[1 CPE] Global Insights on Identity Security Maturity: Why it Matters? Why Now?

  Presented by Jed Knopf, Solutions Architect • CyberArk

In our global survey of 1,500 identity-related security experts, we found only 9% of organizations have the highest level of maturity. These Transformative organizations have the most mature identity security programs as they strategically focus on four key tenets: tools, integration, automation, and continuous threat detection & response. As a result, these organizations significantly outperform their competition in driving business outcomes and reducing risk. Learn how you can mature your identity security program because the future of security starts with identity.

Key Session Takeaways:

  • Top challenges for identity security
  • The four tenets of identity security
  • How to take a holistic approach to identity security
  • Key considerations in evaluating identity security providers

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Eric Vanderbur, Global Solutions Architect • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

[1 CPE] Rapid Growth of Unstructured Data Across Industries and the Challenge of Protecting It

  Presented by Paul Swanson, Account Executive, PLS NAS • Rubrik & Structured

In today’s digital economy, nearly every industry is finding that data is becoming increasingly critical to its core business success. Data enables innovation and discovery, powers advances in artificial intelligence and machine learning, and drives medical and earth-science breakthroughs. Most of the collective data fueling today’s technological and scientific advances consists of unstructured data files – trillions of them. For effective stewardship of both infrastructure and data, IT needs to have insight into the depth and breadth of your organization’s unstructured datasets and the workflows that use them. Join this session for a discussion of the rapid growth of unstructured data across industries and the challenge of protecting it.

[1 CPE] Modernizing Physical Security

  Presented by Verkada & Structured

In this session, we’ll look at the technologies at the forefront of enterprise building security. Connected security devices can provide users with real-time insights and a full picture of the health and safety of their environments. We’ll explore how to minimize security risks, workplace frustrations, and costly inefficiencies with best–in–class solutions that provide a scalable way to easily configure, monitor and respond to events from anywhere. Learn how modernizing your physical security can help you seamlessly safeguard the physical world –– without sacrificing privacy –– to operate safer, smarter buildings.

[1 CPE] Cybersecurity and Compliance For 2024

  Presented by Rob Wayt, Director of Governance, Risk, and Compliance • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI and security best practices. This discussion will focus on security solutions to these challenges, including penetration testing and zero trust implementations. Rob Wayt, Director of Governance, Risk, and Compliance at Structured will be the presenter.

[1 CPE] Global Insights on Identity Security Maturity: Why it Matters? Why Now?

  Presented by Brian Roberts, Sr Solutions Engineer • CyberArk

In our global survey of 1,500 identity-related security experts, we found only 9% of organizations have the highest level of maturity. These Transformative organizations have the most mature identity security programs as they strategically focus on four key tenets: tools, integration, automation, and continuous threat detection & response. As a result, these organizations significantly outperform their competition in driving business outcomes and reducing risk. Learn how you can mature your identity security program because the future of security starts with identity.

Key Session Takeaways:

  • Top challenges for identity security
  • The four tenets of identity security
  • How to take a holistic approach to identity security
  • Key considerations in evaluating identity security providers

Brian Roberts is a motivated, technically-minded individual with 12 years of solutions engineering experience ranging from backup and disaster recovery to identity security. He primarily focuses on Privilege Access Management and Least Privilege Enforcement with self-hosted and cloud assets.

[1 CPE] Opportunities & Risks for Industries: Generative AI Models

  Presented by Joe Vadakkan, President, Southwest Arizona Chapter • Cloud Security Alliance

Generative AI models can perform tasks that traditionally require creativity and human understanding. They learn patterns from existing data during training and can subsequently generate new content, such as texts, images, and music, that follow these patterns. Due to their versatility and generally high-quality results, they, on the one hand, represent an opportunity for digitalization. On the other hand, the use of generative AI models introduces novel IT security risks that need to be considered for a comprehensive analysis of the threat landscape in relation to IT security. We will be diving into risk analysis, measures, and operational models associated with utilizing Gen AI.

[1 CPE] Zero Trust Microsegmentation: It’s Easier Than You Think

  Presented by Ben Collar, Senior Systems Engineer • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

[1 CPE] The Decarbonization of the Data Center

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Balancing the need for substantial data infrastructure with more eco-friendly policies should be top of all organizational to-do lists. Rather than a competition between corporations, these initiatives should be focused on the larger benefit of a healthier world. That’s why creating a specific data center decarbonization strategy will be key. This will range from improving the visibility and measurement of power usage, to actually reducing the carbon footprint of each operational layer. But where should organizations begin?

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

[1 CPE] Demystifying Microsoft Copilot: Preparing for Successful Deployment

  Presented by Wil Herrera, CTO & Alex Esterly, Sr Solutions Architect  • iT1 Source

This session will provide a comprehensive exploration of Copilot for Microsoft 365. Attendees will gain insights into maximizing their effectiveness along with how to deploy, ensuring successful integration into all aspects of your tasks and workflows while addressing ethical considerations and maximizing productivity.