[1 CPE] Don’t Build a Fire Department

  Presented by Matt Martin, Sr Sales Engineer, Large Enterprise • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24×7 monitoring across your collective attack surfaces.

[1 CPE] Pragmatic AI: Moving from Aspirations to Operations to Outcomes

  Presented by Seth Crosby, Principal Architect • GCSIT

Ready to cut through the AI hype? Join us for a no-nonsense guide to making AI actually work for your business. We’ll map today’s real AI capabilities (not the social-network demos), show you practical entry points whether you’re just starting or ready to scale, and reveal the essential ingredients for successfully managing AI projects without drowning in complexity. Most importantly, you’ll learn how to deliver and measure genuine business value through smart pilot programs without budgetary surprises. This session transforms intimidating AI concepts into actionable plans with tangible results—because impressive demos are nice, but outcomes are what really matter.

What You’ll Learn:

  • How to apply a pragmatic framework to assess your AI control and develop a personalized adoption strategy
  • Techniques to identify AI opportunities that enhance your specific professional expertise
  • Methods to overcome resistance to change
  • Strategies to maintain your position as the “intelligence director” while leveraging AI as your thought assistant”
  • Practical approaches to deliver and measure genuine business value through smart, budget-conscious initiatives

This session is ideal for IT professionals and leadership in small to mid-market businesses looking for a pragmatic pathway to AI competency.

[1 CPE] Restoration in 72 Hours, Not 72 Days: Building Cyber Resilience in Healthcare

  Presented by James Cramer, PNW Healthcare GTM Lead • Rubrik

A singular focus on prevention and security is proving necessary but not sufficient to ensure continuity of operations and quality care. In an era of increasing cyberattacks, understanding the foundational principles of cyber resilience is essential for safeguarding patient data, ensuring organizational resilience, and ultimately, upholding patient care standards.

This session will explore the core concepts of cyber resilience and how they enable rapid recovery following cyber-attacks. With a focus on quantifying the impacts to operational downtime, legal costs and regulatory fines, as well as reputational damage, this discussion is tailored to help C-suite leaders prioritize cyber resilience strategies.

  • Explore the fundamental principles of cyber resilience, focusing on preserving continuity of care and business operations.
  • Assess the financial and operational risks of data breaches and ransomware attacks, including real-world examples from healthcare.
  • Discuss how to communicate the value of and build support for cyber resilience initiatives.

[1 CPE] How SASE Will Deliver Efficient and Cost-Effective Outcomes

  Presented by Johan Dupuis-Lund, Account Manager and Santhosh Suresh, Solutions Architect • Cato Networks

Secure Access Service Edge (SASE) is transforming networking and security by eliminating the complexity and costs of fragmented infrastructure. With SASE, organizations can eliminate the effort and costs required to maintain complex and fragmented infrastructure made of point solutions. Join Converge and Cato Networks as we explore how a strong SASE strategy drives business outcomes while reinforcing zero-trust security. This will be an informational and interactive presentation, including a brief demo of Cato’s SASE solution.

[1 CPE] Security First AI-Powered Networking

  Presented by Jim Galiardi, System Engineering Manager • HPE Aruba Networking

Innovations in network visibility and telemetry now allow the network to be more than just plumbing. By actively participating in your zero-trust strategy the network can now offer additional insights and methods to protect users and data on and off the network. AI/ML will be the key to managing the wealth of telemetry now available, dynamically applying policy, and the beginnings of self-aware/self-healing networks.

[1 CPE] Modern Security: Quantum Computing, AI, and External Key Management in the Cloud

  Presented by Thales

In this presentation, we will explore the emerging data threats posed by quantum computing and artificial intelligence and discuss their implications for data security. We will also delve into the advantages of external key management for cloud data, examining various strategies for protection, including encryption.

Join us to gain insights into the latest advancements in data security and learn how to safeguard your data against evolving threats.

[1 CPE] AI-Backed Cybersecurity Threats Require AI-Backed Solutions

  Presented by Chris Blanding, Public Sector Security Sales Specialist • Juniper Networks

Context: Supported by AI, cybersecurity threat actors are accelerating both the speed and breadth of attacks. Every indicator, from increasing click rates on phishing emails to shrinking attacker breakout times suggests a sea change in the threat landscape. Consequently, integration and AI/ML-backed automation across a layered cybersecurity stack is more important than ever. Historically, cybersecurity solutions were developed to address specific threats. Consequently, as the number and diversity of threats grew the number and complexity of cybersecurity solutions in the system enterprise also grew, driving complexity, slowing response times, and ultimately reducing efficacy. SIEM, SOAR, and XDR platforms were developed to visualize cybersecurity telemetry across the system enterprise, investigate, and respond to threats. While these solutions greatly improved visibility and response they are unable to respond quickly and efficiently enough to stop AI-backed threats.

Approach: In addition to the broad adoption of layered security services providing visibility across the system enterprise, the solution is to leverage a strategically integrated, AI/ML-backed, enterprise security stack that accelerates detection and automates response.

Implications: While an integrated, AI-backed enterprise security stack will allow enterprises to stay ahead of cyber risk the impact on the system enterprise is far greater. By integrating security into the broad enterprise stack, you will mature network, application, and data visibility creating opportunities for more granular, targeted SLAs that ultimately impact uptime, quality of service, flexibility and speed. That makes businesses more competitive and public entities more responsive to citizens.

[1 CPE] Cybersecurity and Compliance For 2025

  Presented by Rob Wayt, Director of Governance, Risk, and Compliance • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI, and security best practices. Presented by Rob Wayt, Director of Governance, Risk, and Compliance at Structured, this discussion will focus on security solutions to these challenges, including penetration testing and zero-trust implementations.

[1 CPE] AI in Cybersecurity: Navigating the New Frontier of Cyber Defense

  Presented by Devin Johnstone, Security Operations Consultant • Palo Alto Networks

In an era where cyber threats are becoming increasingly sophisticated, traditional security measures are often insufficient. Devin Johnstone, Security Operations Domain Consultant at Palo Alto Networks with vast experience in network security, threat intelligence, and cloud security will delve into the transformative role of Artificial Intelligence (AI) in modern cybersecurity. Attendees will gain insights into how AI enhances threat detection, enables proactive defense strategies, and addresses the evolving landscape of cyber threats. The discussion will also cover the benefits and challenges associated with integrating AI into cybersecurity frameworks, providing a comprehensive overview of how AI is shaping the future of cyber defense.

Devin has spent over a decade in the trenches of a Security Operations Center and is passionate about sharing his lived experience in building a successful SecOps team from the ground up. 8 years ago, he joined Palo Alto Networks to begin architecting the internal SOC and went on to lead the development of the Security Automation, Data Loss Prevention, Insider Risk, and Customer Outreach programs.

Devin has had the opportunity to advise thousands of security teams, big and small, in their security operations journeys through media, tours of Palo Alto Networks SOC facility, and at events in 7 countries. He has since moved into a Consultant role to help customers accelerate their realization of “the art of the possible”: AI-enabled security operations strategies prepared for whatever the future brings.

[1 CPE] Into the Future: A Virtual Tour of Palo Alto Networks’ SOC

  Presented by Devin Johnstone, Security Operations Consultant • Palo Alto Networks

Security leaders everywhere are asking the same question: how can I future-proof my cybersecurity strategy with less resources? Automation and AI are already within your reach! Learn how Palo Alto Networks is protecting itself and its customers and how you can take advantage of the same tools and strategies today.

Devin has spent over a decade in the trenches of a Security Operations Center and is passionate about sharing his lived experience in building a successful SecOps team from the ground up. 8 years ago, he joined Palo Alto Networks to begin architecting the internal SOC and went on to lead the development of the Security Automation, Data Loss Prevention, Insider Risk, and Customer Outreach programs.

Devin has had the opportunity to advise thousands of security teams, big and small, in their security operations journeys through media, tours of Palo Alto Networks SOC facility, and at events in 7 countries. He has since moved into a Consultant role to help customers accelerate their realization of “the art of the possible”: AI-enabled security operations strategies prepared for whatever the future brings.