[1 CPE] New Era of Deception: AI, Deep Fakes, and the Dark Web

  Presented by Morgan Trust, Associate Penetration Tester • FRSecure

Explore how artificial intelligence is fueling a new wave of cyber deception through deep fakes, social engineering, and dark web activity. In this session, Morgan Trust, Associate Penetration Tester at FRSecure, will uncover real-world examples and emerging threats while offering strategies to spot and defend against them. Gain the knowledge you need to navigate this evolving landscape with confidence.

As an Associate Penetration Tester at FRSecure, Morgan brings five years of experience and holds both the eLearnSecurity Junior Penetration Tester and CompTIA Security+ SY0-601 certifications to the table. Morgan is an extremely valuable asset to the team who works directly on the front lines with FRSecure’s clients. In his free time, Morgan enjoys Capture the Flag competitions, weightlifting, cooking/baking, dancing, listening to music at max volume, hiking, thrifting, and spending time with family.

[1 CPE] Beyond Cybersecurity: Assembling Resiliency for the Inevitable Breach

  Presented by BJ Deonarain, Global Alliance Cybersecurity Solutions Director • Hitachi Vantara

The Imperative for Resiliency, 100% cyber security is unachievable; breaches are inevitable, where modern threats demand a shift from reactive defense to proactive resilience. Resilience requires mindset and culture change, not just new technology, while focus can sustain operations and limit damage when security fails.

Assembling the resiliency strategic pillars and actions:

  • Risk Assessment: continuous evaluation of assets and vulnerabilities
  • Incident Response: develop, test, and update comprehensive crisis plans
  • Employee Training: ongoing education to make staff the first line of defense
  • Systems Testing: regular audits, penetration tests, and vulnerability scans
  • Partnerships: collaborate with industry experts for knowledge sharing
  • Culture: embed resiliency throughout the organization at every level

BJ Deonarain is a globally focused cybersecurity executive responsible for driving cyber security and cyber resiliency strategy at Hitachi Vantara. With a career spanning technical innovation, client solutions, and cross-functional leadership, BJ combines deep technical expertise with a client-centric approach to mitigate risk and elevate organizational security postures.

[1 CPE] Has Security Awareness Been Forgotten? An Interactive Panel Discussion

  Presented by INTERFACE Advisory Council

“Just automate that process! The firewall is fine—we’ve got an AI tool watching it.”

Sound familiar? Despite significant investments in cybersecurity and advanced tools, the human element remains one of the greatest vulnerabilities in any organization. This isn’t a new problem—ransomware attacks continue to thrive due to human error.

Insider threats, whether intentional or accidental, are often at the root of security breaches. So, what proactive steps are you taking to mitigate these risks?

Join the INTERFACE Omaha Advisory Council for an engaging discussion on defending against internal threats. Local IT leaders will share their strategies, lessons learned, and practical tips for minimizing human error in cybersecurity. Bring your questions and join the conversation as we explore what’s working, what’s not, and what more needs to be done to protect our networks from within.

Panelists:

  • Rob LaMagna-Reiter, Chief information Security Officer, Woodman Life
  • Dr. Lisa McKee, Assistant Professor Cybersecurity, Bellevue University
  • Memory Trosper, Sr Director, Technology Services, Gothenburg Health
  • Dana Turner, Chief Information Security Officer, Union Bank and Trust

[1 CPE] Real-Time Threat Mitigation with AI-Driven SASE: A Practical Approach

  Presented by Joe Fontes, Sales Engineer, PNW • Cato Networks

This discussion highlights the current threat landscape associated with current AI tools and how those same foundational technologies can be used to automate threat responses. We will delve into an understanding of current adversaries, an overview of existing defenses, and strategies on extending current defense postures.

[1 CPE] AI in the Eyes of the Threat Actors vs. the Cyber Defense Line

  Presented by Kelly Brazil, Sr Director, Security Architects • Juniper Networks

In today’s cybersecurity world, AI is making fast moves to improve the defense line, but adversaries are also using AI to build attacks faster and be more precise in entering the victim. Social Engineering, targeted phishing attacks where the text is generated by GenAI engines – make it even simpler to get in.

To overcome what is offered as Attacks as a Service, the Security barrier needs fully meshed security policies, in-line Malware detection powered by AI, and effective ways to identify and mitigate Zero Day Attacks. The goal is to defend an Enterprise faster than the adversaries are moving and mitigate potential breaches by real-time/in-line defense.

Kelly Brazil runs the global Security Specialist Architects team at HPE Juniper Networks. Kelly has 25+ years of experience in cybersecurity and has previously held technical leadership roles at Palo Alto Networks, Fortinet, and various successful security startups. He has traveled the globe as a public speaker evangelizing the latest trends in cybersecurity. Kelly is also active in the Open-Source Software (OSS) community and has developed DevOps automation tools in use by developers, systems administrators, and security practitioners around the world.

[1 CPE] Wi-Fi 7 Unleashed: Powering the Next Generation of Connectivity

  Presented by Josh Jaster, SMB Sales Engineering Manager • HPE Aruba Networking

Wi-Fi 7 is just the beginning. The HPE Aruba Networking 700 Series Access Points go beyond the standard with higher capacity, denser IoT support, advanced wired security with MACsec, software-configurable radios, and more. Powered by AOS-10 and Aruba Central, every Wi-Fi 7 model adds AI-driven optimization, sustainability automation, and deep client insights. The result is a unified platform that transforms next-gen wireless into the foundation for real-time business, IoT innovation, and future-ready connectivity. Join us to discover how the 700 Series goes beyond Wi-Fi 7 to deliver the performance, intelligence, and security your network demands.

[1 CPE] Modernizing the SOC: Transforming your Security Operations

  Presented by JR Silverthorne, Partner Solutions Consultant, West • Palo Alto Networks

So many industry players want to speak to and about tool consolidation and a platformization play in the cybersecurity space. We want to examine the classical SOC model and turn it on its head and reveal how a suite of capabilities enable root cause analysis, risk context, correlation, and automation across an open platform that accepts the widest and largest variety of data sources from the endpoint to the data center to the cloud. Our approach –– Xtended Security Intelligence Automation Management.

If your interest is in achieving the lowest MTTR and MTTD, if you want to detect security incidents and remediate faster, then your path forward has to unify workflows, utilize embedded intelligence, and provide automated responses. Let us show you how Palo Alto with 20,000 employees operates their SOC with just 15 people.

[1 CPE] AI Agents & Automation: How They’re Changing the Way We Work

  Presented by Hunter Helfgott, AI Solutions Consultant • Cerium Networks

AI-powered agents are generating a lot of buzz. But what do they actually do?

In this session, you will see how organizations are starting to use AI-powered agents to solve business challenges and create new opportunities. We’ll cover advanced tools like custom GPTs, Copilot Studio, and Azure AI Foundry and see how they can be leveraged to drive AI innovation and streamline workflows. This session offers a deep dive into automation’s role in simplifying complex processes, enhancing customer experiences, and improving productivity.

[1 CPE] From Frameworks to Firewalls: A Practical Guide to AI Security

  Presented by Collin Miller • Director, Cloud Security, Structured

As organizations accelerate AI adoption, the security landscape is evolving just as quickly. This presentation explores the foundations of AI security, starting with an overview of emerging AI-specific threats and the importance of structured defense approaches. We will examine leading frameworks—MITRE ATLAS and the NIST AI Risk Management Framework—and how they guide organizations in identifying, assessing, and mitigating AI risks.

We will then focus on Microsoft 365 Copilot, outlining its security architecture and built-in protections, followed by a technical case study on the Echo Leak vulnerability, demonstrating real-world exploitation risks. s a bonus, we will also take a look at the recent SalesDrift vulnerability, and the growing attack surface around LLM chatbot integration and supply chain risks.

Finally, we will provide an overview of Structured’s AI security service offerings. Attendees will gain both strategic insights and practical approaches to securing AI systems, preparing them to meet the challenges of an AI-powered future.

Collin Miller has over two decades of experience in networking and IT security — installing and supporting various types of security software and hardware. He has demonstrated skills in project management, evaluating new security technologies, testing, troubleshooting, and developing procedures and policies for new systems and technology. His past areas of focus include Mobile Device Management and Security, Data Loss Prevention, Zero Trust Network Access, Next-Generation Firewall, and Security Event and Information Management. His current area of focus is Cloud Security

[1 CPE] Threat Detection: Intelligence Insights from the Front Lines

  Presented by David Pier, Sr Sales Engineer • Zscaler

In 2024, Red Canary detected nearly 93,000 threats—an increase of more than a third from the previous year—driven by expanded visibility into cloud and identity infrastructure. For the seventh year, our Threat Detection Report analyzes the most prevalent cyber threats, evolving attack techniques, and the incidents we help customers resolve.

This session will highlight key trends, including email threats, infostealers, and LLM hijacking in the cloud, while breaking down the top 10 MITRE ATT&CK® techniques and most prevalent threats in customer environments. Attendees will gain actionable insights into detection, testing, and prevention strategies to enhance their security posture against today’s evolving threats.