[1 CPE] Achieving Ransomware Resilience and Disaster Recovery in a Multi-Cloud World

  Presented by Ken Smallwood, Systems Engineer • HPE Zerto Software

Discover how to achieve an always-on 24/7 business, ensuring that customers and stakeholders can expect uninterrupted access to their data and applications. Learn how to solve for Ransomware Resilience, Disaster Recovery, and Multi-Cloud mobility for virtualized environments, with continuous data protection (CDP) for any app, any cloud, and any threat. With the right solutions in place, your organization can seamlessly protect critical data and applications, mitigate the risk of ransomware attacks, and maintain business continuity.

Explore strategies for achieving ransomware resilience, automated disaster recovery planning and testing, and flexible hybrid-cloud capabilities that allow you to move applications and scale capacity on demand. By integrating comprehensive data protection measures, you can ensure compliance with regulatory mandates and provide robust resilience against evolving cyber threats. This approach empowers your IT team to focus on strategic initiatives by reducing the burden of manual recovery processes and ensuring rapid restoration of operations.

[1 CPE] Modern Data Center Network Automation

  Presented by Bill Wester, Sr Product Manager  • Juniper Networks

The presentation will focus on Juniper Apstra and Designing Data Centers with Intent. We will discuss the design, deployment, and operation of modern EVPN VXLAN data centers and talk about how machine learning and AI are helping to make data center operations easier for the operators. We hope that the attendees will take away a new appreciation of how modern automation can help solve the hardest data center problems with ease.

[1 CPE] Blind Spots in Cybersecurity: Identifying Hidden Risks in Your Environment

  Presented by Tanner Harrison, Systems Engineer • Fortinet

In this session, we’ll explore where hidden risks often lurk and share practical strategies to identify, address, and prevent them. From proven techniques to close security gaps to Zero-Trust and cloud-first solutions, you’ll leave with actionable insights to strengthen your defenses and build a more resilient, proactive security posture.

Key Takeaways:

  • Pinpoint common areas where security blind spots exist in organizations
  • Proven techniques to close critical gaps and reduce exposure
  • Insights for continuously monitoring and responding to evolving threats in real time
  • Practical steps for fostering a proactive, security-first culture across your organization

[1 CPE] Outsmart Cybercrime: Protection Optimized with MDR

  Presented by Jesus Lopez, Solution Architect • ESET

With the rise of cyber threats and ongoing cyber talent shortage continuing unabated, many organizations are turning toward Managed Detection and Response (MDR). So how can this service enhance an organization’s overall security posture and improve incident response? This presentation explores combatting new threats, like multi-extortion ransomware with MDR how to leverage AI-powered threat detection and response, and human expertise, to prevent new ransomware variants the significance of a prevention-first, holistic cybersecurity strategy.

[1 CPE] Code to Cloud to SOC: The Next Evolution in Cloud Security

  Presented by JR Silverthorne, Partner Solutions Consultant, West • Palo Alto Networks

Cloud teams have become increasingly overwhelmed, and critical issues are left unresolved. The volume of Cloud-related alerts have been increasing as cloud-related threats increase in the SOC. The nature of threats and not new, with basic hygiene issues left unresolved. Why? Because neither the SOC nor the cloud team truly owns them. SOC teams lack deep cloud context. Cloud teams aren’t built for fast triage. What’s needed is a hybrid skillset—someone who thinks like a cloud engineer but responds like a SOC analyst. That talent doesn’t exist in most orgs.

What is needed are toolsets that merge Security Operations Platform with Cloud Security. A convergence that allows organizations to offer preventative and incident response within the same platform with prioritization and remediation to prevent breaches. This approach supports protection of the entire application lifecycle and dynamic runtime protection for Code to Cloud to SOC protection.

[1 CPE] AI Agents & Automation: How They’re Changing the Way We Work

  Presented by Abram Erickson, Lead Data & AI Engineer, and Hunter Helfgott, AI Solutions Consultant • Cerium Networks

AI-powered agents are generating a lot of buzz. But what do they actually do?

In this session, you will see how organizations are starting to use AI-powered agents to solve business challenges and create new opportunities. We’ll cover advanced tools like custom GPTs, Copilot Studio, and Azure AI Foundry and see how they can be leveraged to drive AI innovation and streamline workflows. This session offers a deep dive into automation’s role in simplifying complex processes, enhancing customer experiences, and improving productivity.

[1 CPE] Balancing Innovation & Security: Montana’s Journey to Secure AI Integration

  Presented by Chris Santucci • Chief Information Security Officer, State of Montana

The State of Montana has embraced a transformative approach to artificial intelligence (AI), shifting from a traditional “no-first” security mindset to one that enables business objectives while managing risk. This keynote will explore how Montana has strategically implemented AI to enhance efficiency and innovation, all while safeguarding citizen data and ensuring business continuity.

Key highlights include:

  • Empowering Users: Recognizing that AI is an inevitable tool for workers, the state has developed frameworks to ensure its secure use while recognizing the efficiencies gained for the average user.
  • AI Governance: Establishing an AI Acceptable Use Standard, mandatory training programs to educate users on critical evaluation and responsible usage, as well as establishing an AI Governance Committee and AI Community of Practice.
  • Secure Implementation: Vetting applications, setting guardrails, and partnering with vendors who meet stringent security requirements.

This presentation will also delve into why Montana has pursued this path – encouraging innovation while providing secure tools and clear direction in an era where not all AI is created equal. Attendees will leave with actionable insights into how to enable AI adoption responsibly, foster efficiency, and lead from the front in cybersecurity.

Chris Santucci is the State Chief Information Security Officer for Montana, with over five years of service to the state, including two years as State CISO. Chris leads Montana’s enterprise security strategy with a focus on proactive risk management, business partnership, and transparency. He is passionate about empowering users to interact with technology securely, ensuring both citizen data protection and business continuity. Chris holds an MBA in IT Management and is a Certified Information Security Manager (CISM).

[1 CPE] From Back-End to Boardroom: Securing Your Seat at the Table

  Presented by INTERFACE Advisory Council

Decisions are made every day at your organization that will impact all employees. Budgets, policies procedures, and more are discussed in board rooms, on conference calls, or at a staff lunch. Who is a part of these discussions? Are you? So often Information Technology departments are not included in key decisions about the direction of an organization, and they should be.

Join the INTERFACE Advisory Council for an open discussion about securing your “seat at the table.” IT performs so many crucial services that help all aspects of a business, it makes sense that you are offering up the needed insight into technology’s role in key decisions. Join this panel discussion to hear from your peers about how you can accomplish this tough task.

Moderator: Brad Somers, Manager, Information Technology, Livingston HealthCare

Panelists:

  • JJ Bestgen, Sr Identity Management Administrator, Town Pump
  • Kelly Ferriter, Manager, Network Services, NorthWestern Energy
  • Ryan Knutson, CIO, Vice President, Information Technology, Montana State University
  • Peter Martinson, Managing Director, Strategic IT, Montana State University

[1 CPE] Securing the Future of Cybersecurity Protection in an AI-Driven Digital Landscape

  Presented by Ben Kahlon, Enterprise Account Executive • ESET

In today’s digital age, cybersecurity risk insurance and AI advancements are reshaping business security strategies. Cybersecurity insurance is crucial for mitigating the financial impacts of cyber threats, while AI offers both enhanced protection and new challenges. This presentation explores the evolving cyber insurance landscape and the transformative role of AI in cybersecurity. By integrating these insights, businesses can better navigate modern cybersecurity complexities. Leveraging cyber insurance and AI innovations, organizations can safeguard their digital assets in an interconnected world.

[1 CPE] Cybersecurity and Compliance For 2025

  Presented by Chris Green, Manager of Penetration Testing • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI, and security best practices. Presented by Chris Green, Manager of Penetration Testing at Structured, this discussion will focus on security solutions to these challenges, including penetration testing and zero-trust implementations.