[1 CPE] Data Security: Why Now?

  Presented by Michael ‘Fergo’ Ferguson, Principal Strategist, Security Services & Evangelist • Cyera

In an era of exponential data growth, fueled by GenAI and data democratization, the need for strong data security has never been greater. Join this session to explore how organizations can safeguard sensitive data while still driving innovation and agility, including:

  • Strategies for balancing robust data protection with business enablement in a fast-changing digital environment.
  • Approaches to tackling the unique security challenges introduced by GenAI and expanded enterprise data access.
  • Tactics for aligning key stakeholders and building consensus around data security priorities.

Michael Ferguson, known as Fergo, is the Data Security Services Strategist at Cyera. With 20 years of experience in Data, Web, Cloud, and Email Security technologies, he specializes in Data Security and Zero Trust initiatives. As the author of Netskope’s SASE Accreditation, Cyera DSPM Security Architect accreditation, Fergo has played a key role in shaping data security strategies for multinational organizations across the UK, Germany, Australia, and the USA.

[1 CPE] SEDI: The Search for Intelligent Identity

  Presented by George McEwan • Privacy Architect, Dept of Government Operations, State of Utah

This presentation will cover the groundbreaking legislation enacted by Utah, which sets down the acceptable standards for digital identity with privacy and individual control by default. In this session, you’ll learn about the principles enshrined in law. Additionally, you’ll get exposure to the envisioned technology stack that will make it possible for individuals to maintain control over their data and how it is disclosed.

George McEwan is a multi-disciplined engineer and inventor credited with several US patents. As a husband, father, soldier, pilot, international traveler, and published author, he has more than a few ideas on how to unlock the value of digital government.

George is currently serving as the Privacy Architect for the State of Utah in the Department of Government Operations. Prior to taking on the challenges of his current role, George was the Chief Strategy Officer for the Division of Technology Services. He is uniquely qualified to advocate on behalf of the digital citizen as he served as the IT Director for the Department of Health during the pandemic, where he witnessed firsthand how the digital divide fractured communities.

Combining his talents as a technologist and award-winning storyteller, George promotes improved government transparency in data collection and the introduction of privacy-preserving verifiable digital credentials in venues across the United States.

[1 CPE] Has Security Awareness Been Forgotten? An Interactive Panel Discussion

  Presented by INTERFACE Advisory Council

“Just automate that process! The firewall is fine—we’ve got an AI tool watching it.”

Sound familiar? Despite significant investments in cybersecurity and advanced tools, the human element remains one of the greatest vulnerabilities in any organization. This isn’t a new problem—ransomware attacks continue to thrive due to human error.

Insider threats, whether intentional or accidental, are often at the root of security breaches. So, what proactive steps are you taking to mitigate these risks?

Join the INTERFACE Salt Lake City Advisory Council for an engaging discussion on defending against internal threats. Local IT leaders will share their strategies, lessons learned, and practical tips for minimizing human error in cybersecurity. Bring your questions and join the conversation as we explore what’s working, what’s not, and what more needs to be done to protect our networks from within.

Moderator: Bryan Wilkins, Sr Manager-Information Security, Space Dynamics Laboratory

Panelists:

  • James Duckett, Assistant Operations Director, Technology Division, City of St. George
  • Michael Hughes, Director, Information Technology, Mission Health Services
  • Mike O’Rourke, Manager, IT Operations, Tata Chemicals North America
  • Greg Pugh, Manager, COMSEC, Space Dynamics Laboratory

[1 CPE] Enhancing Cyber Resilience for Active Directory (and Entra ID)

  Presented by Rob Ingenthron, Sr Solution Engineer • Semperis

Cyberattackers are adept at finding ways through your defenses and into identity systems like Active Directory. Many organizations use Active Directory as the primary identity service, and Active Directory is typically tied into almost everything, including Entra ID. From there, they can move laterally, escalate privileges, access sensitive resources, and inject malware or ransomware. Implementing a layered defense that includes identity threat detection and response (ITDR) is key to protecting your operational resilience.

Join Rob Ingenthron, Sr Solution Engineer, to learn:

  • How layered defense has changed over time
  • Why ITDR is now an essential part of a robust layered defense strategy
  • The continuing importance of hygiene and auditing for Active Directory
  • How a layered defense can help you combat attacks that are designed to bypass traditional methods of defense
  • Which best practices lead to a strong layered defense

[1 CPE] Go Hack Yourself: More War Stories from over 150,000 Pentests

  Presented by Jake Mickley, Sr Solutions Architect • Horizon3.ai

Join Jake Mickley, Senior Solutions Architect, for an engaging session on “Offense-Driven Defense.” Jake will challenge conventional risk assessment practices and unveil how focusing on real-world exploitability and impact can revolutionize your security approach. Drawing from insights gathered across more than 150,000 autonomous pentests, he’ll share compelling stories and actionable lessons that show how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and strengthen your defenses against advanced threats. Don’t miss this opportunity to learn from a leading industry practitioner on why it’s time to “go hack yourself” and build resilience in today’s borderless threat environment.

[1 CPE] Realizing AI Value Through Data Quality: Solving Hidden Barriers to Business-Ready AI

  Presented by Mark Brandow, Technical Expert, Digital Core • Hitachi Vantara

Mark Brandow is a Global Solutions Specialist at Hitachi Vantara, where he helps organizations modernize their digital core and unlock new value through data-driven innovation. With over 27 years in the IT industry—including 14 years as a telecommunications architect and operations manager—Mark brings a unique perspective as both a past customer and trusted advisor. For the past decade at Hitachi Vantara, he has focused on enabling businesses to align technology with strategic objectives through a consultative, insight-driven approach. Today, Mark is helping customers explore the transformative potential of Hitachi IQ, Hitachi Vantara’s AI solution, by driving adoption strategies that foster trust, accelerate decision-making, and deliver measurable outcomes.

[1 CPE] AI Agents & Automation: How They’re Changing the Way We Work

  Presented by Nate Purser, Data & AI Specialist, and Hunter Helfgott, AI Solutions Consultant • Cerium Networks

AI-powered agents are generating a lot of buzz. But what do they actually do?

In this session, you will see how organizations are starting to use AI-powered agents to solve business challenges and create new opportunities. We’ll cover advanced tools like custom GPTs, Copilot Studio, and Azure AI Foundry and see how they can be leveraged to drive AI innovation and streamline workflows. This session offers a deep dive into automation’s role in simplifying complex processes, enhancing customer experiences, and improving productivity.

[1 CPE] Securing AI Without Slowing Innovation: A Blueprint for the Future of Cybersecurity

  Presented by Yama Sadaat, Sr Solutions Engineer • Trend Micro

AI is transforming the enterprise—bringing new opportunities for efficiency, but also introducing unprecedented risks. From prompt injection and model poisoning to shadow AI and deepfakes, the attack surface is evolving faster than most IT teams can keep up. In this session, we’ll explore Trend Micro’s Security for AI Blueprint, a step-by-step framework for protecting data, models, infrastructure, and users in an AI-driven world. You’ll also see how Trend Micro leverages AI across its own cybersecurity platform, combining decades of research with modern generative AI to deliver proactive protection. Walk away with practical strategies you can apply to safeguard your organization’s AI initiatives—without putting innovation on hold.

[1 CPE] Modern Data Center Network Automation

  Presented by Bill Wester, Sr Product Manager  • Juniper Networks

The presentation will focus on Juniper Apstra and Designing Data Centers with Intent. We will discuss the design, deployment, and operation of modern EVPN VXLAN data centers and talk about how machine learning and AI are helping to make data center operations easier for the operators. We hope that the attendees will take away a new appreciation of how modern automation can help solve the hardest data center problems with ease.

[1 CPE] Why Securing Active Directory and Entra ID is Critical in the Age of Escalating Cyber Threats

  Presented by Ryan Garrett, Sr Sales Engineer • Rubrik

In today’s threat landscape, identity-related attacks are rapidly increasing in both frequency and sophistication, targeting core identity engines like Active Directory and Entra ID. This presentation will explore the modern attacker’s playbook, walking through the typical kill chain and the potential impact on an organization’s environment, spanning on-premises infrastructure, cloud, and SaaS applications. We will analyze the limitations and risks associated with current protection strategies—such as relying on point solutions, exposed backup data, and the complexities of Active Directory and Entra ID restoration, which often involve multiple tools and intricate forest-level recoveries.

The session will emphasize the importance of breaking down silos between identity management, data protection, and security teams. Attendees will come away with practical recommendations for collaborative recovery planning, including the value of conducting mock exercises to ensure readiness. By understanding the evolving threats and rethinking recovery strategies, organizations can better defend their most critical digital assets.