[1 CPE] How to Spend Wisely on Your IT Needs in Boise: An Interactive Panel Discussion

  Presented by INTERFACE Advisory Council

Your budget has shrunk, and vendor costs have risen. Sound familiar?

So many IT leaders in Boise are dealing with the challenges of vendor acquisitions that produce huge cost increases. At times it can seem there is no way to achieve everything expected with the budget allotted. How does anyone succeed in this environment?

Boise isn’t home to the largest corporations in the country, and your IT budget reflects that. In this panel discussion, the BOISE Advisory Council will share their tricks to maximizing the impact of the money you have to spend. Please join us for an open discussion that will include your questions. We will share experiences in working with vendors, stretching a dollar, and finding alternatives to huge price increases from the vendor community.

Moderator: Will Miller, Sr IT Manager, Idaho Transportation Dept

Panelists:

  • Lloyd Barron, Chief Information Security Officer, ID Secretary of State
  • Josh Borglund, Manager, Information Technology, Aviation Specialties Unlimited
  • Kevin Malloy, Chief Technology Officer, Dynamis Energy, LLC
  • Robert Peterson, Information Technology Director, Washington County, ID

[1 CPE] AI Agents & Automation: How They’re Changing the Way We Work

  Presented by Abram Erickson, Lead Data & AI Engineer, and Hunter Helfgott, AI Solutions Consultant • Cerium Networks

AI-powered agents are generating a lot of buzz. But what do they actually do?

In this session, you will see how organizations are starting to use AI-powered agents to solve business challenges and create new opportunities. We’ll cover advanced tools like custom GPTs, Copilot Studio, and Azure AI Foundry and see how they can be leveraged to drive AI innovation and streamline workflows. This session offers a deep dive into automation’s role in simplifying complex processes, enhancing customer experiences, and improving productivity.

[1 CPE] Go Hack Yourself: More War Stories from over 150,000 Pentests

  Presented by Tony Taylor, Sr Solutions Architect • Horizon3.ai

Join Tony Taylor, Senior Solutions Architect, for an engaging session on “Offense-Driven Defense.” Tony will challenge conventional risk assessment practices and unveil how focusing on real-world exploitability and impact can revolutionize your security approach. Drawing from insights gathered across more than 150,000 autonomous pentests, he’ll share compelling stories and actionable lessons that show how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and strengthen your defenses against advanced threats. Don’t miss this opportunity to learn from a leading industry practitioner on why it’s time to “go hack yourself” and build resilience in today’s borderless threat environment.

[1 CPE] Taking A Data-First Approach to Cyber Risk Management

  Presented by Austin Starowicz, Director, Solutions Consulting • Mastercard Cybersecurity

Cyber Risk Management has evolved. Every new vulnerability or regulation adds further pressures on already stretched teams to predict and manage the weakest links within your internal IT infrastructure. Piling on to today’s cyber risk landscape is the ever-expanding digital supply chain, and the need to onboard, assess, and monitor third parties, fourth parties, and Nth parties.

But does it really have to be that way?

Join this session from Mastercard Cybersecurity for an exclusive presentation on how a proactive “data-first” approach to cyber risk management can help you:

  • Improve monitoring for critical vulnerabilities to determine which ones really matter
  • Identify, Prioritize and Assess affected third parties in real-time
  • Leverage objective risk data into the decision-making processes
  • Streamline workflows and scale your operations

[1 CPE] A Complete Security Blueprint

  Presented by Chad Spoden, Solutions Architect Manager • FRSecure

In an era of increasingly sophisticated and relentless cyber threats, organizations must take a strategic and structured approach to security. This blueprint offers a comprehensive roadmap for building and maturing a security program—from establishing a solid foundation to addressing advanced threats and ensuring long-term resilience. Designed to be practical and accessible, it emphasizes clarity, prioritization, and continuous improvement. Whether you’re launching a new initiative or refining an existing program, this guide highlights key considerations and provides actionable insights to strengthen your security posture and stay ahead of evolving risks.

[1 CPE] Architecture Matters: What You Need to Know When Evaluating SASE & SSE Solutions

  Presented by Rehman Khan, Director, Cyber Architecture & Engineering • Netskope

SASE and SSE are more than just buzzwords; they represent the future of network and security. But before you entrust all your critical traffic to these cloud solutions, a deeper dive into their underlying architecture is essential. Not all clouds are created equal, and understanding the nuances of these solutions, which are built on the global internet, is paramount for success.

This session will empower attendees with the crucial architectural questions to ask your SASE/SSE providers, ensuring you make an informed decision. We’ll explore:

  • Public vs. Private Cloud: What are the implications for your data and performance?
  • Server Locations: Where are security services hosted, and why does proximity matter?
  • Network Architecture: How is the provider’s network built and managed for optimal reliability and speed?
  • Capacity Management: How do they scale to meet your evolving demands and ensure consistent performance?
  • Performance Measurement: What metrics should you track, and how do providers guarantee their SLAs?
  • Incident Response: What happens when something breaks, and how quickly can services be restored?

Arm yourself with the right questions to build a secure and high-performing SASE/SSE future.

[1 CPE] Cyber Risk Associated with Quantum Computing

  Presented by BJ Deonarain, Global Alliance Cybersecurity Solutions Director • Hitachi Vantara

Quantum computers can break today’s standard encryption algorithms (RSA, ECC) in minutes relative to time using Shor’s/Grover algorithm. “Harvest Now, Decrypt Later” attacks allow adversaries to steal encrypted data now and crack it when quantum computers mature. Quantum systems themselves are vulnerable to new attack vectors, quantum hacking (side-channel, noise-based), quantum malware, and manipulation of qubit stability. Supply chain attacks targeting quantum hardware, proprietary algorithms, and insider threats are rising as nation-states and cybercriminals escalate espionage efforts. Urgent need for quantum-resistant cryptography and robust quantum cybersecurity measures as quantum adoption accelerates.

BJ Deonarain is a globally focused cybersecurity executive responsible for driving cyber security and cyber resiliency strategy at Hitachi Vantara. With a career spanning technical innovation, client solutions, and cross-functional leadership, BJ combines deep technical expertise with a client-centric approach to mitigate risk and elevate organizational security postures.

[1 CPE] Cybersecurity Defense Strategies

  Presented by Scott Beasley, Cybersecurity Solutions Architect • Comcast Business

What are the common threats organizations face and how do these threats get into the network? Join this session to learn what you can do to slow down attackers and mitigate threats when you are attacked. We’ll review the types of services organizations need to help defend against attacks and where to find them.

[1 CPE] Go Hack Yourself: More War Stories from over 150,000 Pentests

  Presented by Ramzi Harb, Sr Solutions Architect • Horizon3.ai

Join Ramzi Harb, Senior Solutions Architect, for an engaging session on “Offense-Driven Defense.” Ramzi will challenge conventional risk assessment practices and unveil how focusing on real-world exploitability and impact can revolutionize your security approach. Drawing from insights gathered across more than 150,000 autonomous pentests, he’ll share compelling stories and actionable lessons that show how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and strengthen your defenses against advanced threats. Don’t miss this opportunity to learn from a leading industry practitioner on why it’s time to “go hack yourself” and build resilience in today’s borderless threat environment.

[1 CPE] Legacy to Modern: Data Migration & Integration for Business Continuity

  Presented by Rami Ramireddy, Chief Executive Officer • ESS

As organizations evolve, aging systems can become a barrier to agility, security, and scalability. This session explores how to transition from legacy platforms to modern ERP environments while maintaining business continuity and disaster recovery readiness. We’ll discuss best practices for data migration, internal system integration, and secure API exposure to external partners—all without referencing specific products or services.

Attendees will gain insights into:

  • Planning and executing data migration with minimal disruption
  • Designing resilient architectures for business continuity
  • Strategies for disaster recovery in hybrid environments
  • Connecting internal systems and exposing data securely via APIs