[1 CPE] Taking A Data-First Approach to Cyber Risk Management

  Presented by Austin Starowicz, Director, Solutions Consulting • Mastercard Cybersecurity

Cyber Risk Management has evolved. Every new vulnerability or regulation adds further pressures on already stretched teams to predict and manage the weakest links within your internal IT infrastructure. Piling on to today’s cyber risk landscape is the ever-expanding digital supply chain, and the need to onboard, assess, and monitor third parties, fourth parties, and Nth parties.

But does it really have to be that way?

Join this session from Mastercard Cybersecurity for an exclusive presentation on how a proactive “data-first” approach to cyber risk management can help you:

  • Improve monitoring for critical vulnerabilities to determine which ones really matter
  • Identify, Prioritize and Assess affected third parties in real-time
  • Leverage objective risk data into the decision-making processes
  • Streamline workflows and scale your operations

[1 CPE] A Complete Security Blueprint

  Presented by Chad Spoden, Solutions Architect Manager • FRSecure

In an era of increasingly sophisticated and relentless cyber threats, organizations must take a strategic and structured approach to security. This blueprint offers a comprehensive roadmap for building and maturing a security program—from establishing a solid foundation to addressing advanced threats and ensuring long-term resilience. Designed to be practical and accessible, it emphasizes clarity, prioritization, and continuous improvement. Whether you’re launching a new initiative or refining an existing program, this guide highlights key considerations and provides actionable insights to strengthen your security posture and stay ahead of evolving risks.

[1 CPE] Architecture Matters: What You Need to Know When Evaluating SASE & SSE Solutions

  Presented by Rehman Khan, Director, Cyber Architecture & Engineering • Netskope

SASE and SSE are more than just buzzwords; they represent the future of network and security. But before you entrust all your critical traffic to these cloud solutions, a deeper dive into their underlying architecture is essential. Not all clouds are created equal, and understanding the nuances of these solutions, which are built on the global internet, is paramount for success.

This session will empower attendees with the crucial architectural questions to ask your SASE/SSE providers, ensuring you make an informed decision. We’ll explore:

  • Public vs. Private Cloud: What are the implications for your data and performance?
  • Server Locations: Where are security services hosted, and why does proximity matter?
  • Network Architecture: How is the provider’s network built and managed for optimal reliability and speed?
  • Capacity Management: How do they scale to meet your evolving demands and ensure consistent performance?
  • Performance Measurement: What metrics should you track, and how do providers guarantee their SLAs?
  • Incident Response: What happens when something breaks, and how quickly can services be restored?

Arm yourself with the right questions to build a secure and high-performing SASE/SSE future.

[1 CPE] Cyber Risk Associated with Quantum Computing

  Presented by BJ Deonarain, Global Alliance Cybersecurity Solutions Director • Hitachi Vantara

Quantum computers can break today’s standard encryption algorithms (RSA, ECC) in minutes relative to time using Shor’s/Grover algorithm. “Harvest Now, Decrypt Later” attacks allow adversaries to steal encrypted data now and crack it when quantum computers mature. Quantum systems themselves are vulnerable to new attack vectors, quantum hacking (side-channel, noise-based), quantum malware, and manipulation of qubit stability. Supply chain attacks targeting quantum hardware, proprietary algorithms, and insider threats are rising as nation-states and cybercriminals escalate espionage efforts. Urgent need for quantum-resistant cryptography and robust quantum cybersecurity measures as quantum adoption accelerates.

BJ Deonarain is a globally focused cybersecurity executive responsible for driving cyber security and cyber resiliency strategy at Hitachi Vantara. With a career spanning technical innovation, client solutions, and cross-functional leadership, BJ combines deep technical expertise with a client-centric approach to mitigate risk and elevate organizational security postures.

[1 CPE] Cybersecurity Defense Strategies

  Presented by Scott Beasley, Cybersecurity Solutions Architect • Comcast Business

What are the common threats organizations face and how do these threats get into the network? Join this session to learn what you can do to slow down attackers and mitigate threats when you are attacked. We’ll review the types of services organizations need to help defend against attacks and where to find them.

[1 CPE] Go Hack Yourself: More War Stories from over 150,000 Pentests

  Presented by Ramzi Harb, Sr Solutions Architect • Horizon3.ai

Join Ramzi Harb, Senior Solutions Architect, for an engaging session on “Offense-Driven Defense.” Ramzi will challenge conventional risk assessment practices and unveil how focusing on real-world exploitability and impact can revolutionize your security approach. Drawing from insights gathered across more than 150,000 autonomous pentests, he’ll share compelling stories and actionable lessons that show how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and strengthen your defenses against advanced threats. Don’t miss this opportunity to learn from a leading industry practitioner on why it’s time to “go hack yourself” and build resilience in today’s borderless threat environment.

[1 CPE] Legacy to Modern: Data Migration & Integration for Business Continuity

  Presented by Rami Ramireddy, Chief Executive Officer • ESS

As organizations evolve, aging systems can become a barrier to agility, security, and scalability. This session explores how to transition from legacy platforms to modern ERP environments while maintaining business continuity and disaster recovery readiness. We’ll discuss best practices for data migration, internal system integration, and secure API exposure to external partners—all without referencing specific products or services.

Attendees will gain insights into:

  • Planning and executing data migration with minimal disruption
  • Designing resilient architectures for business continuity
  • Strategies for disaster recovery in hybrid environments
  • Connecting internal systems and exposing data securely via APIs

[1 CPE] Safeguarding Kansas: A Strategic Update on Cybersecurity and Resilience

  Presented by John Godfrey • Chief Information Security Officer, State of Kansas

Join Kansas State CISO, John Godfrey, for an in-depth look at Kansas’ cybersecurity landscape, key threats, and ongoing initiatives to strengthen cyber resilience. This session will highlight recent advancements in security frameworks, interagency collaboration, and strategies to combat emerging risks, such as deepfakes and social engineering. Attendees will gain insights into policy updates, incident response improvements, and future priorities aimed at safeguarding Kansas’ digital infrastructure.

A seasoned cybersecurity executive and entrepreneurial dynamo with 18 years of rich experience, John Godfrey excels in delivering cutting-edge technology and information security strategies. Godfrey has a knack for transforming organizations through modern digital solutions, spurring business enablement, and fostering talent elevation. His unique blend of action-oriented leadership and influential communication has consistently steered executives and boards through periods of organizational metamorphosis.

Demystifying complex technology and making it comprehensible is one of his key strengths. Known for my fervor and transformative leadership, he has spoken at numerous local and national conferences, moderated sessions, featured as a podcast guest, and contributed articles to various magazines and publications.

Presently, he holds pivotal roles as a board member and advisor to boards of directors. Godfrey is actively engaged with the information security community, holding memberships in premier organizations like ISC2, ISSA, ISACA, InfraGard, and more. His academic arsenal includes several industry certifications and is currently pursuing a Doctorate in Cybersecurity with a focus on executive leadership.

[1 CPE] Has Security Awareness Been Forgotten? An Interactive Panel Discussion

  Presented by INTERFACE Advisory Council

“Just automate that process! The firewall is fine—we’ve got an AI tool watching it.”

Sound familiar? Despite significant investments in cybersecurity and advanced tools, the human element remains one of the greatest vulnerabilities in any organization. This isn’t a new problem—ransomware attacks continue to thrive due to human error.

Insider threats, whether intentional or accidental, are often at the root of security breaches. So, what proactive steps are you taking to mitigate these risks?

Join the INTERFACE Kansas City Advisory Council for an engaging discussion on defending against internal threats. Local IT leaders will share their strategies, lessons learned, and practical tips for minimizing human error in cybersecurity. Bring your questions and join the conversation as we explore what’s working, what’s not, and what more needs to be done to protect our networks from within.

Moderator: Holly Giammanco, Director of Information Security, Greater Kansas City Community Foundation

Panelists:

  • Amy Botts, Manager, Information Security Risk, Hallmark Cards, Inc.
  • Bill Kim, Chief Information Security Officer, Security Bank of Kansas City
  • Chris Smalley, Director, Information Technology, Hoefer Welker
  • Melissa Spicer, Director, Cybersecurity, Evergy

[1 CPE] Zero Trust Segmentation: It’s Easier Than You Think

  Presented by Sumi Gorla, Director of Systems Engineering • Illumio

Regardless of how sophisticated a ransomware attack may be, the objective remains the same: exploit a vulnerability and move laterally across your network. In this session, we’ll peel back the layers and walk through simple steps to get started with Zero Trust Segmentation, including:

  • Gaining deep, real-time visibility into where your environment is most exposed
  • Identifying and closing risky ports to reduce your attack surface
  • Making the most of tools already in place—without adding operational complexity

Sumi Gorla is Director of Systems Engineering at Illumio, driving product strategy, field enablement, and customer success across US Central and LATAM. With leadership experience at EMC, Brocade, Citrix, and BigSwitch, she leads high-performing teams to solve business problems and deliver impactful solutions. Sumi bridges technical depth with clear, outcome-driven communication.