[1 CPE] AI or Die: Will Agentic AI and Hyperautomation Save the SOC?

  Presented by Aaron Edwards, Regional Sales Manager, and Rich Chen, Sales Engineer • Torq

The promise of SOAR has repeatedly failed. Organizations have invested heavily in enterprise solutions yet the ability to deliver automated, preventative, and corrective measures still remains a distant reality for most CISOs. Why? The concept of an Autonomous SOC is everywhere – promising to streamline security operations processes, reduce analyst alert fatigue, and improve overall security posture. But how does the dream of an Autonomous SOC play out in the real world of security operations? Is 2025 the year that Agentic AI where Hyperautomation saves the SOC?

[1 CPE] Don’t Build a Fire Department

  Presented by Tom Simonis, Sr Sales Engineer, Enterprise US • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24×7 monitoring across your collective attack surfaces.

[1 CPE] Empowering Hawai’i’s Future: Leading IT Innovation in State Government

  Presented by Christine Sakuda • Chief Information Officer, State of Hawaiʻi

Hawaiʻi State Chief Information Officer Christine Sakuda shares her journey transitioning from private sector leadership into her current role in the state’s central technology division. Sakuda will offer insights on how she fulfills the governors’ priorities while partnering with all executive departments to develop common IT solutions and will discuss her experience of learning to work with the legislature on bills and budget priorities.

Christine Sakuda has more than 25 years of experience in leading enterprise-level IT initiatives including leading community IT systems development, managing stakeholder relations, and collaborating with IT vendors to implement a range of technology modernization projects. She is the State’s first female CIO of Native Hawaiian ancestry. She also served as the first executive director of Transform Hawaii Government (THG), a nonprofit organization dedicated to catalyzing the modernization of public services through people, processes, and technology, and as the Executive Director of the Hawaiʻi Health Information Exchange (HHIE).

[1 CPE] Building Hawaii’s Cybersecurity Future, Together

  Presented by Michael Cardenas, CTO, Co-Founder, MC3 Technologies • Vicinity

Hawaiʻi faces a growing cybersecurity threat landscape and yet thousands of IT and cyber positions remain unfilled locally. We will share why homegrown talent is key to strengthening our region’s digital resilience. This session explores today’s top cyber risks, practical steps for small businesses to boost their security, and how collaboration between industry, education, and community partners is critical for protecting Hawaiʻi’s future. Attendees will walk away with actionable strategies to enhance their cybersecurity posture and engage in workforce development efforts that build a stronger, more secure Hawaiʻi.

[1 CPE] AI: The New Attack Surface

  Presented by Jeff Crume, Distinguished Engineer, Data and AI Security, IBM • Converge Technology Solutions

Artificial Intelligence introduces novel security challenges, including adversarial attacks and model vulnerabilities. Also, there is the issue of whether you can trust the AI you have. This session will cover six different types of AI attacks to provide a better understanding of the threatscape along with some suggestions for securing the data, the model, the usage and the infrastructure.

[1 CPE] Securing the Hyperconnected World in the AI Era

  Presented by Grant Asplund, Security Evangelist • Check Point

The AI revolution is fundamentally transforming cybersecurity, while the future of networking evolves toward Hybrid Full Mesh—integrating 5G, WiFi, Ethernet, Fiber, and other network infrastructures. This presentation examines how AI is accelerating cyber threats: attack costs are skyrocketing, incidents surging 50% year-over-year, and ransomware development compressed from nine days to mere minutes*. We’ll explore why Hybrid SASE (not cloud-only) forms the core of an effective hybrid full-mesh security architecture and how organizations can respond when the rate of change and complexity outpace their capabilities. Most importantly, we’ll demonstrate why security isn’t just a feature but the essential foundation of operations in this new era of hyperconnected vulnerability.

*Source: 2025 Check Point Research, CyberInt, Cybercrime Magazine, IBM, SAN

[1 CPE] Demystifying Zero Trust: Simplifying Network Security

  Presented by Pete Lujan, Director, Systems Engineering • Fortinet

Today’s ever-changing threat landscape challenges traditional security models. The emergence of the Zero Trust model represents a transformative approach, reshaping how organizations protect their assets. This presentation aims to demystify Zero Trust, offering a comprehensive understanding that goes beyond buzzwords. We will explore the foundational concepts of Zero Trust, emphasizing the “never trust, always verify” philosophy. By the end of this session, attendees will be equipped with the knowledge to begin their Zero Trust journey, enhancing their security posture, and protecting critical data and systems from modern threats. Whether you are a security professional, IT manager, or organizational leader, this discussion will empower you to take decisive action toward a more secure future.

[1 CPE] LIVE Hack: Unmasking AI’s Dark Side

  Presented by Wayne Johnson, CEO • Stellar

In this eye-opening presentation, we will delve into the darker applications of artificial intelligence, specifically focusing on its potential to craft malicious code and generate deceptive voice replicas. As AI continues to evolve, its capabilities extend beyond beneficial innovations, posing significant ethical and security challenges. This session aims to shed light on how AI can be manipulated to perform nefarious tasks, such as writing harmful software or impersonating voices with high accuracy. Through live demonstrations and critical discussions, we aim to equip the audience with a comprehensive understanding of these risks and foster a dialogue on developing robust countermeasures and ethical guidelines to prevent misuse of AI technologies. Join us as we explore the shadowy corners of AI applications, understanding their implications and preparing for a secure technological future.

[1 CPE] Data Resilience to Keep Every Business Running

  Presented by Joshua Sasser, Senior Systems Engineer • Veeam

Every business should be able to bounce forward after a disruption with the confidence and control of all their data whenever and wherever they need it. We call this radical resilience, and we’re obsessed with creating innovative ways to help businesses achieve it. Join this session to learn how you can achieve data resilience with data backup, data recovery, data freedom, data security, and data intelligence across all environments.

[1 CPE] Achieving Ransomware Resilience and Disaster Recovery in a Multi-Cloud World

  Presented by Ken Smallwood, Systems Engineer • Zerto

Discover how to achieve an always-on 24/7 business, ensuring that customers and stakeholders can expect uninterrupted access to their data and applications. Learn how to solve for Ransomware Resilience, Disaster Recovery, and Multi-Cloud mobility for virtualized environments, with continuous data protection (CDP) for any app, any cloud, and any threat. With the right solutions in place, your organization can seamlessly protect critical data and applications, mitigate the risk of ransomware attacks, and maintain business continuity.

Explore strategies for achieving ransomware resilience, automated disaster recovery planning and testing, and flexible hybrid-cloud capabilities that allow you to move applications and scale capacity on demand. By integrating comprehensive data protection measures, you can ensure compliance with regulatory mandates and provide robust resilience against evolving cyber threats. This approach empowers your IT team to focus on strategic initiatives by reducing the burden of manual recovery processes and ensuring rapid restoration of operations.