[1 CPE] From Liability to Asset: Securing Unstructured Data at Scale in the Era of AI

  Presented by Rubrik

Unstructured data is the lifeblood of the modern organization, yet its sheer volume often outpaces the strategies meant to protect it. As this data becomes the fuel for future AI initiatives and business intelligence, the “”old way”” of managing NAS has become a primary point of failure.

In this session, we’ll dive into how Rubrik NAS Cloud Direct (NCD) redefines the protection of PB-scale file systems. We will explore a modern architectural approach that provides the speed, visibility, and cloud-native flexibility required to turn massive data sets into resilient assets. Whether you are preparing for an AI-driven future or simply struggling with the growth of your current footprint, this session will provide a blueprint for total unstructured data control.

[1 CPE] How (Not) To Build a Fire Department

  Presented by Tom Simonis, Sr Sales Engineer, Enterprise US • Arctic Wolf

This presentation uses the analogy of building a fire department to explore the realities, risks, and misconceptions organizations face when attempting to build and operate an in-house cybersecurity function or Security Operations Center (SOC). Grounded in global research from over 1,000 security and IT professionals, the session highlights persistent trends such as rising data breaches, increasing ransomware attacks, growing attack surfaces, and the ongoing shortage of skilled cybersecurity talent. It demonstrates why cybersecurity—while mission-critical to business continuity—is not a core business function for most organizations, and why treating it as such often leads to inefficiency, burnout, wasted spend, and increased risk.

Through real-world data and practical examples, the presentation walks through what “state-of-the-art” cyber defense actually entails: 24×7 coverage, specialized skills, integrated tools, continuous improvement loops, and proactive threat intelligence. It contrasts this ideal with the common reasons in-house SOCs fail, including limited operating hours, lack of authority, underestimation of integration and tuning efforts, overreliance on point solutions, and the misconception that technology or AI alone can solve structural gaps. The session concludes with actionable insights on measuring and improving cybersecurity maturity, emphasizing the importance of people, process, and operational discipline—and reinforcing why many organizations achieve better outcomes by focusing on preparedness, resilience, and strategic partnerships rather than trying to “build their own fire department.”

Key themes addressed include:

  • Current cybersecurity and ransomware trends impacting organizations globally
  • The true cost and complexity of building and maintaining an in-house SOC
  • Why talent shortages and burnout continue to undermine security operations
  • Characteristics of mature, state-of-the-art cyber defense programs
  • Common pitfalls that cause in-house SOCs to fail
  • Practical guidance for measuring, optimizing, and continuously improving security posture

[1 CPE] Data Resilience in the Age of Attack: Protect What Matters

  Presented by Landra Pierce, Product Strategy Technologist • Veeam

Cyberattacks are no longer a distant threat; they are a reality every IT team must be prepared for. When an attack occurs, your data becomes both the primary target and the key to recovery. Many organizations still rely on backup strategies that are designed for hardware failures or accidental deletions, rather than today’s threats, like ransomware, insider risk, and automated attacks. This disconnect creates vulnerabilities, especially when backups become an overlooked entry point in your security strategy. In this session, we will address these challenges to help you better protect your organization.

This session is ideal for IT professionals who want greater confidence in safeguarding their data and peace of mind. We will examine the most common oversights that leave organizations, including those in government, education, healthcare, and other sectors, exposed to cyberthreats. You’ll discover how teams are advancing beyond basic backup to adopt a cyber-ready approach, including topics like immutability, threat awareness, rapid recovery, and intelligent automation.

Our focus will be practical and grounded in real-world scenarios, and what truly works when pressure is high and time is limited. Because when every minute counts and trust is at stake, data resilience means more than surviving an attack. It’s about protecting what matters most and emerging even stronger.

[1 CPE] Proving Cyber Resilience: Measuring Outcomes, Not Effort

  Presented by Jake Mickley, Sr Solutions Architect • Horizon3.ai

Most security programs measure effort — not outcomes. Organizations patch thousands of vulnerabilities, deploy dozens of tools, and run annual tabletop exercises… but when an attacker shows up, none of that matters.

What matters is whether they can prove their defenses actually work.

In this talk, Horizon3.ai shares how leading organizations are using autonomous pentesting to see their environment through the attacker’s eyes — continuously, safely, and at scale. By shifting from assumptions to proof, they’ve learned to:

  • Prioritize what’s exploitable. Focus limited resources on the weaknesses that truly put the business at risk that are known to be abused by threat actors.
  • Quickly fix what matters. Close the loop from find → fix → verify and reduce your exploitable attack surface.
  • Reduce attacker dwell time. Use pentest results to precisely deploy honeyTokens to detect compromise early, and to continuously prove your EDR and SIEM are tuned and working as intended.

Cyber resilience isn’t about being perfect — it’s about getting better over time. And the only perspective that truly matters is the attacker’s.

[1 CPE] From Known-Bad to Known-Normal: The Future of Threat Detection

  Presented by Patricia Titus, Field CISO • Abnormal

As email-based threats continue to evolve in speed and sophistication, traditional “known-bad” detection methods are no longer enough to protect modern organizations. This session explores the shift toward a “known-normal” security model, where behavioral AI establishes a dynamic baseline of trusted activity to identify anomalies, detect emerging threats, and stop attacks before they escalate.

Designed for executive and security leaders, this presentation will examine how behavioral-based threat detection strengthens resilience against advanced phishing, business email compromise, and AI-driven attacks. Attendees will leave with practical guidance for evaluating their current email security stack, adopting modern AI-powered defenses, and implementing key strategies to stay ahead of today’s rapidly changing threat landscape.

[1 CPE] Ransomware Resilience: Navigating Threats in a Hybrid-Cloud World

  Presented by Ken Smallwood, Systems Engineer, Data Services and Storage • HPE

This presentation explores how organizations are navigating rising cyber threats, evolving workloads, and stricter regulations while managing legacy environments. We will discuss the growing risk of ransomware, fragmented data across cloud and edge, and the need for unified, resilient data protection strategies.

[1 CPE] When Unchecked Innovation Becomes Institutional Risk: The Leadership Moment for AI

  Presented by Mac Avancena, Field CISO • Check Point Software

AI adoption is accelerating, but most organizations are not ready.

While investment surges, the majority of AI initiatives fail to scale, deliver value, or operate securely. The challenge isn’t the technology; it’s the inability to align AI with governance, financial realities, and measurable business outcomes.

In this session, Mac Avancena cuts through the hype to expose the real gap between AI ambition and execution. Learn why most AI programs stall, which organizations are actually succeeding, and how leaders can fund, secure, and scale AI in constrained environments.

This session delivers a clear framework to:

  • Connect AI initiatives to business value and funding priorities
  • Close the gap between innovation and governance
  • Manage risk across AI, identity, and data
  • Turn AI from experimental spend into a strategic advantage

AI won’t wait. The question is whether your organization can keep up, securely and profitably.

[1 CPE] Securing Our Mission: A Non-Profit’s Journey to Zero Trust

  Presented by Troy Villar, Director, Information Technology, Child & Family Service • The Advisory Council

This presentation offers a non-technical, firsthand account of a nonprofit’s journey to a Zero Trust security model on a limited budget. It covers core Zero Trust principles and how they were applied in practice, while addressing key challenges such as HIPAA compliance, budget constraints, and COVID-19 disruptions. The 2020–2026 roadmap highlights major milestones, including achieving a fully cloud-based environment, network redesign and segmentation, and the implementation of NAC and Unified Access Control. It also shares lessons learned, emphasizing stakeholder engagement, effective communication, and maintaining team well-being throughout the transformation.

Troy Villar has served as Director of IT at Child & Family Service since 2020, supporting Hawaii’s oldest nonprofit dedicated to strengthening families. A CISSP with over 30 years of experience, he has led software development, hardware design, and enterprise network implementations, including the design and development of a full-scale POS system for a major Hawaii retail chain. He is Vice President of ISC2 Hawaii and leads the Cybergenerations program, advancing cybersecurity education and awareness. Troy holds a degree in Information Systems from Hawaii Pacific University, where he previously served as Associate Director of Data Services, and is currently completing his Master’s in Cybersecurity and Information Assurance at WGU. Outside of work, he enjoys mountain biking, hiking, and spending time with his family and their dogs.

[1 CPE] Latest Data Breaches, Quantum Computing, External Key Management in the Cloud

  Presented by Steven Gautier, Principal Solutions Architect • Thales

Welcome to our session on modern data threats and protection strategies. As cyber risks evolve, securing sensitive information is more critical than ever. We’ll explore how encryption and key management can help protect your most valuable assets, especially in cloud environments.

We’ll highlight the benefits of external key management, offering greater control and compliance. Additionally, we’ll touch on the growing impact of quantum computing—and why it’s vital to start preparing now.

Join us to discover the latest advancements in data security and learn how to stay ahead of emerging threats.

[1 CPE] Why Layered Identity Defense Is the Best Offense

  Presented by Sean Deuby, Principal Technologist, Americas • Semperis

Cyberattackers are adept at finding ways through your defenses and into identity systems like Active Directory, Entra ID, and Okta, and endpoint defenses won’t stop them. From there, they can move laterally, escalate privileges, access sensitive data and resources, and inject malware or ransomware. Implementing a layered defense that includes identity threat detection and response (ITDR) and robust identity recovery is key to true cyber resilience.

Join Sean Deuby, Principal Technologist, Semperis, to learn:

  • How layered defense has changed over time
  • Why ITDR and identity recovery are essential to a robust layered defense strategy
  • How a layered defense can help you combat attacks that are designed to bypass traditional attack-detection methods
  • Which best practices lead to identity—and cyber—resilience