[1 CPE] Cyber Crisis Retrospective: Learning from a Ransomware Attack

  Presented by Jeremy Pierson, Director of Cybersecurity, and Rainer Engel, Executive Director of Strategic Partnerships • CompuNet

Join us for a real-world analysis of a recent ransomware attack, where we will explore both the human and technical challenges that were faced. This session will delve into the techniques employed by the attackers and organizational roadblocks encountered during the incident. We will also discuss how consultants played an important role in discovering the incident and accelerating the remediation process. Attendees will gain valuable insights into the multifaceted nature of ransomware attacks and learn practical approaches to fortify their defenses and respond effectively to future threats.

[1 CPE] Intelligent SSE: Secure Everything from Anywhere

  Presented by Ramien Ebadypour, Principal Solutions Engineer • Netskope

This session will provide a technical overview of Secure Access Service Edge (SASE), focused on the following topics:

  • SASE Overview
  • What Your Future Network May Look Like
  • The Truth Behind Inline Malware Prevention
  • New Technologies That Make Data Loss Prevention (DLP) Easier
  • Zero-Trust Network Access VPNs are Difficult to Deploy
  • Maximizing Value Through Integrations and Automation

You will walk away understanding the fundamentals of SASE and how it will benefit your business.

[1 CPE] Top-Down Security: Aligning Security with Business Objectives

  Presented by Ben Mayo, Manager of IT & Security • Vision Net, Inc.

Is your organization’s security viewed merely as a cost center, a necessary expense of doing business? Do you face challenges in securing funding for your security initiatives? It’s time to shift the perception and prove that security is not just a cost, but a strategic enabler of business success. This presentation will explore methods to transform your security program into a key business asset, demonstrating tangible value. Learn strategies to align security with business goals and effectively communicate with the C-Suite and board members to gain their support and advocacy for your security initiatives.

[1 CPE] AI-Driven Networking

  Presented by Matthew Smith, Sr Partner Systems Engineer • Juniper Networks & Structured

Every connection counts. Nearly every vital experience in modern-day life requires a strong network connection. At Juniper, we believe that connectivity is not the same as experiencing a great connection. When you shift from simply measuring connectivity to focusing on the experience of the end-to-end connection – everything changes. Join us to learn how Juniper is revolutionizing networking with an experience-first approach driven by the industry’s only AI-Native Platform.

[1 CPE] Are You AI Ready? Securing M365 Copilot

  Presented by Structured

This presentation dives into the transformative potential of Generative AI (GenAI) and Microsoft’s M365 Copilot. We’ll cover the fundamental differences between GenAI and Machine Learning, highlighting GenAI’s ability to create new content and its applications across various industries. We’ll also provide an in-depth look at Microsoft Copilot, showcasing its role in enhancing productivity through intelligent suggestions and automation. Additionally, we’ll introduce a comprehensive Copilot Assessment service designed to evaluate an organization’s readiness for AI integration, focusing on IT infrastructure, security, data governance, and compliance. Emphasis is placed on ensuring secure integration and adherence to global data privacy standards, making it a critical resource for organizations embarking on their AI journey.

[1 CPE] AI and Social Engineering: The New Frontier of Cybersecurity

  Presented by Sherri Davidoff • Chief Executive Officer, LMG Security

Artificial intelligence is transforming the cyber battlefield. Hackers now use voice cloning, deep fakes, and AI-generated phishing attacks to steal funds, infiltrate cloud systems, and deploy malware. Join us in this cutting-edge keynote to witness the latest attack trends, including:

  • Voice Cloning: See a live demo and discover how scammers manipulate this technology.
  • Dark Web AI: View the latest AI hacker tools up for sale.
  • Text and QR Code Attacks: Learn how mobile threats can slip past traditional security.

Cybersecurity is all about people. We’ll wrap up with top strategies for cybersecurity training and staffing, showing you how to create a “human firewall” to safeguard your organization against these evolving threats.

Sherri Davidoff is the CEO of LMG Security and the author of three books, including “Ransomware and Cyber Extortion” and “Data Breaches: Crisis and Opportunity.” As a recognized expert in cybersecurity, she has been called a “security badass” by The New York Times. Sherri is a GIAC-certified forensic analyst (GCFA) and penetration tester (GPEN) and received her degree in computer science and electrical engineering from MIT.

[1 CPE] Building a Strong Team Culture in a Remote Working World

  Presented by INTERFACE Advisory Council

Building a good team culture presents a multitude of challenges for any manager to navigate in the traditional office work environment. Different personalities can impact many elements of the day-to-day dynamic and bring both positive and negative changes to your culture. Some team members welcome praise for a job well done, while others prefer to not be recognized publicly. These hurdles were all in place well before remote working became prevalent.

With so many IT departments dealing with hybrid or fully remote workforces, how do you build bonds among your team members today? Has your company’s vision been set? Are expectations clear? Answering some of these basic questions can help build a good culture. However, more is needed to have a truly effective team.

Join the INTERFACE Montana Advisory Council for an open discussion about how to improve communication in your company. We will offer advice on what has worked well and what didn’t go as expected. We welcome your questions on how to create a positive work environment, no matter where your team members work from each day.

Speakers:

  • Jason Emery, Director of Cyber Security Advisory Services, Center for Internet Security
  • Ryan Knutson, Chief Information Officer, VP, IT, Montana State University
  • Peter Martinson, Strategic IT Managing Director, Montana State University
  • Andy Metroka, Chief Information Officer, Kampgrounds of America, Inc.

[1 CPE] A Review of FRSecure’s Annual Information Security Report

  Presented by John Harmon, Chief Executive Officer • FRSecure

FRSecure (an Information Security company located in Edina, MN) took the results of +/- 400 Validated Information Security Assessments and 55 Incident Response Engagements conducted in 2022 and created an anonymized report from the data called: The State of Information Security. Full details and access to the report are available here: https://frsecure.com/2023-annual-infosec-report/

In this presentation, FRSecure Information Security Consultant Dave Tuckman will highlight key findings in the report, and what we can learn from it.

Understand how you can mitigate risk going forward to protect your business and clients in an ever-changing threat landscape. Dave will provide additional perspective on how you can leverage this information for a better understanding of your third-party (supply, vendor, contractor) relationships.

Topics include:

  • FRSecure’s Annual State of InfoSec Report, informed by over 400 validated security assessments
  • Where organizations are getting it right vs. falling behind
  • How you can use this report to inform your own business’s security decisions
  • How you can use this report to inform your business’s Third-Party Risk Management

[1 CPE] Demystifying Zero Trust: Simplifying Network Security

  Presented by Tanner Harrison, Systems Engineer • Fortinet

Today’s ever-changing threat landscape challenges traditional security models. The emergence of the Zero Trust model represents a transformative approach, reshaping how organizations protect their assets. This presentation aims to demystify Zero Trust, offering a comprehensive understanding that goes beyond buzzwords. We will explore the foundational concepts of Zero Trust, emphasizing the “never trust, always verify” philosophy. By the end of this session, attendees will be equipped with the knowledge to begin their Zero Trust journey, enhancing their security posture, and protecting critical data and systems from modern threats. Whether you are a security professional, IT manager, or organizational leader, this discussion will empower you to take decisive action toward a more secure future.