[1 CPE] Sprung a Leak! Unit 42’s 2024 Leak Site Analysis

  Presented by Palo Alto Networks & Structured

Unit 42 monitors ransomware and extortion leak sites closely to keep tabs on threat activity and monitors data from dedicated leak sites (DLS) that are often only accessible through the dark web. Throughout our analysis, we compare activity results so that we are accounting for any seasonal fluctuations that can occur due to annual holidays, travel seasons and other recurring events that may impact threat activity. Here we will take a dive into those key leak site trends impacting the state of cybersecurity.

[1 CPE] Proactive Threat Mitigation Through East/West Traffic Isolation

  Presented by HPE Aruba Networking & Structured

Ransomware and targeted cyber security threats are on the rise. A proactive prevention strategy should use both tried and proven methodologies as well as new and emerging technologies. East West traffic identification and isolation is key in preventing malicious content from spreading, both in the Data Center and at the Campus Edge of the network. We will focus on innovative approaches to address the security compliance, performance, agility, and scalability demands of today’s highly distributed, hybrid, network environments.

[1 CPE] SLED Challenges: Budgets, Compliance, E-Rate

  Presented by Michael Townsend, Solutions Architect, & Robert Gherbaz, vCIO • Barracuda & BlackPoint IT

SLED (State/Local Government, Education) customers face unique challenges when adopting new technologies, such as limited budgets, lengthy approval processes, and outdated infrastructure. With over 30 years of experience in the K-12 education sector, Michael understands these hurdles firsthand. His deep insight into the constraints faced by SLED organizations enables him to guide decision-makers through the complexities of implementing new solutions.

In the cybersecurity space, where threats evolve rapidly, Michael helps SLED customers navigate the landscape while working within the confines of limited resources and procedural barriers. His “been there, done that” experience ensures that SLED clients overcome challenges and adopt essential technologies.

[1 CPE] The Intersection of AI and Cybersecurity

  Presented by Gregory Pepper, Security Architect • Check Point

As artificial intelligence (AI) permeates our lives, it’s crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.

[1 CPE] Moving to Agile at Gonzaga: Lessons Learned

  Presented by Borre Ulrichsen • Chief Information Officer, Gonzaga University

Gonzaga is seeing an increasing need for flexibility and agility in implementing and supporting information technology in a higher education environment that is constantly evolving. In this session, Borre Ulrichsen, Chief Information Officer, will cover the drivers behind Gonzaga’s transition to agile, how information technology worked with the community during the transition, and some of the benefits the university is reaping from this new way of working.

Borre Ulrichsen has served as the Chief Information Officer at Gonzaga University since August 2016. From 2011 to 2016 he was the Chief Information Officer and Associate Vice President for IT Services at California State University, East Bay. From 2002 to 2011, he was the Director of Information Systems Projects at San Francisco State University. Previous to that he held various IT leadership roles in the private sector. Borre completed his MBA at the Haas School of Business at UC Berkeley. He also earned a master’s degree in engineering from the Norwegian University of Science and Technology.

[1 CPE] AI Unleashed: Navigating the AI Landscape for Responsible Adoption

  Presented by Hunter Helfgott, AI Adoption Specialist, & Kevin Heide, Director of Technical Sales • Cerium Networks

In today’s digital era, AI is not just a buzzword but a robust toolset that, when wielded with precision, can unlock unprecedented value and competitive advantage. As we embark on this journey, we must anchor our strategies in the bedrock of security, ensuring that our AI systems not only enhance our capabilities but also safeguard our assets. This presentation explores practical steps to weave AI into our business fabric, turning challenges into a springboard for growth and innovation. Our goal is to present you with concepts and avenues to consider as you learn to navigate your adoption. Let’s embark on this journey to harness AI’s potential responsibly and effectively.

[1 CPE] LIVE Hack: Unmasking AI’s Dark Side

  Presented by Wayne Johnson, CEO • Stellar & iT1 Source

In this eye-opening presentation, we will delve into the darker applications of artificial intelligence, specifically focusing on its potential to craft malicious code and generate deceptive voice replicas. As AI continues to evolve, its capabilities extend beyond beneficial innovations, posing significant ethical and security challenges. This session aims to shed light on how AI can be manipulated to perform nefarious tasks, such as writing harmful software or impersonating voices with high accuracy. Through live demonstrations and critical discussions, we aim to equip the audience with a comprehensive understanding of these risks and foster a dialogue on developing robust countermeasures and ethical guidelines to prevent misuse of AI technologies. Join us as we explore the shadowy corners of AI applications, understanding their implications and preparing for a secure technological future.

[1 CPE] Disaster Preparedness and Data Protection Strategies for Business Continuous Availability

  Presented by Matthew Kern, Sales Engineer • Arcserve

As natural disasters like hurricanes, wildfires, and severe winter events become more frequent and intense, businesses face increasing economic and operational challenges. High-profile disasters, including the Camp Fire in 2018, which incurred a staggering $16.5 billion in damages, and Hurricane Maria’s profound impact on Puerto Rico, estimated at $139 billion for full recovery, underscore the escalating financial stakes.

This presentation will explore effective strategies to bolster business resilience in the face of natural catastrophes.

Key elements of the session will include:

  • Critical insights from Arcserve’s annual global research study on disaster preparedness.
  • A comprehensive Disaster Preparedness Checklist tailored for companies.
  • Practical tools designed to safeguard business operations and data resilience.

We will delve into the details of a 5-step disaster and ransomware recovery plan template, as well as the 3-2-1-1 backup strategy, which ensures robust data recovery through multiple backup copies stored both locally and offsite. By implementing these strategies, businesses can minimize financial losses, reduce operational downtime, and achieve a rapid recovery, thereby ensuring continuity even during catastrophic events. This session aims to arm business leaders with the essential tools and knowledge to safeguard their enterprises amidst an increasingly unpredictable global landscape.

[1 CPE] AI in Cybersecurity: Navigating the Double-Edged Sword

  Presented by Johan Bloomhart, Principal Sales Engineer • WatchGuard & BlackPoint IT

The rise of Artificial Intelligence (AI) has introduced both transformative opportunities and unprecedented risks to the cybersecurity landscape. While AI is a powerful tool for automating threat detection and enhancing security protocols, it also presents new avenues for cybercriminals to launch more sophisticated attacks. In AI in Cybersecurity: Navigating the Double-Edged Sword, we’ll explore AI’s dual impact—empowering both defenders and attackers—and discuss how to harness AI responsibly to protect against emerging threats.

This session will cover:

  • An overview of AI’s evolution and its prominence in the modern business world.
  • How malicious actors exploit AI for nefarious purposes, and the vulnerabilities that arise.
  • How cybersecurity professionals use AI to fortify defenses, identify threats, and mitigate risks.
  • Predictions for AI’s long-term influence on the security industry.
  • The latest technological tools and techniques that can mitigate the risks posed by AI.

We’ll also offer guidance on developing an artificial intelligence policy that allows your organization to leverage AI’s productivity benefits while minimizing risks to data security. Participants will walk away with actionable insights into how to implement AI securely in their business, staying ahead of both competitors and cyber threats.

[1 CPE] Are You AI Ready? Securing M365 Copilot

  Presented by Structured

This presentation dives into the transformative potential of Generative AI (GenAI) and Microsoft’s M365 Copilot. We’ll cover the fundamental differences between GenAI and Machine Learning, highlighting GenAI’s ability to create new content and its applications across various industries. We’ll also provide an in-depth look at Microsoft Copilot, showcasing its role in enhancing productivity through intelligent suggestions and automation. Additionally, we’ll introduce a comprehensive Copilot Assessment service designed to evaluate an organization’s readiness for AI integration, focusing on IT infrastructure, security, data governance, and compliance. Emphasis is placed on ensuring secure integration and adherence to global data privacy standards, making it a critical resource for organizations embarking on their AI journey.