[1 CPE] Anatomy of a Ransomware Attack: Prepare, Respond, Recover

  Presented by Torry Williams, Lead Solutions Architect • 11:11 Systems

Recovery plans are no longer optional—they’re inevitable. In today’s evolving threat landscape, every business will be tested. Whether it’s traditional disasters driven by nature or human error, or modern-day crises fueled by cyberattacks and ransomware, the stakes are higher than ever.

How do you ensure your organization is prepared not just to survive, but to recover with confidence? In this session, we’ll cover:

  • The key stages of a cyberattack and what they mean for your business
  • Best practices to reduce your exposure and minimize impact
  • Essential tools and strategies to recover quickly if compromised
  • What a real-world recovery looks like—and how to be ready for it

[1 CPE] Achieving and Maintaining Compliance: A How to Guide

  Presented by Structured

Governance, Risk, and Compliance (GRC) frameworks are essential for organizations seeking to align business operations with regulatory expectations, mitigate risk, and demonstrate accountability. Yet, many enterprises struggle with fragmented processes, overlapping requirements, and the constant evolution of regulatory landscapes. This presentation explores the common challenges organizations face in meeting compliance obligations, including resource constraints, unclear ownership, and the difficulty of sustaining ongoing compliance rather than treating it as a one-time exercise. Attendees will gain insight into practical, repeatable steps for addressing audit findings, closing gaps, and building a culture of compliance that is both resilient and adaptable. By leveraging structured risk assessments, continuous monitoring, and cross-functional collaboration, organizations can move beyond reactive firefighting and achieve a proactive, sustainable GRC posture.

[1 CPE] Modern Data Center Network Automation

  Presented by Jeremy Wallace, Director Product Management, Data Center/IP Fabric Architect  • Juniper Networks

The presentation will focus on Juniper Apstra and Designing Data Centers with Intent. We will discuss the design, deployment, and operation of modern EVPN VXLAN data centers and talk about how machine learning and AI are helping to make data center operations easier for the operators. We hope that the attendees will take away a new appreciation of how modern automation can help solve the hardest data center problems with ease.

[1 CPE] Beyond the Standard: How Aruba’s 700 Series APs Redefines Wi-Fi 7

  Presented by Stefanie Elle, Channel Sales Engineer • HPE Aruba Networking

Wi-Fi 7 is just the beginning. The HPE Aruba Networking 700 Series Access Points go beyond the standard with higher capacity, denser IoT support, advanced wired security with MACsec, software-configurable radios, and more. Powered by AOS-10 and Aruba Central, every Wi-Fi 7 model adds AI-driven optimization, sustainability automation, and deep client insights. The result is a unified platform that transforms next-gen wireless into the foundation for real-time business, IoT innovation, and future-ready connectivity. Join us to discover how the 700 Series goes beyond Wi-Fi 7 to deliver the performance, intelligence, and security your network demands.

[1 CPE] Crisis to Confidence: Enhance Your Incident Response & Recovery with Data Protection

  Presented by Zach Wood, Solutions Architect • Druva

In today’s threat landscape, resilience isn’t just about bouncing back—it’s about bouncing forward. Join us for a dynamic session that redefines how organizations approach data protection, recovery, and cyber resilience.

Discover why traditional backup is no longer enough and how modern, SaaS-native strategies can eliminate blind spots, reduce risk, and give you a real competitive edge. We’ll explore the forces reshaping security and IT teams, expose the gaps legacy tools leave behind, and walk through real-world use cases that show how leading organizations are transforming reactive recovery into proactive resilience.

Whether you’re navigating ransomware threats, managing sprawling SaaS ecosystems, or trying to do more with less, this session will equip you with a practical path to greater confidence and control.

Zach Wood is a seasoned Solutions Architect with over 25 years of experience in data protection, encompassing roles as both a customer and sales engineer. For the past four years, he has been an integral part of Druva, a leader in cloud data protection and management solutions, where he leverages his extensive expertise to assist organizations in safeguarding their critical data assets.

[1 CPE] Blind Spots in Cybersecurity: Identifying Hidden Risks in Your Environment

  Presented by Tanner Harrison, Systems Engineer • Fortinet

In this session, we’ll explore where hidden risks often lurk and share practical strategies to identify, address, and prevent them. From proven techniques to close security gaps to Zero-Trust and cloud-first solutions, you’ll leave with actionable insights to strengthen your defenses and build a more resilient, proactive security posture.

Key Takeaways:

  • Pinpoint common areas where security blind spots exist in organizations
  • Proven techniques to close critical gaps and reduce exposure
  • Insights for continuously monitoring and responding to evolving threats in real time
  • Practical steps for fostering a proactive, security-first culture across your organization

[1 CPE] Securing AI Without Slowing Innovation: A Blueprint for the Future of Cybersecurity

  Presented by Yama Sadaat, Sr Solutions Engineer • Trend Micro

AI is transforming the enterprise—bringing new opportunities for efficiency, but also introducing unprecedented risks. From prompt injection and model poisoning to shadow AI and deepfakes, the attack surface is evolving faster than most IT teams can keep up. In this session, we’ll explore Trend Micro’s Security for AI Blueprint, a step-by-step framework for protecting data, models, infrastructure, and users in an AI-driven world. You’ll also see how Trend Micro leverages AI across its own cybersecurity platform, combining decades of research with modern generative AI to deliver proactive protection. Walk away with practical strategies you can apply to safeguard your organization’s AI initiatives—without putting innovation on hold.

[1 CPE] Corporate Resiliency in the Age of Ransomware

  Presented by Ritchie Blount, Lead Technical Expert, Cyber Resiliency & Security • Hitachi Vantara

Ritchie Blount is a seasoned cybersecurity professional with deep expertise in cyber resiliency, enterprise defense architecture, and security risk management. As a Lead Technical Expert, Ritchie has spent over two decades designing and implementing resilient frameworks that safeguard mission-critical systems & data structures against advanced threats.

With a career grounded in both technical innovation and strategic leadership at Microsoft, Dell, and now Hitachi, Ritchie has guided cross-functional teams in high-stakes environments, delivering scalable solutions that meet today’s evolving cyber challenges. His work bridges the gap between policy, technology, and operational effectiveness –– ensuring organizations stay secure, adaptable, and resilient.

As trusted advisor to government and industry partners alike, Ritchie brings clarity to complex security issues on topics including threat mitigation, incident response planning, and zero trust architecture.

[1 CPE] Beyond the Hype: AI Agents at Work

  Presented by Nate Purser, Data & AI Specialist, Cerium Networks and Isha Desai, Data & AI Technical Specialist, IBM

This session is designed to demonstrate what’s truly possible with AI agents and intelligent automation. We’ll explore real-world use cases from Cerium’s clients and highlight how IBM is applying agentic AI within their own organization. For example, IBM’s “AskIT” Agent now resolves 80% of common IT issues for their global workforce.

Cerium and IBM AI experts will also cover how organizations can create and manage AI agents that work across different large language models, automation tools, and applications. We’ll highlight practical approaches, governance and orchestration strategies that all organizations can apply as they begin or expand their AI journey.

Whether you’re just starting to explore AI agents or already testing them, this session will provide concrete examples, lessons learned, and practical strategies to help you take the next steps in adopting Agentic AI.

[1 CPE] Taking A Data-First Approach to Cyber Risk Management

  Presented by Austin Starowicz, Director, Solutions Consulting • Mastercard Cybersecurity

Cyber Risk Management has evolved. Every new vulnerability or regulation adds further pressures on already stretched teams to predict and manage the weakest links within your internal IT infrastructure. Piling on to today’s cyber risk landscape is the ever-expanding digital supply chain, and the need to onboard, assess, and monitor third parties, fourth parties, and Nth parties.

But does it really have to be that way?

Join this session from Mastercard Cybersecurity for an exclusive presentation on how a proactive “data-first” approach to cyber risk management can help you:

  • Improve monitoring for critical vulnerabilities to determine which ones really matter
  • Identify, Prioritize and Assess affected third parties in real-time
  • Leverage objective risk data into the decision-making processes
  • Streamline workflows and scale your operations