West IT & Security Leaders Forum

  • This Event Took Place

    November 13 – 15, 2022

Zero Trust and Microsegmentation – Easier Than You Think

Zero Trust has got to be one of the most talked about themes in cyber security. While the term means different things to different people, there are two things that can be agreed on: it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started? Regardless of the sophistication of ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.

Presented by: Christer Swarts, Director, Industry Solutions, Illumio

Information Technology Governance Library

In this presentation we learned three key sources that guide IT Governance:

  1. Risks facing the organization
  2. Relevant Laws, Regulations, and Contracts
  3. Current policy documents

Presented by: Ralph Johnson, CISO, LA Times

Burnout in IT

Darrell Bilbrey, Principal and Founder of Vantage To You Counseling offers some insight on how to avoid Burnout in IT. In this presentation we  find out what impact does burnout have on you, who gets burnout, what is a workaholic, and see insights on Darrel’s personal burnout story, how he overcame it, and tips he learned to avoid it.

Presented by: Darrell Bilbrey, Founder & Principal, VantageToYou Consulting

Why the Nonprofit Sector Needs CIOS & How You Can Help

Building a compelling business case for digital transformation is a challenge faced by many technology leaders. It becomes even more complicated when the change beneficiaries are not the funders, and the choice to invest in technology feels like it is taking services from our most vulnerable citizens. Helen Knight, an award-winning leader of non-profit digital transformations will share how she modernized emergency shelters and food banks, and how she uses technology to optimize services for people struggling with poverty. Helen will also share ways technology leaders can use their skills to help people today, and invite you to help solve the challenges ahead.

Presented by: Helen Knight, Transformation Consultant, Helen Knight Consulting

From On-Prem to the Cloud: Protect Your Apps and APIs

The result of digital transformation: It’s easier to do business with your customers and partners. But with new architectures, web apps and APIs now deployed from on-prem servers to the cloud, it is harder than ever to get a holistic view of all of these potentially vulnerable assets – never mind defend them.

What are your biggest challenges today in defending these diverse assets? What are the known gaps in your current defenses? What are you seeking in the future to defend your apps and APIs?

Topics covered include:

  • How are adversaries preying upon unprotected web apps and APIs?
  • How are traditional web application firewalls deployed, and what are they missing?
  • What does the future look like with unified web app and API security solutions?
Presented by: Julian Quintana, Senior Sales Engineer, Fastly

In The Know: Coping with Recession Concerns on IT Spending

Concerns of a Recession looms whether there results in one or not. With a war raging across the ocean, a potential European energy crisis this winter, and inflation numbers in the US refusing to subside, the macroeconomic environment has caused enterprise IT leaders to rethink their strategies. Learn how your peers are changing their plans to deal with the recession.

Presented by: Guy Guiffre, VP Sales, America – West, Rimini Street

An Untold Truth 5 Key Things You Need to Know About Threat Response

Three forces are colliding to create a perfect cyberstorm: An escalated threat level, a cybersecurity talent shortage and the growing complexity that comes with managing a multitude of security solutions. This storm is driving change, forcing us to break down silos between endpoint, workload, network and identity. It’s driving the need to leverage existing tooling rather than bolting on more. And it is reshaping the focus of managed security services away from “busy work” and toward “expert work.” This session will explore a case study of a new type of MDR service from Open Systems. A new approach that offers shelter from the storm.

Presented by: Kirk Greene, Sr. Sales Engineer, Open Systems