[1 CPE] Restoration in 72 Hours, Not 72 Days: Building Cyber Resilience in Healthcare

  Presented by Rubrik

A singular focus on prevention and security is proving necessary but not sufficient to ensure continuity of operations and quality care. In an era of increasing cyberattacks, understanding the foundational principles of cyber resilience is essential for safeguarding patient data, ensuring organizational resilience, and ultimately, upholding patient care standards.

This session will explore the core concepts of cyber resilience and how they enable rapid recovery following cyber-attacks. With a focus on quantifying the impacts to operational downtime, legal costs and regulatory fines, as well as reputational damage, this discussion is tailored to help C-suite leaders prioritize cyber resilience strategies.

  • Explore the fundamental principles of cyber resilience, focusing on preserving continuity of care and business operations.
  • Assess the financial and operational risks of data breaches and ransomware attacks, including real-world examples from healthcare.
  • Discuss how to communicate the value of and build support for cyber resilience initiatives.

[1 CPE] Presentation Details Soon

  Presented by Vicinity

The details of this presentation will be available soon. Please check back for updates!

Vicinity is your local Technology Service Provider. Whether a local organization needs help with a technical issue, is looking to upgrade their IT infrastructure, or wants to explore new technology options, our team of experts is available to provide support and guidance.

[1 CPE] Empowering Hawai’i’s Future: Leading IT Innovation in State Government

  Presented by Christine Sakuda • Chief Information Officer, State of Hawaiʻi

Hawaiʻi State Chief Information Officer Christine Sakuda shares her journey transitioning from private sector leadership into her current role in the state’s central technology division. Sakuda will offer insights on how she fulfills the governors’ priorities while partnering with all executive departments to develop common IT solutions and will discuss her experience of learning to work with the legislature on bills and budget priorities.

Christine Sakuda has more than 25 years of experience in leading enterprise-level IT initiatives including leading community IT systems development, managing stakeholder relations, and collaborating with IT vendors to implement a range of technology modernization projects. She is the State’s first female CIO of Native Hawaiian ancestry. She also served as the first executive director of Transform Hawaii Government (THG), a nonprofit organization dedicated to catalyzing the modernization of public services through people, processes, and technology, and as the Executive Director of the Hawaiʻi Health Information Exchange (HHIE).

[1 CPE] Automated Microsegmentation: How Hawaii FCU Locked Down Lateral Movement

  Presented by Bryan Ward, Customer Engineer • Zero Networks

Hawaii Federal Credit Union is cracking open their microsegmentation field notes in this interactive session. See how their small but mighty team overcame common network security obstacles and enhanced their security posture in record time – all while modernizing their data center around Zero Trust initiatives – without a complex, disruptive implementation.

This real-world case study will highlight:

  • Strategies for quickly achieving regulatory compliance and blocking lateral movement
  • How to eradicate manual tasks (tagging, grouping, policy creation) and refocus security teams on more important work
  • Quantifying the ROI of microsegmentation – from Day 1 to Day 2 value and beyond
  • How to easily microsegment your network on your own without needing ANY professional services

Don’t miss this opportunity to explore practical applications of microsegmentation and its transformative impact on cybersecurity strategy. Learn how you can strengthen your organization’s security posture, simplify compliance efforts, and gain peace of mind and gain peace of mind with microsegmentation that implements in days, not years.

[1 CPE] Demystifying Zero Trust: Simplifying Network Security

  Presented by Tanner Harrison, Systems Engineer • Fortinet

Today’s ever-changing threat landscape challenges traditional security models. The emergence of the Zero Trust model represents a transformative approach, reshaping how organizations protect their assets. This presentation aims to demystify Zero Trust, offering a comprehensive understanding that goes beyond buzzwords. We will explore the foundational concepts of Zero Trust, emphasizing the “never trust, always verify” philosophy. By the end of this session, attendees will be equipped with the knowledge to begin their Zero Trust journey, enhancing their security posture, and protecting critical data and systems from modern threats. Whether you are a security professional, IT manager, or organizational leader, this discussion will empower you to take decisive action toward a more secure future.

[1 CPE] Don’t Build a Fire Department

  Presented by Matt Martin, Sr Sales Engineer, Large Enterprise • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24×7 monitoring across your collective attack surfaces.

[1 CPE] LIVE Hack: Unmasking AI’s Dark Side

  Presented by Wayne Johnson, CEO • Stellar

In this eye-opening presentation, we will delve into the darker applications of artificial intelligence, specifically focusing on its potential to craft malicious code and generate deceptive voice replicas. As AI continues to evolve, its capabilities extend beyond beneficial innovations, posing significant ethical and security challenges. This session aims to shed light on how AI can be manipulated to perform nefarious tasks, such as writing harmful software or impersonating voices with high accuracy. Through live demonstrations and critical discussions, we aim to equip the audience with a comprehensive understanding of these risks and foster a dialogue on developing robust countermeasures and ethical guidelines to prevent misuse of AI technologies. Join us as we explore the shadowy corners of AI applications, understanding their implications and preparing for a secure technological future.

[1 CPE] Data Resilience to Keep Every Business Running

  Presented by Joshua Sasser, Senior Systems Engineer • Veeam

Every business should be able to bounce forward after a disruption with the confidence and control of all their data whenever and wherever they need it. We call this radical resilience, and we’re obsessed with creating innovative ways to help businesses achieve it. Join this session to learn how you can achieve data resilience with data backup, data recovery, data freedom, data security, and data intelligence across all environments.