[1 CPE] Fortifying Data Resilience: When Backups Become Back Doors to Cyberthreats

  Presented by Rick Vanover, Vice President of Product Strategy • Veeam

Ransomware threats don’t discriminate. And as the industry’s leading provider of data resilience solutions, we’ve seen it all. Public sector organizations are just as likely to be targeted as those in the private sector, and the stakes can be even higher. Veeam’s latest Ransomware Trends Report exposes critical vulnerabilities and highlights why relying solely on backups is no longer enough to ensure resilience. In this session, Veeam’s VP of Product Strategy, Rick Vanover, will unpack the most common oversights that leave organizations — government, education, healthcare, and beyond — exposed to cyber threats, especially when backups become an overlooked back door in your security strategy.

Drawing from real-world incidents and hard-earned lessons, Rick will share what he wishes every IT professional knew before facing a ransomware or security breach event. You’ll leave with actionable insights, practical guidance, and research-backed recommendations to help you strengthen your data resilience. Whether you’re securing sensitive public sector data or safeguarding private enterprise information, this session will equip you to prepare for tomorrow’s threats today.

[1 CPE] History of Firewall Technology: From Packet Filtering to Application Control

  Presented by Hubert Ralph Bonnell, CISSP, CCSM – Security Engineer • Check Point Software

Let’s take a stroll through memory lane as we explore the history of the network firewall. This session explores the core technology behind packet filtering, proxies, stateful inspection, and application layer controls. Also covered are some of the fundamental differences between the firewalls on the market today.

[1 CPE] Securing Data Flow in the AI-Quantum Era

  Presented by Steve Riley, Vice President, Field CTO • Netskope

Sensitive data movement poses risks, but outright restriction can hinder operations. Organizations need agile security frameworks to protect data in the AI and quantum era. This session explores modern security platforms that enable secure data flow and prepare for post-quantum encryption (PQE).

Join this session to learn:

  • Choosing secure access methods for diverse use cases
  • Adapting security to risk, user behavior and AI interactions
  • Preparing for post-quantum encryption’s enterprise impact

[1 CPE] Breaking Down Silos: Unify Assets, Minimize Attack Exposure

  Presented by Michael Rockey, Sr Sales Engineering Manager • Axonius

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.

Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.

As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.

[1 CPE] Will AI Take Your Job? How Do You Ensure It Doesn’t?

  Presented by Joe Skeen, Solutions Architect • CompuNet

As artificial intelligence continues to evolve, its impact on the workforce is becoming increasingly profound. This presentation explores the reality behind the provocative claim that “AI will take your job,” examining which industries and roles are most at risk and which are poised for growth. Attendees will gain insights into the skills that are becoming obsolete, the capabilities that remain uniquely human, and the emerging opportunities in an AI-driven economy. The session will provide practical strategies for adapting to technological disruption, including upskilling, embracing digital tools, and cultivating resilience. Participants will leave with a clear understanding of how to future-proof their careers and thrive in the age of intelligent machines.

[1 CPE] Hacking on a Budget: Maximizing Impact with Open-Source Security Tools

  Presented by Topher Lyons, Solutions Engineer • Sprocket Security

This presentation offers an illuminating glimpse into the open-source and free tools utilized by cybersecurity professionals for comprehensive security assessments. We will walk through how tools like Masscan, Nuclei, Impacket, Roadtools, Burp Suite Community Edition, and OWASP ZAP are applied across the essential phases of ethical hacking: reconnaissance, enumeration, exploitation, credential spraying, and web application testing. This talk is designed to build awareness of the sophisticated techniques and widely respected resources employed by experts in the field, providing valuable insights into the practical aspects of offensive security without the expectation of immediate proficiency.

[1 CPE] Operation Cyber Idaho: Modernizing Cyber Defense Statewide

  Presented by Jerred Edgar • Chief Information Security Officer, State of Idaho

Operation Cyber Idaho is an initiative focused on improving Idaho’s cyber resilience through Idaho Readiness Training (IRT), cyber infrastructure services, and collective defense. This program aims to modernize infrastructure by establishing the Idaho Readiness Training program, developing a cybersecurity workforce via a statewide apprenticeship program, and offering comprehensive cyber infrastructure services such as threat detection, vulnerability scanning, and remediation efforts.

Jerred serves as the Chief Information Security Officer for the Idaho Office of Information Technology Services. Jerred has over 24 years of military service, with 20 of those years focused on managing, overseeing, and developing secure and redundant cyber capabilities for military operations within contested environments.

Before retiring, he served as the Director of Cyber Innovative Readiness Training (IRT) for the Idaho Army National Guard (IDARNG), where he established a strategic partnership across Idaho and within the Department of Defense. This partnership facilitated cyber assessments, consultations, and assistance by leveraging military readiness objectives, funding, and personnel from 2019 through 2024. Prior to this role, he held various leadership positions within the 116th Cavalry Brigade Combat Team (CBCT). His responsibilities included managing the 116th CBCT’s enterprise communication suite for numerous training exercises and modernization efforts, two National Training Center rotations, Operation Saber Guardian 2016, and participating in two combat deployments since 2001.

[1 CPE] How to Spend Wisely on Your IT Needs in Boise: An Interactive Panel Discussion

  Presented by INTERFACE Advisory Council

Your budget has shrunk, and vendor costs have risen. Sound familiar?

So many IT leaders in Boise are dealing with the challenges of vendor acquisitions that produce huge cost increases. At times it can seem there is no way to achieve everything expected with the budget allotted. How does anyone succeed in this environment?

Boise isn’t home to the largest corporations in the country, and your IT budget reflects that. In this panel discussion, the BOISE Advisory Council will share their tricks to maximizing the impact of the money you have to spend. Please join us for an open discussion that will include your questions. We will share experiences in working with vendors, stretching a dollar, and finding alternatives to huge price increases from the vendor community.

Moderator: Will Miller, Sr IT Manager, Idaho Transportation Dept

Panelists:

  • Lloyd Barron, Chief Information Security Officer, ID Secretary of State
  • Josh Borglund, Manager, Information Technology, Aviation Specialties Unlimited
  • Kevin Malloy, Chief Technology Officer, Dynamis Energy, LLC
  • Robert Peterson, Information Technology Director, Washington County, ID

[1 CPE] AI Agents & Automation: How They’re Changing the Way We Work

  Presented by Abram Erickson, Lead Data & AI Engineer, and Hunter Helfgott, AI Solutions Consultant • Cerium Networks

AI-powered agents are generating a lot of buzz. But what do they actually do?

In this session, you will see how organizations are starting to use AI-powered agents to solve business challenges and create new opportunities. We’ll cover advanced tools like custom GPTs, Copilot Studio, and Azure AI Foundry and see how they can be leveraged to drive AI innovation and streamline workflows. This session offers a deep dive into automation’s role in simplifying complex processes, enhancing customer experiences, and improving productivity.

[1 CPE] Go Hack Yourself: More War Stories from over 150,000 Pentests

  Presented by Tony Taylor, Sr Solutions Architect • Horizon3.ai

Join Tony Taylor, Senior Solutions Architect, for an engaging session on “Offense-Driven Defense.” Tony will challenge conventional risk assessment practices and unveil how focusing on real-world exploitability and impact can revolutionize your security approach. Drawing from insights gathered across more than 150,000 autonomous pentests, he’ll share compelling stories and actionable lessons that show how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and strengthen your defenses against advanced threats. Don’t miss this opportunity to learn from a leading industry practitioner on why it’s time to “go hack yourself” and build resilience in today’s borderless threat environment.