[1 CPE] Bridging Zero Trust and SASE: A Unified Approach to Modern Cybersecurity

  Presented by Fortinet

This will be a panel discussion on how organizations can effectively bridge Zero Trust and SASE to create a unified, adaptive cybersecurity architecture that meets the demands of today’s hybrid workforce and threat landscape.

Key Takeaways:

  • Understand the core principles of Zero Trust and SASE, and how they complement each other.
  • Learn practical strategies for implementing a unified approach without adding complexity or disrupting operations.
  • Gain insights into real-world use cases and lessons learned from organizations successfully integrating these frameworks.

Moderator: Michael Lippman, Regional Channel Systems Engineer, Fortinet

Speakers:

  • Brahma Moholkar, Systems Engineer, Fortinet
  • Christian Ruediger, Account Manager, Fortinet
  • Greg Still, CEO, Xiologix

[1 CPE] Go Hack Yourself: War Stories from over 170,000 Pentests

  Presented by Tony Taylor, Sr Solutions Architect • Horizon3.ai

Join Tony Taylor, Senior Solutions Architect, for an engaging session on “Offense-Driven Defense.” Raakish will challenge conventional risk assessment practices and unveil how focusing on real-world exploitability and impact can revolutionize your security approach. Drawing from insights gathered across more than 170,000 autonomous pentests, he’ll share compelling stories and actionable lessons that show how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and strengthen your defenses against advanced threats. Don’t miss this opportunity to learn from a leading industry practitioner on why it’s time to “go hack yourself” and build resilience in today’s borderless threat environment.

[1 CPE] Cybersecurity: Emerging Threats & Defenses

  Presented by Jim Ambrosini, Director of Advisory Services • CompassMSP

In this session, cybersecurity expert Jim Ambrosini will cover critical topics, including the evolving nature of cybersecurity threats, emerging defenses against these threats, and the role of senior management in enhancing cybersecurity. You will learn about recent high-profile breaches, the factors contributing to increased risks, and practical strategies for identifying vulnerabilities and responding to incidents effectively. This session will delve into the implications of artificial intelligence on cybersecurity, threats such as ransomware and deepfakes, and the importance of robust cybersecurity governance. Case studies will provide real-world insight into breach responses, highlighting effective measures and mistakes made while emphasizing the need for continuous monitoring and proactive risk management.

[1 CPE] Enhancing Cyber Resilience for Active Directory (and Entra ID)

  Presented by Rob Ingenthron, Sr Solution Engineer • Semperis

Cyberattackers are adept at finding ways through your defenses and into identity systems like Active Directory. Many organizations use Active Directory as the primary identity service, and Active Directory is typically tied into almost everything, including Entra ID. From there, they can move laterally, escalate privileges, access sensitive resources, and inject malware or ransomware. Implementing a layered defense that includes identity threat detection and response (ITDR) is key to protecting your operational resilience.

Join Rob Ingenthron, Sr Solution Engineer, to learn:

  • How layered defense has changed over time
  • Why ITDR is now an essential part of a robust layered defense strategy
  • The continuing importance of hygiene and auditing for Active Directory
  • How a layered defense can help you combat attacks that are designed to bypass traditional methods of defense
  • Which best practices lead to a strong layered defense

[1 CPE] Securing the Future: Cyber Risk Insurance Essentials in an AI-Driven Digital Landscape

  Presented by Matt Moss, Sr Sales Engineer • ESET

As AI reshapes the digital world, cyber threats are growing in scale and complexity. This session explores the essentials of cyber risk insurance—who’s at risk, why coverage matters, and how AI is transforming both the threat landscape and defense strategies. Learn how to leverage AI for proactive protection and how to safeguard your organization.

[1 CPE] Cyber Threat Landscape for H1 2025: Insights from ESET Telemetry

  Presented by Matt Moss, Sr Sales Engineer • ESET

Explore the key cybersecurity trends shaping H1 2025 in North America. This session covers headline threats including fake error scams (ClickFix), evolving ransomware tactics, and the rise of NFC malware. Gain actionable insights to strengthen your security posture.

[1 CPE] Securing AI Without Slowing Innovation: A Blueprint for the Future of Cybersecurity

  Presented by Alex Ruff, Principal Solutions Engineer • Trend Micro

AI is transforming the enterprise—bringing new opportunities for efficiency, but also introducing unprecedented risks. From prompt injection and model poisoning to shadow AI and deepfakes, the attack surface is evolving faster than most IT teams can keep up. In this session, we’ll explore Trend Micro’s Security for AI Blueprint, a step-by-step framework for protecting data, models, infrastructure, and users in an AI-driven world. You’ll also see how Trend Micro leverages AI across its own cybersecurity platform, combining decades of research with modern generative AI to deliver proactive protection. Walk away with practical strategies you can apply to safeguard your organization’s AI initiatives—without putting innovation on hold.

[1 CPE] Adapting Detection & Response: MDR vs SOC Partnership in Evolving Threat Environments

  Presented by James Podziomek, Solutions Engineer, Marco Technologies & Ryan LaBarre, Account Executive, Arctic Wolf

Join us for a strategic deep dive into today’s evolving cybersecurity threat landscape. We’ll explore the distinct advantages of Managed Detection and Response (MDR) versus traditional Security Operations Center (SOC) partnerships, and provide actionable insights to help organizations strengthen their defenses. This session highlights Marco’s collaboration with Arctic Wolf to deliver advanced, cost-effective security operations and incident response—tailored to dynamic risk profiles, regulatory demands, and the realities of modern IT environments.

[1 CPE] Cyber Risk Associated with Quantum Computing

  Presented by BJ Deonarain, Global Alliance Cybersecurity Solutions Director • Hitachi Vantara

Quantum computers can break today’s standard encryption algorithms (RSA, ECC) in minutes relative to time using Shor’s/Grover algorithm. “Harvest Now, Decrypt Later” attacks allow adversaries to steal encrypted data now and crack it when quantum computers mature. Quantum systems themselves are vulnerable to new attack vectors, quantum hacking (side-channel, noise-based), quantum malware, and manipulation of qubit stability. Supply chain attacks targeting quantum hardware, proprietary algorithms, and insider threats are rising as nation-states and cybercriminals escalate espionage efforts. Urgent need for quantum-resistant cryptography and robust quantum cybersecurity measures as quantum adoption accelerates.

BJ Deonarain is a globally focused cybersecurity executive responsible for driving cyber security and cyber resiliency strategy at Hitachi Vantara. With a career spanning technical innovation, client solutions, and cross-functional leadership, BJ combines deep technical expertise with a client-centric approach to mitigate risk and elevate organizational security postures.

[1 CPE] Networking Tips and Best Practices for C-Suite to Jr Admin

  Presented by Robert Phelps, Systems Engineer, Customer Engineering • Arista Networks

Modern IT networks are a living entity that requires care and feeding. If the infrastructure, tooling, and staff are neglected or taken for granted, loss of network resiliency, increased tool sprawl, and staff exodus are inevitable. Take one or more of these recommended tips in-house to make your network more resilient, easier to manage, and foster an IT working environment that will keep top talent on board for years to come.