[1 CPE] What the Hack is Going On?

  Presented by Tim Medin, Chief Executive Officer • Red Siege

A comprehensive overview of modern cybersecurity threats and how breaches occur. We will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited. There are a lot of vulnerabilities in the wild, and IT administrators and security professionals often focus on the wrong issues because they are easier to monitor or measure. By the end of the presentation, you will have gained valuable insights into the latest cybersecurity threats and how to protect against them.

[1 CPE] Beyond Cybersecurity: Assembling Resiliency for the Inevitable Breach

  Presented by BJ Deonarain, Global Alliance Cybersecurity Solutions Director • Hitachi Vantara

The Imperative for Resiliency, 100% cyber security is unachievable; breaches are inevitable, where modern threats demand a shift from reactive defense to proactive resilience. Resilience requires mindset and culture change, not just new technology, while focus can sustain operations and limit damage when security fails.

Assembling the resiliency strategic pillars and actions:

  • Risk Assessment: continuous evaluation of assets and vulnerabilities
  • Incident Response: develop, test, and update comprehensive crisis plans
  • Employee Training: ongoing education to make staff the first line of defense
  • Systems Testing: regular audits, penetration tests, and vulnerability scans
  • Partnerships: collaborate with industry experts for knowledge sharing
  • Culture: embed resiliency throughout the organization at every level

BJ Deonarain is a globally focused cybersecurity executive responsible for driving cyber security and cyber resiliency strategy at Hitachi Vantara. With a career spanning technical innovation, client solutions, and cross-functional leadership, BJ combines deep technical expertise with a client-centric approach to mitigate risk and elevate organizational security postures.

[1 CPE] Building a Fortress: Why Allowlisting Traffic is Key to Secure Networks

  Presented by Charles Killmer, Sr Security Analyst and Solution Architect • FRSecure

In this presentation, we’ll explore the critical role of allowlisting in enhancing network security. By focusing on controlling both ingress and egress traffic, allowlisting ensures that only trusted traffic is permitted, reducing the attack surface and minimizing vulnerabilities. Learn how adopting a comprehensive allowlisting strategy can help build a secure, resilient network fortress, protecting your systems from malicious threats and unauthorized access. Whether you’re implementing it for the first time or refining your approach, this session will highlight best practices and common pitfalls.

[1 CPE] Don’t Build a Fire Department

  Presented by Gary Quinn, Sr Sales Engineer, Enterprise US • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24×7 monitoring across your collective attack surfaces.

[1 CPE] Zero Trust in Motion: Securing East/West Traffic to Reduce Risk

  Presented by Stefanie Elle, Channel Sales Engineer • HPE Aruba Networking

Ransomware and targeted cyber security threats are on the rise. A proactive prevention strategy should use both tried and proven methodologies as well as new and emerging technologies. East West traffic identification and isolation is key in preventing malicious content from spreading, both in the Data Center and at the Campus Edge of the network. We will focus on innovative approaches to address the security compliance, performance, agility, and scalability demands of today’s highly distributed, hybrid, network environments.

[1 CPE] Empowering the Future: Unlocking the Potential of Microsoft Solutions

  Presented by High Point Networks

Join us for an engaging and informative breakout session exploring the latest in Microsoft products and solutions. We’ll dive into key topics like Exchange and Windows 11 End-of-Life, Entra ID best practices, and essential settings to enhance security and identity management. Discover how CoPilot and CoPilot+ PCs are revolutionizing productivity with AI, simplifying complex tasks, and empowering users to work smarter. Plus, learn how Microsoft Server ensures reliable operations in today’s fast-paced tech landscape. These groundbreaking innovations are transforming the way we work and live—don’t miss this opportunity to stay ahead of the curve!

[1 CPE] How to Make AI a Reality in Your Organization

  Presented by Marni Carmichael, Vice President, Marketing • ImageSource

AI adoption is accelerating, yet many organizations struggle to transition AI projects from proof-of-concept to production. The AI Empowerment Blueprint is a structured framework that helps businesses overcome common AI adoption barriers, align AI initiatives with business goals, and implement a governance strategy that ensures ethical and effective AI deployment.

This session will guide attendees through a six-step methodology for AI success, covering key phases such as AI exploration, business value alignment, governance frameworks, and implementation best practices. Learn how to identify AI opportunities, mitigate risks, and build a scalable AI strategy that delivers real business value.

Whether you’re an executive, technologist, or entrepreneur, this presentation will equip you with actionable insights and a proven roadmap to maximize AI’s impact within your organization.

[1 CPE] Achieving Ransomware Resilience and Disaster Recovery in a Multi-Cloud World

  Presented by Ken Smallwood, Systems Engineer • HPE Zerto Software

Discover how to achieve an always-on 24/7 business, ensuring that customers and stakeholders can expect uninterrupted access to their data and applications. Learn how to solve for Ransomware Resilience, Disaster Recovery, and Multi-Cloud mobility for virtualized environments, with continuous data protection (CDP) for any app, any cloud, and any threat. With the right solutions in place, your organization can seamlessly protect critical data and applications, mitigate the risk of ransomware attacks, and maintain business continuity.

Explore strategies for achieving ransomware resilience, automated disaster recovery planning and testing, and flexible hybrid-cloud capabilities that allow you to move applications and scale capacity on demand. By integrating comprehensive data protection measures, you can ensure compliance with regulatory mandates and provide robust resilience against evolving cyber threats. This approach empowers your IT team to focus on strategic initiatives by reducing the burden of manual recovery processes and ensuring rapid restoration of operations.

[1 CPE] Modern Data Center Network Automation

  Presented by Bill Wester, Sr Product Manager  • Juniper Networks

The presentation will focus on Juniper Apstra and Designing Data Centers with Intent. We will discuss the design, deployment, and operation of modern EVPN VXLAN data centers and talk about how machine learning and AI are helping to make data center operations easier for the operators. We hope that the attendees will take away a new appreciation of how modern automation can help solve the hardest data center problems with ease.

[1 CPE] Blind Spots in Cybersecurity: Identifying Hidden Risks in Your Environment

  Presented by Tanner Harrison, Systems Engineer • Fortinet

In this session, we’ll explore where hidden risks often lurk and share practical strategies to identify, address, and prevent them. From proven techniques to close security gaps to Zero-Trust and cloud-first solutions, you’ll leave with actionable insights to strengthen your defenses and build a more resilient, proactive security posture.

Key Takeaways:

  • Pinpoint common areas where security blind spots exist in organizations
  • Proven techniques to close critical gaps and reduce exposure
  • Insights for continuously monitoring and responding to evolving threats in real time
  • Practical steps for fostering a proactive, security-first culture across your organization