[1 CPE] FBI Cybersecurity Briefing: Safeguarding Against Modern Threats

  Presented by Nick Smith • FBI Special Agent

Join FBI Special Agent Nick Smith for a discussion on the top cyber threats of today. This presentation will cover some of the basic mitigation strategies available that users can enact right now. This discussion will also provide an overview of the FBI’s role in addressing various cyber threats.

Special Agent Nick Smith is a cyber agent with the Federal Bureau of Investigation’s Phoenix Division, focusing on criminal cyber matters including computer intrusions, malware, ransomware, and combating criminal infrastructures. Prior to working for the FBI, Nick served several cyber-related roles across government and within the U.S. Intelligence Community. He also served as a Police Officer in Ohio for several years and is a veteran of the U.S. Air Force.

Nick holds a BS in Homeland Security from Embry-Riddle Aeronautical University and an MS in Information Systems Engineering from the Johns Hopkins Whiting School of Engineering. He also maintains certification as a Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH).

[1 CPE] Reinventing TPRM: Managing Third-Party Cyber Risk with Intelligence

  Presented by Mark Nafe, Director, Solutions Consulting • RiskRecon by Mastercard

In today’s hyperconnected enterprise, your cybersecurity risk doesn’t end at the firewall—it extends to every vendor, supplier, and partner in your digital ecosystem. Yet many organizations struggle to gain visibility into third-party risk, relying on outdated methods that can’t keep pace with modern threats.

This session explores how leading organizations are leveraging machine learning, threat intelligence, and continuous monitoring to transform their third-party risk management (TPRM) programs from reactive check-the-box exercises into proactive, intelligence-driven strategies. You’ll learn how advanced technologies are enabling security teams to identify high-risk vendors before they become the weak link—and how TPRM is evolving into a critical pillar of enterprise resilience.

Whether you’re already managing vendor risk or just starting to explore the issue, this session will provide the business case, practical frameworks, and technology insights you need to elevate your security posture.

[1 CPE] Active Directory: Ransomware, Risk, Review, Recovery

  Presented by Rob Ingenthron, Sr Solution Engineer • Semperis

Cyberattackers are adept at finding ways through your defenses and into identity systems like Active Directory. Many organizations use Active Directory as the primary identity service, and Active Directory is typically tied into almost everything, including Entra ID. From there, they can move laterally, escalate privileges, access sensitive resources, and inject malware or ransomware. Implementing a layered defense that includes identity threat detection and response (ITDR) is key to protecting your operational resilience.

Join Rob Ingenthron, Sr Solution Engineer, to learn:

  • How layered defense has changed over time
  • Why ITDR is now an essential part of a robust layered defense strategy
  • The continuing importance of hygiene and auditing for Active Directory
  • How a layered defense can help you combat attacks that are designed to bypass traditional methods of defense
  • Which best practices lead to a strong layered defense

[1 CPE] Hackers Gonna Hack: When Defenses Break Down

  Presented by Jason Graun, Director of Sales Engineering • Fortinet

Organized threat actors continue to be the most dangerous risk in Cybersecurity. The tactics used to get into endpoints are constantly evolving in sophistication and scale. In this session, we will discuss industry trends/challenges, as well as walk through the tactics, techniques, and procedures used by threat actor groups by using a known active group as an example. We will also discuss practical real-world situations and how to defend against them using a unique approach to stopping ransomware before it becomes an active breach.

Jason Graun is the Sales Engineering Director for the Fortinet Security Operations team. He brings over 20 years of experience in information security and has spent 11 years at Fortinet. He regularly speaks at industry events, CIO/CISO summits, and works closely with IT executives to understand the business challenges they face in securing assets across an ever increasingly mobile workforce. Jason’s focus is to find ways technology can solve the biggest challenges in information security, he also holds a patent on cloud security malware inspection methods.

[1 CPE] Securing the Future of Cybersecurity Protection in an AI-Driven Digital Landscape

  Presented by Charles Everette, Field CISO Advisor • ESET

In today’s digital age, advancements in artificial intelligence are reshaping how businesses approach cybersecurity. AI technologies offer powerful tools for detecting, preventing, and responding to cyber threats in real time. However, they also introduce new challenges, including adversarial attacks and ethical concerns. This presentation explores the transformative role of AI in modern cybersecurity strategies. By understanding both the opportunities and risks AI presents, organizations can better protect their digital assets and adapt to the evolving threat landscape.

[1 CPE] Breaking Down Silos: Unify Assets, Minimize Attack Exposure

  Presented by Lucas Zaichkowsky, Sr Sales Engineer • Axonius

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.

Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.

As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.

[1 CPE] Surfing the Different Waves of AI

  Presented by Tyler Stuart, Sales Engineer, Trellix • Cyberuptive

Riding the ever-breaking wave of AI security model evolution can feel like a gnarly wipeout. This presentation will help your security team hang ten by navigating the diverse swells of Language Learning Models (LLMs), paddling through the currents of Retrieval-Augmented Generation, and catching the perfect set of Agentic AI. Our goal is to provide the knowledge you need to confidently choose and manage the right boards – I mean, tools – for your organization’s security lineup.

[1 CPE] Paradise Lost: Leave Hackers Stranded with Automated Microsegmentation

  Presented by Bryan Ward, Customer Engineer • Zero Networks

Flat networks and overly permissive accounts are paradise for cyber attackers. With defenses stuck on island time while hackers work overtime, traditional network security methods lag behind modern threats. This interactive session will outline the real-world strategies a top 10 US credit union leveraged to:

  • Proactively block ransomware and sophisticated threats
  • Streamline regulatory compliance for improve audit results
  • Eradicate manual tasks like tagging, grouping, and policy creation
  • Dynamically secure privileged ports
  • Accelerate microsegmentation and Zero Trust, avoiding a multi-year project

Don’t miss this opportunity to explore proven and practical applications of microsegmentation to modernize cybersecurity strategy. Turn your network from a beach vacation into a desert island for hackers – learn how to leave attackers stranded in record time with automated microsegmentation.

[1 CPE] Heart of Agile with Aloha: Driving IT Innovation

  Presented by Bradley K. Foster, PMP, CSM, CPO, CAC, CAL • Worth Agility

Join Bradley K. Foster, founder of Worth Agility, to explore how Alistair Cockburn’s Heart of Agile—Collaborate, Probe, Deliver, Reflect, Improve—blends with Aloha’s compassion to ignite IT innovation. With 5+ years in health and aviation IT, Bradley led Hawaiian Airlines’ EDW (Microsoft-driven, real-time insights), Health Catalyst’s cloud analytics at Queens (30% efficiency gain), and Hawaii DOT’s Google CCAI demo (40% faster calls).

Learn to probe risks early, collaborate across silos, and deliver secure systems under Worth Agility’s human-centered approach, guided by DevSecOps insights from Isaac Sacolick.

Ideal for IT leaders tackling ransomware, AI, and bandwidth challenges with agility and heart.

[1 CPE] Restoration in 72 Hours, Not 72 Days: Building Cyber Resilience in Healthcare

  Presented by Daniel Tang, Healthcare Solutions Engineer • Rubrik

A singular focus on prevention and security is proving necessary but not sufficient to ensure continuity of operations and quality care. In an era of increasing cyberattacks, understanding the foundational principles of cyber resilience is essential for safeguarding patient data, ensuring organizational resilience, and ultimately, upholding patient care standards.

This session will explore the core concepts of cyber resilience and how they enable rapid recovery following cyber-attacks. With a focus on quantifying the impacts to operational downtime, legal costs and regulatory fines, as well as reputational damage, this discussion is tailored to help C-suite leaders prioritize cyber resilience strategies.

  • Explore the fundamental principles of cyber resilience, focusing on preserving continuity of care and business operations.
  • Assess the financial and operational risks of data breaches and ransomware attacks, including real-world examples from healthcare.
  • Discuss how to communicate the value of and build support for cyber resilience initiatives.