[1 CPE] Cybersecurity and Compliance For 2026

  Presented by Structured

This session examines how organizations can align cybersecurity, privacy, and compliance programs with the realities of 2026. The presentation reviews current threat trends, executive accountability requirements, and the expanding impact of artificial intelligence on risk management. It then connects federal, state, and industry obligations, including NIST CSF 2.0, HIPAA, CJIS, PCI DSS 4.0, CMMC, and emerging privacy laws to practical security program design. Attendees will leave with a clear framework for building a complete security program that integrates governance, segmentation, risk management, Zero Trust principles, and penetration testing to reduce risk and support regulatory readiness.

[1 CPE] Transforming the Enterprise WAN: A Practical Path to SD-WAN and SASE

  Presented by John Spiegel, Security CTO and HPE Distinguished Technologist • HPE Networking

In today’s cloud-first, hybrid work environment, traditional WAN architectures often struggle with performance bottlenecks, rising costs, security gaps, and operational complexity. This session examines how modern SD-WAN solutions can provide a secure, business-driven foundation for enterprise connectivity while enabling a strategic transition to a unified Secure Access Service Edge (SASE) architecture. Attendees will gain insight into architectural considerations, security integration, performance optimization, and practical steps for evolving the WAN to support distributed users, applications, and cloud environments.

[1 CPE] Inside the 2026 Threat Detection Report: A First Look at this Year’s Report

  Presented by Red Canary

Join us for a deep dive into our 2026 Threat Detection Report. We’ll reveal how identity threats have skyrocketed to account for more than half of all detected threats. We will discuss how adversaries are weaponizing the “human element” through “paste-and-run” tactics and discover why the browser has become the ultimate frontline for both defenders and attackers alike. You’ll leave with better knowledge of the top threats and techniques, along with our recommendations on how to handle them.

[1 CPE] Beyond Backups: Building a Cloud Disaster Recovery Strategy that Works

  Presented by Seth Eliot, Principal Resilience Architect • Arpio

You’ve backed up your data. You’ve secured your application code and infrastructure as code. You’ve documented runbooks. But when Google accidentally deleted a customer’s entire cloud environment for a week, or when Change Healthcare’s partners refused connectivity for 90 days after a breach, backups alone weren’t enough. The real objective is to recover quickly and completely—data, infrastructure, networking, configuration, and security principles—all together.

In this talk, you’ll learn the requirements for fast, reliable recovery, including cross-region and cross-account isolation, complete workload recovery, and testability. We’ll walk through the design decisions you need to make and how you can implement them using cloud native tools. All while applying best practices to reduce toil and test your DR strategy safely and frequently.

[1 CPE] The Great VM Escape: Live Migration Demo from VMware to AHV

  Presented by Nutanix

Join us for a live, end-to-end demonstration of migrating virtual machines from VMware to Nutanix AHV—no fluff, just real results. We’ll showcase the power of Nutanix Move to seamlessly convert and migrate VMs from Microsoft Hyper-V, ESXi, and even cloud environments to AHV with minimal disruption. If you’re evaluating modernization strategies or planning a hypervisor transition, this session delivers practical insights you can apply immediately.

[1 CPE] Data Resilience in the Age of Attack: Protect What Matters

  Presented by Landra Pierce, Product Strategy Technologist • Veeam

Cyberattacks are no longer a distant threat; they are a reality every IT team must be prepared for. When an attack occurs, your data becomes both the primary target and the key to recovery. Many organizations still rely on backup strategies that are designed for hardware failures or accidental deletions, rather than today’s threats, like ransomware, insider risk, and automated attacks. This disconnect creates vulnerabilities, especially when backups become an overlooked entry point in your security strategy. In this session, we will address these challenges to help you better protect your organization.

This session is ideal for IT professionals who want greater confidence in safeguarding their data and peace of mind. We will examine the most common oversights that leave organizations, including those in government, education, healthcare, and other sectors, exposed to cyberthreats. You’ll discover how teams are advancing beyond basic backup to adopt a cyber-ready approach, including topics like immutability, threat awareness, rapid recovery, and intelligent automation.

Our focus will be practical and grounded in real-world scenarios, and what truly works when pressure is high and time is limited. Because when every minute counts and trust is at stake, data resilience means more than surviving an attack. It’s about protecting what matters most and emerging even stronger.

[1 CPE] Driving Successful AI Adoption in 2026

  Presented by Hunter Helfgott, Data & AI Consultant & Abram Erickson, Data & AI Solutions Architect • Cerium Networks

In this session, we’ll cover the critical steps organizations can take to adopt AI successfully this year, including proven strategies, common pitfalls, and practical frameworks to move from experimentation to enterprise-wide implementation. You’ll leave with actionable guidance to align AI initiatives with business goals, build organizational buy-in, and measure ROI in a way that lasts.

AI adoption is about making AI deliver real business outcomes without creating unnecessary risk, rework, or frustration.

What We’ll Cover

  • The state of AI adoption in 2026: key trends and challenges teams are facing
  • Lessons learned in 2025: what worked, what did not, and what to do differently this year
  • A practical framework for successful AI adoption: from strategy to execution
  • Measuring success: KPIs, governance, and how to prove value over time

[1 CPE] SCARE to CARES: Delivering Digital Transformation without Chaos

  Presented by Saby Waraich • Chief Information Officer, Clackamas Community College

In the dynamic world of organizational leadership, the ability to navigate and lead through complex transformations is critical. Saby Waraich, a seasoned leader with extensive experience in technology and change management, offers an insightful session designed to empower leaders to evolve from a mindset of fear and control (“SCARE”) to one grounded in empathy, trust, and collaboration (“CARES”).

This session delves into the essential qualities and strategies required to lead successful transformations in today’s fast-paced and often unpredictable environment. Participants will explore how leaders can shift their approach from being overly cautious and risk-averse to fostering a culture of care, where team members feel supported, valued, and motivated to contribute their best.

Recognized by Thinkers360 as a Global Thought Leader and Influencer in the Top 10 for Project Management and Business Strategy, and in the Top 50 for Leadership, Saby Waraich is not just a speaker—he’s a practitioner in the trenches every single day. Delivering keynotes and workshops that are as inspiring as they are practical, Saby marries actionable insights with a captivating storytelling style. His mission is not just to inspire but to equip you with the strategies needed to excel personally and professionally.

A veteran in driving change and fostering innovation, Saby offers a unique perspective backed by real-world experience. Whether on stage or virtually, his energetic and engaging approach provides the tools you need to stand out as a leader, build trust, and ultimately drive better results. Don’t just listen to a speech; gain a professional edge from someone who’s living it.

[1 CPE] What the Hack is Going On?

  Presented by Tim Medin, Chief Executive Officer • Red Siege

A comprehensive overview of modern cybersecurity threats and how breaches occur. We will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited. There are a lot of vulnerabilities in the wild, and IT administrators and security professionals often focus on the wrong issues because they are easier to monitor or measure. By the end of the presentation, you will have gained valuable insights into the latest cybersecurity threats and how to protect against them.

[1 CPE] Implementing AI: A Panel Discussion on the Steps You Need to Take Now

  Presented by INTERFACE Advisory Council

Your success as an IT professional has always depended on your ability to adapt. With the rapid expansion of AI capabilities, how are you evaluating and applying these tools today? What changes have you made to drive value—and where are you encountering obstacles?

Join this peer-led panel discussion to build a practical, prioritized “to-do list” of what you need to know. Our Advisory Council will share firsthand experiences implementing AI across a range of use cases while maintaining strong security controls. Panelists will outline concrete steps for developing an effective AI policy and offer guidance on engaging stakeholders to create organizational alignment. You will also explore the critical role of data governance and security in responsible AI adoption.

The discussion will address additional considerations, including collaboration with legal and HR teams, to help you prepare for enterprise-wide implementation. Bring your questions and leave with actionable insights you can apply immediately to implement AI with confidence.

Panelists:

  • Michael Bray, Chief Information Security Officer, The Vancouver Clinic
  • Brandon Gatke, AVP, Information Technology and Security, Portland Community College
  • Steve Hankel, Vice President, Information Technology, Johanson Transportation Service
  • Jaya Srinivasan, CISO, Director of Cybersecurity, M Financial Group