[1 CPE] Securing the Future: Cyber Insurance and Cybersecurity Strategies for 2024

  Presented by Andrew Livingston, Cyber Security Specialist • Sentinel Technologies

In the dynamic and interconnected digital era of 2024, the landscape of cyber threats continuously evolves, posing unprecedented challenges to businesses worldwide. “Securing the Future: Cyber Insurance and Cybersecurity Strategies for 2024” delves into the intricacies of cyber insurance as a pivotal component of modern business risk management. This presentation offers a thorough exploration of the latest trends in cyber threats that businesses face, such as sophisticated AI-driven attacks, the proliferation of ransomware, and the vulnerabilities introduced by emerging technologies. It highlights the critical challenges that could lead to the denial of cyber insurance claims and potential loss of coverage, emphasizing the importance of compliance, accurate representation of cybersecurity measures, and prompt incident reporting.

Furthermore, the presentation shifts focus towards proactive strategies for enhancing an organization’s cybersecurity posture. It outlines actionable tips for businesses to not only fortify their defenses against cyber threats but also to positively influence their cyber insurance rates. Through a blend of expert insights and practical guidance, the audience will learn about the significance of regular risk assessments, the adoption of multi-factor authentication, encryption, endpoint security, and the development of robust incident response plans. We’ll discuss:

  • Insights into the evolving cyber threat landscape in 2024.
  • Common pitfalls leading to cyber insurance claim denials.
  • Strategies for enhancing cybersecurity measures to favorably impact insurance rates.
  • The future outlook of cyber insurance and the role of emerging technologies.

By the conclusion of this presentation, attendees will be equipped with the knowledge to navigate the complexities of cyber insurance and implement comprehensive cybersecurity strategies. This will not only prepare them to mitigate the risks of cyber threats but also optimize their insurance coverage in the face of an ever-changing digital threat landscape.

[1 CPE] Adventures in CIS: Settings Standards for Windows Workstations & Servers

  Presented by INTERFACE Advisory Council

The Bank of Hawaii has recently completed a project implementing a set of benchmarks defined by the Center for Internet Security (CIS). The intent of this project was to standardize and document security settings on all Windows Workstations and Servers across the organization. The scope of this project was enormous, but the benefits of having completed the implementation are great. Preston and Mike will be discussing the trials and tribulations they encountered along the two-and-a-half-year implementation. In addition, they will offer suggestions for organizations wishing to harden their own security profile through the implementation of CIS benchmarks.

Speakers:

  • Mike Lotter, Systems Automation and Security Engineer, Bank of Hawaii
  • Preston Robler, Manager, Infrastructure Application Services, Bank of Hawaii

Preston Robler was born and raised in Colorado. He obtained a degree in Computer Science from the University of Colorado and has 12 years of experience developing applications in the Java programming language. His adventures in software development have taken him from Colorado to Massachusetts, New Zealand, Alaska, and finally Hawaii. Currently, he manages the Systems Automation and Security team at the Bank of Hawaii.

Mike Lotter has spent over 10 years in systems and network administration across two continents, with a focus on Microsoft products and security. For the last 3 years, he has worked in the Systems Automation and Security team at Bank of Hawaii, two of which were spent on the CIS implementation project.

[1 CPE] Intelligent SSE: Secure Everything from Anywhere

  Presented by Matt Senechal, Regional Sales Manager • Netskope

This session will provide a technical overview of Security Service Edge (SSE), focused on the following topics:

  • Unintentional or unapproved data movement
  • Data protection for internal and external threats
  • Conditional and contextual access to safely enable cloud & SaaS applications
  • Protection from cloud-enabled SaaS and web threats
  • Work from anywhere with a secure, fast experience

You will walk away understanding the fundamentals of SSE and how it will benefit your business.

[1 CPE] Achieving Your Goals with Hybrid Cloud

  Presented by Chet Sulgrove, Technical Expert, Hybrid Cloud & Converged Infrastructure Healthcare Solutions • Hitachi Vantara

The extension of traditional data center applications to include public cloud has led to a rethinking of how to approach cloud strategies with a common operations model that can scale up and down quickly to take advantage of new business opportunities. As a result, companies are seeking to balance their public and private cloud strategy, aligning to a common Hybrid Cloud Operating Model.

Chet Sulgrove is a seasoned Solutions Specialist with a dynamic career spanning 36 years in the IT industry, with a significant focus on Hybrid Cloud and Converged Infrastructure. Chet’s approach is notably holistic and consultative, prioritizing a deep understanding of each client’s unique business objectives, challenges, and requirements. His tenure includes more than 10 years at Hitachi Vantara, where he has honed his skills in leveraging business insights, discovery, and competitive analysis. Known for building strong, trust-based relationships, Chet effectively collaborates with executive leaders, stakeholders, technologists, and partners, balancing technical acumen with a keen focus on partnership and customer-centric solutions.

[1 CPE] Addressing Cybersecurity Concerns for Critical Infrastructure Organizations

  Presented by Leslie Ann Kainoa, Oregon Cybersecurity State Coordinator • CISA

In this session, we will address the current cybersecurity threats and critical infrastructure stakeholder concerns. We will focus on under-discussed topics, including how to address resource constraints and organizational dependencies. We will also review CISA’s recommended best practices and offer guidance for how all critical infrastructure organizations can effectively leverage CISA resources.

Leslie Ann Kainoa is the Oregon Cybersecurity State Coordinator for the Cybersecurity and Infrastructure Security Agency (CISA), Region 10. In her current role, Leslie provides cybersecurity assistance and support to public and private Critical Infrastructure sectors throughout the State. She is focused on working with these organizations to improve cybersecurity and critical infrastructure resilience.

[1 CPE] Intelligent SSE: Secure Everything from Anywhere

  Presented by Matt Senechal, Regional Sales Manager • Netskope

This session will provide a technical overview of Security Service Edge (SSE), focused on the following topics:

  • Unintentional or unapproved data movement
  • Data protection for internal and external threats
  • Conditional and contextual access to safely enable cloud & SaaS applications
  • Protection from cloud-enabled SaaS and web threats
  • Work from anywhere with a secure, fast experience

You will walk away understanding the fundamentals of SSE and how it will benefit your business.

[1 CPE] Unleashing the Power of the Microsoft Power Platform

  Presented by Marie Stavish, BAI Engineer • Univision Computers

Join this session as we explore the business value of the Microsoft Power Platform and discover how it can empower any organization. Our learning objectives for this session are comprehensive, ranging from understanding the fundamental concepts of Power Platform to diving into its integration with Microsoft 365 apps and services. We will explore connectors, data organization with Microsoft Dataverse, collaboration through Microsoft Teams, synergies with Dynamics 365, and even harnessing the power of Azure Services. Additionally, we will discuss how Power Platform apps work together seamlessly to create efficient solutions that boost productivity. So, fasten your seatbelts, as we unravel the potential of Microsoft Power Platform.

[1 CPE] Modern Segmentation Architectures

  Presented by Joe Lentz, Systems Engineer • Arista Networks

In this presentation, we will explore the different network segmentation models available, including VLANs, VRFs, and group-based segmentation models.

We will begin with an overview of the different segmentation models and discuss their benefits and drawbacks. VLANs provide a simple way to segment traffic but do not scale well in larger environments. VRFs offer more robust isolation but can be complex to manage. Group-based segmentation models offer a flexible and scalable way to segment traffic based on the endpoint itself rather than the network. We will discuss the implementation and configuration of each of these models and provide examples of how they can be used in different scenarios.

Next, we will discuss how EVPN with either VXLAN or MPLS transport can be used as an attachment point to allow for segmentation to cross the network device boundary and become a network-wide policy.

Finally, we will compare the different models to help you choose the best segmentation approach for your network, as well as how to layer these together to have a more complete design. By the end of this presentation, you will have a better understanding of modern segmentation architectures and be equipped to make informed decisions for your network.

[1 CPE] Hybrid Cloud: Empowering IT with Resiliency, Multicloud Strategies, Optimal Spend, & Sustainability

  Presented by Michael Donahue, Sr Director, Hybrid Cloud Solutions • Hitachi Vantara

The hybrid cloud has emerged as a game-changing paradigm for modern IT infrastructure, offering IT Leaders and above a wealth of opportunities to drive innovation and efficiency. With the ever-increasing demand for cyber resiliency, flexibility, and sustainability, it is crucial for IT constituents to grasp the intricacies of the hybrid cloud, including key concepts such as security, multicloud, nearcloud, cloud spend optimization, data refactorization, and sustainability practices.

Throughout the session, real-world case studies and examples will be shared from Day 0, Day 1, and Day 2 customers.

  • Day 0 means you want to take advantage of this new framework but are still working through how to adopt hybrid cloud, how to secure it, and how to recruit proper talent to maximize it.
  • Day 1 means your organization took the first step and has a minimum spend commit they must meet. However, you’re still unsure of how to meet it because you’re still determining which applications to refactor, which containerized microservices to adopt, how to reskill existing talent, and how to implement your compliance and governance strategy.
  • Day 2 means your organization has already overcome these hurdles. Nice work! Instead of worrying about hitting a minimum spend commit, you’re now focused on optimizing your environment to limit sprawling cloud costs and looking towards data repatriation efforts.

Participants will have the opportunity to engage in interactive discussions and pose questions, fostering a collaborative learning environment. By the end of this session, IT Leaders will have the knowledge and tools necessary to evaluate, plan, and implement hybrid cloud solutions that align with their organization’s goals, including sustainability. Afterall, Hitachi is committed to providing solutions that are exclusively carbon-neutral or zero-carbon, ensuring a sustainable and environmentally friendly approach.

[1 CPE] WiFi 7: What About It?

  Presented by Pine Cove Consulting & Ruckus

This presentation traces the evolution of Wi-Fi technologies, from the initial design for device scalability to the current demand for capacity, efficiency, and predictability. The progression from Wi-Fi 4 to 6E and the upcoming Wi-Fi 7 is analyzed, revealing trends and challenges. The fragmented global regulatory environment, slow 6GHz adoption, and deployment intricacies are discussed. The differences among Wi-Fi 6, 6E, and 7 are highlighted, along with their respective enhancements. Major Wi-Fi 7 advancements, such as punctured transmission and enhanced quality of service, are examined. The emergence of the Wi-Fi 7 ecosystem and the increasing demand for Power over Ethernet (PoE) are also explored, offering insights into the changing landscape of network technologies.