Presented by: Scott Greenlay, National Director Technology Consulting, MNP
Today, more than ever before, technology IS everywhere. In the past, the CIO was charged with looking after a fairly well-defined "stable" of technology. Today, primarily as a result of massive consumerization, all that has changed. Today's typical high school and university graduate comes to the workplace with more computing power and tools at their fingertips than the mainframe of 20 years ago. The Cloud has opened-up free – or near free – available on-demand applications at a rate never before seen. As a result, today’s CIO is faced with a dilemma: How does the IT department stay relevant?
This light-hearted session will strive to discuss and share ideas on how to address the challenge to increase IT's value to the organizations we serve. Through insights and stories, some humorous, Scott will share observations and ideas gained through working with some Canada's largest firms as a consultant as well as his own personal journey as a CIO. This session will touch on themes ranging from disruption, customer service, innovation, technology governance and the unique challenges of technology human resources. The goal for the session will be to help stimulate your own thoughts about how to increase the value of your own team to your organization.
Core competencies identification is very important in every company. It becomes even more important when a company is taking the decision as to which services to outsource to the cloud. A few analytical matrices were discussed for strategic analysis. In the PPT (people, process, technology) model, people and processes are becoming more important than technology. SFIA framework reference was made that categorizes ninety six different IT professions into six broad categories. This framework helps in identifying which skill sets are required for each profession for talent services. The ADKAR change management model was also discussed.
Presented by: Simon Crosby, CTO & Co-Founder, Bromium Inc.
Mobility, the consumerization of devices and networks, adoption of cloud based services, and ready access to the web lead inexorably toward a stark reality: IT is out of control. As a result, sophisticated attackers penetrate enterprise infrastructure with alarming ease. Security budgets are growing, but protection seems elusive, and locking down users makes them less productive and frustrated, leading to “shadow IT”.
Something is profoundly wrong. Even enterprises that use the most sophisticated security products cannot prevent compromises. Security vendors offer a seemingly endless succession of fancily named technologies that aspire to greater protection, but they gloss over a fatal flaw, namely the undeniable fact that the “detect to protect” paradigm has passed its sell-by date.
Luckily there is a silver lining to this cloud: Thanks to the relentless progress of Moore’s Law, every PC/Mac and mobile device already has CPU features that can enable it to protect itself by design, on untrusted networks and in the hands of unreliable users.
Micro-virtualization – an evolution of CPU-based hardware virtualization - is a new approach that uses hardware to enforce protection, without relying on detection. Each browser tab, document, attachment or file from detachable storage is automatically hardware isolated on the CPU, with no change to the user workflow. The PC automatically defeats each attack, staying gold. It automatically self-remediates by discarding the contents of each hardware-isolated task, and can safely run unpatched 3rd party applications – such as legacy Java.
In addition, the hardware-backed protection of micro-virtualization permits the device to automatically track the execution of malware, eliminating false alarms and delivering false-alarm free, real-time forensic insights – the needle instead of the haystack.
This talk will present a brief tour through the use of virtualization technologies to simplify management and delivery of secure end-user computing. It will cover in depth the concept of micro-virtualization, highlighting key differences from traditional VM based approaches. It will use live demos of attacks to show how introspection transforms forensics and eliminates remediation.
Over 70% of cypher attacks are unique to your organization. Ultimately, the end point has to defend itself. Micro-virtualization hardware isolates every application task using cpu features for virtualization. It provides much better protection than conventional anti-virus software, HIPS, EMET, Rootlet detection and SMEP.