2015 Abstracts
Share |
 
Strategic Track Tactical Track General Track Solution Showcase
WEDNESDAY - April 22
 10:00 AM - 11:00 AM
The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach
Ted Gruenloh - Director of Operations, Sentinel Intrusion Prevention Systems

The term 'Threat Intelligence' is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we will attempt to answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies, improving a network's defenses at the perimeter and gaining more visibility on the inside.

We will discuss:
  • Recent changes in the current network security landscape, including the evolution of the network perimeter, malware attack vectors, asset mobility, and BYOD
  • An inventory of modern layered security, including SIEMs, IPS and IDS devices, proxies, endpoint solutions, vulnerability scanning/testing, and sandbox devices
  • The various definitions of Threat Intelligence, the real meaning behind those definitions, and why Threat Intelligence is important
  • How threat intelligence and layered security work together, and a discussion on the difference between 'actionable' and ''active' threat intelligence
  • A brief introduction to publically shared threat intelligence, and how to take advantage of it
Hack Proofing Your Organization
Gary Bates - Director of Information Services, City of Harker Heights

The presentation would be a comprehensive overview of the best practices in ensuring the security and safety of your enterprise networks.  The overview will take a layer security approach in explaining how a small to medium size organization can layer security methods to achieve the best possible security configuration to protect their network.  Additionally, the presentation will provide detailed look at available resources that administrators should use to ensure their systems are protected.  Finally, it will cover some of the more prevalent hacking techniques that an administrator could use to ensure the most obvious holes in their network armor is secure.   

Resources that will be discussed include governmental resources repository such as MS-ISAC, the Center for Internet Security, and NIST.  Additionally, important information from critical private companies will be included in this section, along with training information for users and books and guides for administrators.


Don't Be Afraid of the Big Bad Wolf
Shannon Brown - Vice President, Central; Government Sourcing Solutions


All too often, Procurement and IT view each other as adversaries. Procurement is that department that always says “no”. IT is that department with the crazy ideas than never follows the rules. This presentation will show what can happen when the two organizations stop saying always and never and decide to work together. Topics of discussion will include:

  • Brief overview of the procurement laws in Texas
  • The cooperative purchasing model and available contracts in Texas
  • How to bring Procurement into the IT planning process
  • What’s on the mind of your Purchasing Agent
  • Success stories
 12:30 PM – 1:15 PM 
Adapting to Evolving Security Threats
Mazhar Islam - Field Solution Architect-Security, CDWG

Traditionally firewalls have been deployed to protect the network edge from intrusions. These solutions have served their purpose in the past however the evolution of threats and malicious code requires a proactive approach. Next generation firewalls and intrusion prevention devices inspect traffic at application layer providing greater threat response capabilities. The number of mobile devices is growing at a rapid pace and controlling what these devices access on the network is a challenge IT staff across every industry. Access control and Mobile device management solutions are becoming an integral part of the network infrastructure to network access and prevent unauthorized devices from attaching to the network. CDW has proven methodology and expertise in designing access control and mobile security solutions.  

 

Cloud Adoption Strategies in State and Local Government: Enabling the Future City, State and County
Alexander Corley - Solution Architect, Amazon Web Services


For state and local government agencies, the cloud offers not only cost savings and agility, but the opportunity to optimize citizen services, accelerate economic development and innovation and enable "the always-up, always-on" infrastructure necessary to support critical missions. National and local governments are coping with the dual challenges of constrained budgets and human resources along with strict information security regimes. Many agencies and organizations are attracted to web services rather than on premises hardware, both for the cost benefits and for agility they offer. This session provides an overview of the use cases ranging from offloading simple websites to running parallel test environments to migrating major enterprise production applications to the cloud’s all of them balancing security and compliance with economy and access.  Customer examples featuring state, local and county governments will highlight the significant transformative impact of cloud architectures. Learn the practical strategies being deployed by governments to break down innovation barriers and tackle mission critical operations with the cloud.  AWS will moderate a "fireside chat" with 2-3 customers representing state and local governments.  We will provide customer names and bios in the coming weeks.

 1:30 PM – 2:30 PM
Seeing The Future…Working With A Strategic Technology Master Plan
Ernest Pages - Partner, Sciens Consulting

In the face of budgetary pressure, IT Departments have to not only keep the lights on but also help the City advance technologically. The Departments that IT supports are under pressure to provide Amazon-like services to citizens, and they want IT to make it happen. At the same time, IT Departments themselves are under immense pressure to be more responsive, customer-centric and visionary…without substantially changing headcount. How can IT make this happen?  

Presenters will examine the pressures being brought to bear on local government IT departments, explore ideas on how to address these challenges. Specifically, presenters will discuss the use of IT strategic planning as a mechanism for setting the technology direction of the organization, relieving pressures from an overburdened IT Department so they can become a catalyst for change, and establishing a win-win relationship between IT and its customer Departments. Industry trends will be discussed and their effect on these challenges, both positive and negative. Participation from the audience in identifying challenges and solutions will be encouraged.

 

Williamson County and Bomgar Demonstrate Secure Remote Support

Barrett Elkins - RSM, Bomgar Remote Support
Richard Semple -  Director-Public Safety, GIS, Service Desk; Williamson County


Bomgar's secure remote support technology addresses all of these subjects, and more. These are only a few of the reasons Williamson County and many other state and local IT entities have adopted Bomgar. The solution enables technicians to get connected to end users regardless of operating system, and regardless of whether the end user is on or off the network.

CJIS compliance is being encouraged and enforced, with a renewed focus on how devices, personnel, and information is accessed and supported. Bomgar is the only FIPS 140-2 validated remote support solution available. This means Bomgar can broker the connection to a LEO, or network access for a vendor such as a CAD provider, eliminating the need to manage VPN Service Accounts. Additionally, Bomgar captures an extensive text-based and video recording audit trail from the time a remote support session is established, to the time the connection is terminated.

Partnered with Richard Semple from Williamson County, Bomgar will demonstrate the security and productivity achievable with remote support, which ultimately leads to dramatically improved end user satisfaction.

 

Virtual Desktops 101: Best Practices for Success
Jason Patrick - Director of Information Technology; Potter County, Texas


One of today’s most exciting technologies is virtual desktops (VDI). VDI initiatives promise a wide variety of benefits in terms of time and dollar savings. The underlying infrastructure, however, adds layers of risk and complexity. From building a business case to deployment and ongoing support, there are new considerations and potential stumbling blocks. Smart preparation prevents countless problems down the road; a poor rollout will cost your organization immensely. With careful planning, however, your organization can take advantage of the lower total cost of ownership (TCO), easier management, and a better overall experience for your users.

Along the way, we will look at topics such as:

  • Planning Your Rollout: Required skill sets and infrastructure
  • Making a Case to Your Stakeholders
  • Change Management from the CIO’s Perspective
  • The Human Side: Meeting expectations of your users
  • Troubleshooting Steps: Overcoming technical hurdles
  • Planning for Long-Term Success

The takeaway from the seminar will be proven strategies from the presenter’s private- and public-sector experiences that you can implement *today* to improve your service levels and avoid costly mistakes.

THURSDAY - April 23
 9:45 AM – 10:45 AM
Securing Layer-8 (Human Security Factor)
Chris Boykin - CTO, Future Com

In today's world of IT Security, most companies have spent thousands upon thousands of dollars to secure their network perimeters; however, they have neglected one of their most vulnerable areas... Humans.   This presentation will explore the Human Security Factor and how it affects corporations today. We will look at the facts behind the latest breaches and how they could have been prevented.  We will also explore how to change the behavior of your employees that will not only make your company less vulnerable, but also increase productivity.


Business Continuity Protection - Offsite Backup / Offsite Archiving / Cloud Based Storage
Stephen Perkins - President and CTO, NetMass Incorporated

To maintain high levels of public trust government data assets need quality data protection. Best practice calls for copies of data to be stored at least 100 miles from the primary location. Online backup solutions easily provide full disaster recovery. But what do Criminal Justice Information System (CJIS) security requirements have to say about storing critical data offsite?

To that point:

  • How secure are these offsite offerings?
  • How do these offerings assist in actual disaster recovery?
  • In enacting the business continuity plan?
  • What is lacking in offsite backup systems?
  • How do you protect distributed data?
  • How does DATA ARCHIVING affect primary storage and backup policies?
  • Are local governments spending big but possibly protecting little?

NetMass and the City of Rowlett collaborate to maintain disaster recovery readiness through the implementation of a strong backup and recovery policy.

This two-part presentation shares the theoretical underpinning of good recovery and continuity along with the practical insights gained through implementation. Attendees will acquire an understanding of the strengths and weaknesses of on-site and off-site cloud based backup and archiving solutions. Particular emphasis is given to the differences between data backup and data archiving. We also present methods that keep live data available in the Emergency Operations Center (EOC) so critical items are immediately available in the event of a disaster.

 

Information Security Buzz BYOD
Keith Mele - Government Sales Manager, AirWatch by VMware

As enterprises are accelerating their mobile initiatives, Bring Your Own Device (BYOD) continues to be a top consideration due to the flexibility and ease of use for end users. In fact, an AirWatch survey (http://blogs.air-watch.com/2014/07/found-insights-byod-poll/#.VLmBXyvF-Sp) performed in 2014 found 50 percent of organizations surveyed now offer a BYOD program. While employees enjoy the convenience of one phone for corporate and personal purposes, BYOD can be a major headache for IT. With mobile operating system (OS) updates nearly every 15 days and new phones still coming into the market, BYOD is a complex, ever changing challenge for IT managers. The end result is well worth the effort, as the same survey found the main motivating factors for implementing a BYOD program include cutting costs (about 35 percent), boosting productivity and enhancing security (both about 15 percent).

In this session, attendees will gain insights into the five tips to successfully implement a BYOD strategy (position BYOD as a perk, prepare for the influx, find a solution that can keep up with the market, establish clear BYOD policies and terms of use, offer assistance).

 11:00 AM – 11:45 AM
Discover What Adaptive Flash Can Do for Your Organization
Nimble Storage

With business-enabling applications on the rise, IT organizations are facing increased pressure to deliver the right resources at the right time within the right footprint.

Nimble’s Adaptive Flash platform can empower your IT organization and enable you to predict, manage and deliver the storage required to optimize applications and workloads across the organization. How?

  • Lightning-fast application deployment
  • Scalable performance and capacity
  •  Integrated data protection in a ¼ of the footprint.
  • It doesn’t just handle change. It anticipates your next move

The result brings greater business agility and responsiveness, providing you with the ability to innovate and proactively respond to changing business requirements.

During our presentation, you’ll find out why Nimble has become the vendor of choice for budget-conscious local governments, and hear from your TAGITM host city, City of Corpus Christi, on their deployment and results.

Navigating your Microsoft EA Strategy
ARC

ARC will showcase it’s latest offering of providing services to analyze existing Microsoft software infrastructure and the required licensing to support Enterprise operations and strategic projects. We will present the process and sample results achieved while working with the NCTCOG. The engagement consists of three phases. First we will discuss the approach and process of doing a complete assessment of all Microsoft products running in the client environment. The Second phase is a deep analysis of the actual deployment results against the current license information. The last phase is a process of making recommendations for the client based on current and planned projects and strategy over a 3 to 5 year period. We will discuss the process and provide an overview of the engagement to include a description of the inventory assessment, recommendations and options available to the client.

 2:00 PM – 3:00 PM
BYOD 2.0 - What's New?

 Chris Boykin - CTO, Future Com


As mobile devices, like smartphones and tablets, continue to proliferate the enterprise, the demand for securing these devices becomes more critical than ever. The first round of BYOD (Bring Your Own Device) sent most companies chasing after MDM (Mobile Device Management), which got them through it. The second round brings more challenges and more security threats that MDM alone can't solve. This presentation will inform you on the lessons learned in BYOD 1.0 and what lies ahead in BYOD 2.0


Now I Can Sleep at Night
Tim Meador - Chief Executive Officer, Reliant Date

Reliant Data provides a multitude of IT services that range from new installations to full management services.  Our signature offering is our suite of backup/disaster recovery (BDR) solutions.  Each solution is carefully engineered to ensure it meets the needs of your business.  Our solutions are designed to not only restore files and folders but also entire machines as needed.  Restoring an individual machine literally takes minutes as compared to hours with other methods.  In addition, our solutions give customers the ability to completely failover to our data center in the event of a catastrophic disaster.   During this session Reliant Data will talk about why a disaster recovery plan is needed and how our solution will allow you to achieve your plan.  We also will go over the differences between file and folder backups versus image based backup as well as explain the difference between our solution and other online backup solutions.  Lastly we will do a small demonstration of how our solution works.


2015 Threat Landscape
Mike Vedda - Information Security Services Specialist

Dell SecureWorks focuses exclusively on information security services to protect thousands of customers around the world.

As a security service provider, we strive to be a world leader in everything related to information security; from firewall management services, combating advanced persistent threats to ensuring your PCI readiness for compliance.  Many industries and IT security companies need assistance in maintaining or even building a new infrastructure for their information security and we have the expert security analysts to assist you along the way through consulting, audits, assessments, and tests.

Our presentation will touch on the following:

  • Major Cyber Security breaches of 2014
  • Cyber Security Threat Landscape
  • Underground Hacking Economy
  • Kill Chain
  • Organizational Call to Action
  • Individual (personal) Call to Action

We will be partnering with a Government customer (TBD) as part of our presentation

Thank You 2018 Annual Conference Diamond & Platinum Sponsors

© 2019 TAGITM is professionally managed by CMP Management.

Association Management Software Powered by YourMembership  ::  Legal