As Chief Operating Officer, Ted guides the overall development of Sentinel IPS, the CINS Active Threat Intelligence System, and all other supporting technologies. One of Sentinel’s first employees, Ted is not afraid to get his hands dirty supporting Sentinel customers or lending a hand in Sentinel software development.

Scott Smith is the Chief Information Security officer for the City of Bryan responsible for cyber security as well as compliance for the NERC CIP, PCI DSS, and CJIS standards requirements. Prior to this position, Mr. Smith spent the previous 11 years as the Manager of IT Operations for Bryan Texas Utilities overseeing the utilities infrastructure, security and compliance programs. Scott is a member of Infragard and ISSA and holds active CISSP and ITIL Foundations certifications.

Scott is a graduate of Texas A&M University where he was a student-athlete playing on the 1993 Southwest Conference Champion and College World Series baseball team.

 

CIO/Leadership Track IT Management Track Technical Track Featured Track

Wednesday - April 25, 2018 ~ 1:30 pm - 2:30 pm


Innovation - The hard work of making the magic happen

Breakout Session - CIO/Leadership Track - San Gabriel Room

Education Track Sponsored by: SoftwareONE

Sascha Ohler - Vice President of Research and Development, CivicPlus

Purpose

Introduce the concepts of lower case i and upper case I Innovation to CIOs/Leaders and present ways to introduce innovation into our teams and organizations as a way of "doing business".

Abstract

Innovation - it's what every organization strives for, every leader yearns for and most of us struggle with. Why is that? This session will explain the differences between lower case i and upper case I innovation and how to foster and harness both to transform our organizations and start embracing innovation, not as some magic potion, but as a way of turning hard work and strategic thinking into extraordinary outcomes.

Speaker Bio

Sascha Ohler serves as the VP of Research & Development for CivicPlus, a organization serving 2,800 local government clients across North America and Australia. He is a 15+ year enterprise software industry veteran with a knack for creating and fostering highly creative and innovative teams and bit of a strategy geek.

 

Planning for Ransomware

Breakout Session - IT Management Track - San Miguel Room

Education Track Sponsored by: Cima Solutions

Gloria Anduaga - Client Executive, Peak UpTime
Mark Jordan - Chief Technology Officer, Unitrends

Purpose

Provide attendees with approaches for dealing with Ransomware attacks.

Abstract

Not IF but WHEN you get hit with Ransomware- How to Plan for Ransomware –Defeat Ransomware 5 Ways: Protect, Secure, Test, Detect and Recover. Deal with the problem head on. If you suffer an attack, you want to be sure your backup solution can easily roll-back to minutes before the corruption occurred. This allows you to avoid paying the ransom, as well as restore to a point-in-time before the ransomware infected your system, ensuring the malware cannot be triggered again.

Speaker Bio

Gloria Anduaga - coming soon.

Mark Jordan is CTO at Unitrends. He leads the presales engineering team, supports strategic sales opportunities with account teams, promotes partner engagement, follows industry trends and direction to shape product priorities, and evangelizes Unitrends solutions and roadmaps. Mark joined Unitrends in 2002 and has spent over 25 years in the information technology industry. Follow Mark on Twitter @MarkCJordan.

 

Microwave technology is heating up in Allen

Breakout Session - Technical Track - San Augustine Room

Education Track Sponsored by: Bomgar

Eric Matthews - Director of Information Technology, City of Allen

Purpose

Present a case study of a microwave network design and implementation in 2017/18.

Abstract

Microwave wireless networks enable flexibility, can be much lower in cost than fiber, can improve resiliency and can serve as a platform for smart city initiatives. Come hear how and why the City of Allen created a wireless ring connected to existing fiber and interconnected its facilities. From the RFP process to decision factors, cost comparisons, lessons learned, implementation and final results, this discussion will provide a good background on how a microwave network could fit into your organization's network.

Speaker Bio

Eric Matthews is the IT Director for the City of Allen. Having spent more than 20 years in the IT field in both the public and private sector, Eric looks for simpler, more effective solutions to the increasingly complex world of technology for the organization. Eric has developed applications for local government, taught programming and cybersecurity classes, written articles on collaborative technology, and consulted for companies in a variety of industries across the country. Eric holds a Masters in Public Affairs from UT Dallas and a Bachelors in Psychology from the University of Texas at Austin. Eric lives with his wife and three children in Allen.

 

Security Culture

Breakout Session - Featured Track - Security - San Juan Room

Education Track Sponsored by: Kofax

Wolfgang Goerlich - Vice President, Strategic Security Programs

Abstract

People performing contentiously and consistently is a lofty goal. Information Risk Management gives us the process to follow. Controls frameworks gives us the standards to set and meet. Yet it is the people who ultimately decide our security posture. In this presentation, we will introduce culture frameworks. Culture frameworks provide a means to accelerate building a cyber security program. For programs that are maturing, culture provides a means to communicate and drive behaviors. To illustrate this point, case studies will be shared that illustrate the challenges and successes of applying culture management. Let’s get street smart about cyber security.

Speaker Bio

J Wolfgang Goerlich supports information security initiatives for clients in the healthcare, education, financial services, and energy verticals. In his current role with CBI, a cyber security consultancy, Wolfgang is the vice president for security programs. Wolfgang also leads the Academy teams, providing mentoring and guidance to the junior-level talent. He is an active part of the security community. He hosts a popular YouTube video series and the Encode/Decode Security Podcast. Wolfgang regularly advises on and presents on the topics of risk management, incident response, business continuity, secure development life cycles, and more.

 

CIO/Leadership Track IT Management Track Technical Track Featured Track

Thursday - April 26, 2018 ~ 9:45 am - 10:45 am


How to Lead Technology Change in Government Agencies

Breakout Session - CIO/Leadership Track - San Gabriel Room

Education Track Sponsored by: SoftwareONE

Philip Jones - Manager, Change Management, Access Sciences

Purpose

To teach technology leaders how to adapt Change Management practices to the unique challenges of change in government agencies.

Abstract

Change Management is often overlooked in technology implementations, but it has the power to swing a project from failure to success. Even with the very real benefits of change management, leading change in governmental agencies is often met with unique challenges. In order help agencies get the most return on their investment in technology and systems, government technologists need a common sense framework for change that is responsive to these challenges.

In this session, you will learn that the speed of change does not need to be slow, that finding the right lever for devising small interventions can bring rapid adoption, and how you can quickly predict support and resistance in stakeholders. These tools allow you to make sense of the many options for leading change so you can find the right solution -- without becoming overwhelmed.

Speaker Bio

Philip Jones is a Manager in the Change Management Consulting practice of Access Sciences. He specializes in business process optimization using technology and in leading change initiatives driven by that technology. He has completed several large projects in Government Agencies where change management was a primary concern. Where possible, he tries to integrate his knowledge of change and user adoption with his projects. He has been with Access Sciences for eight years and has presented at various conferences such as the Association of Records Managers and Administrators (ARMA) Houston Conference, APQC's Knowledge Management Conference, and a Texas DIR conference.

 

Big City Tech with Small City Constraints

Breakout Session - IT Management Track - San Miguel Room

Education Track Sponsored by: Cima Solutions

Gary Clopton - Information Technology Manager, City of Bedford
Rob Cooper - Account Executive II, CDW-G

Purpose

Demonstrates a multi tiered approach to achieve advanced technology goal including vendor incentive and financing, real stakeholder ownership and thorough technology vetting

Abstract

When Gary Clopton took over as IT Manager at City of Bedford, he inherited an infrastructure environment that consisted of Big Box retail equipment and consumer grade hardware. Bedford is a highly representative example of cities and counties throughout Texas in that technology had always been relegated as a utility akin to facilities and there exists resistance to advancement due to small town attitudes and in some cases, outright technological ignorance. The ad hoc and patchwork infrastructure served its purpose but as Gary assessed his situation, he realized the City of Bedford had grown beyond small town status. He needed to approach this with an Enterprise attitude.

The challenge Gary faced is familiar to all small and mid-sized government agency IT shops: departmental turf wars, small and limited budgets and misconceptions or unrealistic attitudes about technology by elected officials and departmental managers i.e., the Council member whose brother in law has a small business plumbing service who utilizes a 3rd tier hosting service or the tax department manager who thinks all the wizardry from Minority Report is available now.

Gary was at a critical point with regards to his Voice infrastructure while also needing to address some forward-thinking initiatives like VDI, SharePoint and Office 365. He also knew that he would be challenged every step of the way- by attitudes, by financial constraints and in some cases, just plain antipathy towards technology. So, working with a resourceful partner, Gary devised a strategy that pulled in non-technology stakeholders, quashed or quieted hostile attitudes and took advantage of financial programs to overcome to the hurdles and put in flight or in place network, voice, collaboration and application technology that is on par with his larger peers in the Metroplex.

Speaker Bio

Gary Clopton has been the IT Manager at the City of Bedford for the past three years. Prior to his role as IT Manager, Gary served as a lead IT technician within the City of Bedford organization. Gary joined the City of Bedford in 2001. He holds a Masters in Library and Information Science from the University of North Texas and his first role at the City of Bedford was that of Systems Administrator for the Bedford Public Library. In his free time, Gary enjoys reading History and spending time with his family.

Rob Cooper had been the Account Executive covering cities and counties for CDW-G since 2006. In that period he has worked with many North Texas government agencies on a variety of technology challenges and solutions. Rob and CDW-G have been very active with TAGITM since 2006. Prior to joining CDW-G, Rob held several roles in the data center and network power industry.

 

Leveraging Microsoft’s Exchange Online Protection, Unified DLP, and Advanced Threat Protection to help secure your Office365 Environment

Breakout Session - Technical Track- San Augustine Room

Education Track Sponsored by: Bomgar

Jim Daniels - Application and Identity Manage, Williamson County

Purpose

Learn how to strengthen your Office365 Tenant’s email, OneDrive, and SharePoint data protection. We’ll look at out of the box Exchange Online controls, Office Message Encryption, Unified DLP, and implementing Advanced Threat Protection. Session includes planning, scenarios, examples, and licensing information.

Abstract

Learn how to strengthen your Office365 Tenant’s email, OneDrive, and SharePoint data protection. We’ll look at out of the box Exchange Online controls, Office Message Encryption, Unified DLP, and implementing Advanced Threat Protection. Session includes planning, scenarios, examples, and licensing information.

Out of the Box Exchange Online Features

  • Spam and Quarantine
  • Office Message Encryption
  • Creative Transport Rule Uses
Advanced Threat Protection
  • Overview
  • Safe Attachments
  • Safe Links
Unified DLP
  • Overview
  • Policy composition
  • Triggers and Actions
  • Extending to OneDrive, SharePoint
Reporting Options
Scenarios and Examples
Licensing information with SHI
Questions

Speaker Bio

Jim Daniels is currently the Office 365 Architect and Active Directory/Identity Manager for Williamson County. He is active in the Office 365 community, particularly in the government tenant, Exchange Online, management, governance, and collaborative areas. Jim is a recent graduate of the TAGITM CGCIO program and holds MCSA and MCSE certifications from Microsoft in Office365 and Infrastructure.

In his spare time, he can be found enjoying the many Texas parks, breweries, and BBQ spots with family and friends.

 

The Enemy Within: Detecting and Mitigating Insider Threats

Breakout Session - Featured Track - Security- San Juan Room

Education Track Sponsored by: Kofax

Sonya Wilcox - Sales Engineer, Varonis

Purpose

  1. Understand that ransomware has the potential to reach beyond the endpoint and compromise data on your networked storage.
  2. Learn lessons from some of the most interesting and under-the-radar insider threats we've discovered in the field.
  3. Take home a well-defined, concrete action plan for defending against ransomware and insider threats.

Abstract

Ransomware is both scourge and savior. While it’s not typically considered an insider threat, it acts from the inside, using insider identities, encrypting files that insiders have access to on endpoints and file shares. Learn how organizations are using ransomware to identify and confront vulnerabilities that expose them to rogue employees, abusive administrators, and hackers.

Speaker Bio

Sonya Wilcox brings over 15 years of IT industry experience to Varonis, a company specializing in Data Governance and User Behavior Analytics. As a Systems Engineer for Varonis’s public sector in the TOLA region, she works closely with organizations to understand the value of digital assets and the importance of data classification as part of an overall data security profile. Sonya’s past experience includes architecting and implementing secure, redundant messaging and Active Directory systems for large enterprises. Sonya will share commonsense insight into how organizations identify and solve the often overlooked challenges related to risk associated with manual process used to enforce data classification, user authentication, permissions access & authorization, and accountability controls.

 

CIO/Leadership Track IT Management Track Technical Track Featured Track

Thursday - April 26, 2018 ~ 2:00 pm - 3:00 pm


Fort Worth: Technology Transformation

Breakout Session - CIO/Leadership Track - San Gabriel Room

Education Track Sponsored by: SoftwareONE

Kevin Gunn - Director of IT Solutions, City of Fort Worth
Thomas Ortiz - Partner, ISG Public Sector

Purpose

Describe City of Fort Worth's transformation journey from legacy systems and processes to leading in the use of technology in local governement.

Abstract

Given the level of application support incorporated into the processes of today’s enterprise, transforming that enterprise most often involves concurrent changes to applications, infrastructure, and IT operations. This combination brings complexity, and that in turn, takes leadership, communication, and time. The City of Fort Worth Information Technology Solutions (ITS) department has been on the transformation path in all three areas and has achieved significant quantitative and qualitative results. More importantly, the demonstrated success has allowed the City to move into Cloud-based solutions and extend its core ERP system through Robotics Process Automation. In this session, the City of Fort Worth will share its transformation story, the steps involved, and lessons learned in adopting tools and deployment models associated with the new digital environment.

Speaker Bio

Kevin Gunn is currently the Chief Technology Officer and Director of IT Solutions for the City of Fort Worth since 2014 and is responsible for overseeing the operation of technology resources, developing technology initiatives, developing procedures for the appropriate use of technology and ensuring systems reliability and financial performance. Previously, Gunn was director of information technology in Denton from 2008-2014 and Killeen from 2004-2008. Gunn earned a bachelor’s degree in computer science from Texas A&M University and a master of business administration degree from Tarleton State University. He also completed the Basic Qualifications Course at the U.S. Navy Supply Officer School in Athens, Ga.

Thomas Ortiz - Bio coming soon.

 

Real World Exchange - Office 365

Breakout Session - IT Management Track - San Miguel Room

Education Track Sponsored by: Cima Solutions

Tom Holmes - Manager, Cloud Solutions, Tangent

Purpose

Discussing the transition government entities are making from on-premises Exchange deployments to Exchange Online. 

Abstract

Tangent will co-present with Microsoft and discuss the transition government entities are making from on-premises Exchange deployments to Exchange Online.  We will articulate, through real world case studies, the common mistakes and known issues organizations make in planning and deployment  as well as give some helpful ‘tips’ on how to increase user adoption.   

We will also discuss some ancillary products that complement the greater Office 365 suite including (but not limited to):  

  • Skype for Business
  • Office
  • Delve
  • Teams
  • SharePoint
  • Flow
  • OneDrive
 
Furthermore, we will highlight business usage cases for Azure and how government entities are beginning to deploy more workloads into the cloud.  

This presentation will be given by individuals who have spent their career in the public sector and can address items surrounding:   
  • Compliance
  • Cost
  • Licensing Requirements

Speaker Bio

Tom Holmes heads the Cloud Solutions department at Tangent. Tangent provides Microsoft Certified services to help Government organizations move their applications, storage, and infrastructure to the Cloud, leveraging Azure.  By extending infrastructure and/or datacenter to the cloud, organizations can leverage Microsoft’s hyper scale datacenters to scale whenever and wherever needed; increase reliability and uptime with Azure’s 99.9% Financially Backed Uptime Guarantee, and use subscription billing for easy budgeting.

Tangent also offers the Office 365 portfolio for quick and seamless deployment, and provides training and support for the world's leading productivity and collaboration tools from Microsoft.   

Tom has over 10 years of experience working directly with Government customers to help identify their technology requirements. He conducts Governmental Lunch & Learns on Microsoft Cloud Solutions and his presentations at government & education technology events are well received.

 

Mobile – Your most vulnerable attack vector

Breakout Session - Technical Track- San Augustine Room

Education Track Sponsored by: Bomgar

Chris Boykin - CTO, Future Com

Purpose

Explore the Mobile Threats and how to protect from them

Abstract

As mobile devices, like smartphones and tablets, continue to proliferate the enterprise, the demand for securing these devices becomes more critical than ever. The increased attack surface to organizations, due to mobile, has made them the #1 attack vector for malware.

This presentation will discuss the dangers inherent in a Mobile Workforce and how to protect your devices and your people. We'll cover the three main threats to mobile: Network Attacks, Infected Apps, and OS Exploits... and how to prevent them.

Speaker Bio

Chris Boykin joined Future Com in 2010 via its acquisition of the Houston based company he founded in 2002, Got Net Security. Chris has been in the IT industry for over 20 years in various roles, including network and security consulting and different levels of management. Starting his career as an electronics technician, he eventually worked his way into networking, where he obtained the coveted CCIE certification. He later helped develop Cisco training courses to prepare individuals to work on the Cisco TAC help desk. He has spent the last 14 years focusing on IT Security, where he has led teams of highly skilled consultants to provide solutions to enterprises and small-to-medium businesses. Chris is currently the Chief Technology Officer for Future Com, and regularly speaks and sits on expert panels at industry conventions and trade shows.

 

Never Pay the Ransom

Breakout Session - Featured Track - Security- San Juan Room

Education Track Sponsored by: Kofax

Kevin Fuller - CTO, ThinkGard

Purpose

This is an educational presentation on the latest threats from ransomware, some real-world examples and techniques for protection.

Abstract

Kevin Fuller, the CTO and Co-founder of ThinkGard, presents a thorough educational presentation on the current threats presented by RansomWare including in-depth information about infection paths, prevention, recovery and real-world examples along with the fallout from these sometime devastating events. The presentation specifically speaks to the needs of local and county government agencies including: 24/7 nature of operations, CJIC Compliance and long term data retention.

Speaker Bio

Kevin Fuller is the CTO and Co-Founder of ThinkGard, a Disaster Recovery and Business Continuity company based in Birmingham, AL. He has over 15 year of IT experience in widely varied client demographics. He holds both a BS and MBA from the University of Alabama at Birmingham. He's spent the past 10 years working specifically with a number of cities and counties all over the southeast to provide exceptional DR/BC services that are geared directly to government needs.

 

Thank You 2018 Annual Conference Diamond & Platinum Sponsors

TAGITM is professionally managed by CMP Management.

Association Management Software Powered by YourMembership  ::  Legal