[1 CPE] Modern Virtualization & Integrated Infrastructure from The Edge to the Core

  Presented by Blake Manard, Regional Sales Manager, and Mike O’Neil, Director of Solutions Architects • Scale Computing

In the new VMware/Broadcom reality, organizations everywhere face waves of uncertainty with escalating costs, forced VMware migrations, and unpredictable changes. Don’t let your IT strategy be held hostage by pricing and product instability. Join this session to discover future-proof solutions that eliminate the chaos and complexity.

[1 CPE] In the Cloud: Fast Forward to Better Security

  Presented by Jeff Kwiat, Principal Systems Engineer • Fortinet

Migrating to the cloud offers organizations unmatched agility, scalability, and innovation potential, but it also introduces complex security risks. Misconfigurations, compliance gaps, overly permissive identities, shadow IT, and advanced threats quickly erode the benefits of cloud adoption.

This presentation examines how to securely plan and execute a cloud migration, highlighting common challenges and best practices. It will explore how modern Cloud-Native Application Protection Platforms (CNAPPs) provide unified visibility, runtime protection, and compliance enforcement across multi-cloud environments. Attendees will learn how a well-architected, integrated security strategy not only mitigates risk but also accelerates the value of cloud transformation.

[1 CPE] How to Make AI a Reality in Your Organization

  Presented by Marni Carmichael, Vice President, Marketing • ImageSource

AI adoption is accelerating, yet many organizations struggle to transition AI projects from proof-of-concept to production. The AI Empowerment Blueprint is a structured framework that helps businesses overcome common AI adoption barriers, align AI initiatives with business goals, and implement a governance strategy that ensures ethical and effective AI deployment.

This session will guide attendees through a six-step methodology for AI success, covering key phases such as AI exploration, business value alignment, governance frameworks, and implementation best practices. Learn how to identify AI opportunities, mitigate risks, and build a scalable AI strategy that delivers real business value.

Whether you’re an executive, technologist, or entrepreneur, this presentation will equip you with actionable insights and a proven roadmap to maximize AI’s impact within your organization.

[1 CPE] Fortifying Data Resilience: When Backups Become Back Doors to Cyberthreats

  Presented by Rick Vanover, Vice President of Product Strategy • Veeam

Ransomware threats don’t discriminate. And as the industry’s leading provider of data resilience solutions, we’ve seen it all. Public sector organizations are just as likely to be targeted as those in the private sector, and the stakes can be even higher. Veeam’s latest Ransomware Trends Report exposes critical vulnerabilities and highlights why relying solely on backups is no longer enough to ensure resilience. In this session, Veeam’s VP of Product Strategy, Rick Vanover, will unpack the most common oversights that leave organizations — government, education, healthcare, and beyond — exposed to cyber threats, especially when backups become an overlooked back door in your security strategy.

Drawing from real-world incidents and hard-earned lessons, Rick will share what he wishes every IT professional knew before facing a ransomware or security breach event. You’ll leave with actionable insights, practical guidance, and research-backed recommendations to help you strengthen your data resilience. Whether you’re securing sensitive public sector data or safeguarding private enterprise information, this session will equip you to prepare for tomorrow’s threats today.

[1 CPE] History of Firewall Technology: From Packet Filtering to Application Control

  Presented by Hubert Ralph Bonnell, CISSP, CCSM – Security Engineer • Check Point Software

Let’s take a stroll through memory lane as we explore the history of the network firewall. This session explores the core technology behind packet filtering, proxies, stateful inspection, and application layer controls. Also covered are some of the fundamental differences between the firewalls on the market today.

[1 CPE] Securing Data Flow in the AI-Quantum Era

  Presented by Steve Riley, Vice President, Field CTO • Netskope

Sensitive data movement poses risks, but outright restriction can hinder operations. Organizations need agile security frameworks to protect data in the AI and quantum era. This session explores modern security platforms that enable secure data flow and prepare for post-quantum encryption (PQE).

Join this session to learn:

  • Choosing secure access methods for diverse use cases
  • Adapting security to risk, user behavior and AI interactions
  • Preparing for post-quantum encryption’s enterprise impact

[1 CPE] Breaking Down Silos: Unify Assets, Minimize Attack Exposure

  Presented by Michael Rockey, Sr Sales Engineering Manager • Axonius

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.

Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.

As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.

[1 CPE] Will AI Take Your Job? How Do You Ensure It Doesn’t?

  Presented by Joe Skeen, Solutions Architect • CompuNet

As artificial intelligence continues to evolve, its impact on the workforce is becoming increasingly profound. This presentation explores the reality behind the provocative claim that “AI will take your job,” examining which industries and roles are most at risk and which are poised for growth. Attendees will gain insights into the skills that are becoming obsolete, the capabilities that remain uniquely human, and the emerging opportunities in an AI-driven economy. The session will provide practical strategies for adapting to technological disruption, including upskilling, embracing digital tools, and cultivating resilience. Participants will leave with a clear understanding of how to future-proof their careers and thrive in the age of intelligent machines.

[1 CPE] Hacking on a Budget: Maximizing Impact with Open-Source Security Tools

  Presented by Topher Lyons, Solutions Engineer • Sprocket Security

This presentation offers an illuminating glimpse into the open-source and free tools utilized by cybersecurity professionals for comprehensive security assessments. We will walk through how tools like Masscan, Nuclei, Impacket, Roadtools, Burp Suite Community Edition, and OWASP ZAP are applied across the essential phases of ethical hacking: reconnaissance, enumeration, exploitation, credential spraying, and web application testing. This talk is designed to build awareness of the sophisticated techniques and widely respected resources employed by experts in the field, providing valuable insights into the practical aspects of offensive security without the expectation of immediate proficiency.

[1 CPE] Operation Cyber Idaho: Modernizing Cyber Defense Statewide

  Presented by Jerred Edgar • Chief Information Security Officer, State of Idaho

Operation Cyber Idaho is an initiative focused on improving Idaho’s cyber resilience through Idaho Readiness Training (IRT), cyber infrastructure services, and collective defense. This program aims to modernize infrastructure by establishing the Idaho Readiness Training program, developing a cybersecurity workforce via a statewide apprenticeship program, and offering comprehensive cyber infrastructure services such as threat detection, vulnerability scanning, and remediation efforts.

Jerred serves as the Chief Information Security Officer for the Idaho Office of Information Technology Services. Jerred has over 24 years of military service, with 20 of those years focused on managing, overseeing, and developing secure and redundant cyber capabilities for military operations within contested environments.

Before retiring, he served as the Director of Cyber Innovative Readiness Training (IRT) for the Idaho Army National Guard (IDARNG), where he established a strategic partnership across Idaho and within the Department of Defense. This partnership facilitated cyber assessments, consultations, and assistance by leveraging military readiness objectives, funding, and personnel from 2019 through 2024. Prior to this role, he held various leadership positions within the 116th Cavalry Brigade Combat Team (CBCT). His responsibilities included managing the 116th CBCT’s enterprise communication suite for numerous training exercises and modernization efforts, two National Training Center rotations, Operation Saber Guardian 2016, and participating in two combat deployments since 2001.