[1 CPE] Navigating the Tech Terrain: Microsoft’s Evolution, Copilot’s Journey, and Apple’s Intriguing Intersection

  Presented by Alex Esterly, Sr Solutions Architect • iT1 Source

In this session, we will explore the latest developments in the Microsoft space, focusing on how these innovations will empower businesses. Microsoft is at the forefront of increasing productivity with new updates leveraging Artificial Intelligence (AI) and Machine Learning (ML) that cater to user-centric technology. One key highlight is the ability to seamlessly integrate and manage both Microsoft and Apple devices, providing comprehensive support for a diverse and evolving workforce. Join us for an insightful discussion on the trending conversations in the tech world and discover how Microsoft is shaping the future of business enablement.

[1 CPE] The Ukrainian Paradox

  Presented by Jerry Petru, President • InfraGard Washington

This session is designed for individuals interested in interrogating the far-reaching cybersecurity impact of the war in Ukraine. We will cover how to prepare your organization for a bad day; what combat electronic warfare is and whether it is different from cybercriminal activity; the tactics and techniques of a cyber guerrilla force; how drones are changing the attack vector of security; and why having a detailed action plan for incident response is critical and where to find reliable information. This presentation is based on facts and information gathered by a former US Army Special Force Operator (Green Beret) who has family and friends in Ukraine. This session will be an open and free-flowing discussion of real-world issues; attendees are encouraged to ask questions.

Bio: Jerry Petru is the President of the Washington State InfraGard Chapter and a Fellow of the British Computer Society, The Charted Institute for IT. He is an innovative and technically sophisticated professional, offering substantial years of broad-based experience in evaluating large corporate systems. Powered with a comprehensive background in development and implementation, he has authored more than forty-seven different courses based on AIX, Encryption, Linux, Networking, Security, and Virtualization technologies teaching to an audience of tens of thousands around the world for the past twenty-five years.

Mr. Petru is equipped with a proven track record of success in designing and implementing systems and policies based on Confidentiality, Integrity, and Availability to meet business continuity and disaster recovery for long-range strategic plans of Fortune 100 Companies. He is also armed with stellar qualifications in all facets of project lifecycle development, from initial analysis and conceptual design to implementation, quality review, and enhancement to optimize operational efficiencies that improve business and IT operations.

[1 CPE] Modern Segmentation Architectures

  Presented by Joe Lentz, Systems Engineer • Arista Networks

In this presentation, we will explore the different network segmentation models available, including VLANs, VRFs, and group-based segmentation models.

We will begin with an overview of the different segmentation models and discuss their benefits and drawbacks. VLANs provide a simple way to segment traffic but do not scale well in larger environments. VRFs offer more robust isolation but can be complex to manage. Group-based segmentation models offer a flexible and scalable way to segment traffic based on the endpoint itself rather than the network. We will discuss the implementation and configuration of each of these models and provide examples of how they can be used in different scenarios.

Next, we will discuss how EVPN with either VXLAN or MPLS transport can be used as an attachment point to allow for segmentation to cross the network device boundary and become a network-wide policy.

Finally, we will compare the different models to help you choose the best segmentation approach for your network, as well as how to layer these together to have a more complete design. By the end of this presentation, you will have a better understanding of modern segmentation architectures and be equipped to make informed decisions for your network.

[1 CPE] Zero Trust—Let’s Dive into Security

  Presented by Kevin Heide, Director of Enterprise Networking • Cerium Networks

Spend the morning with us while we explore the world of Zero Trust Architecture—but with a twist. Instead of a high-level overview of this strategic cybersecurity approach, we’ll get hands-on and show you practical examples using tools and environments that most of us are already familiar with.

Buckle up and join us on this exciting journey as we learn how to integrate different elements and policies across our organizations. We’ll also focus on optimizing our policies and enhancing threat protection.

[1 CPE] Unleashing the Power of the Microsoft Power Platform

  Presented by Marie Stavish, BAI Engineer • Univision Computers

Join this session as we explore the business value of the Microsoft Power Platform and discover how it can empower any organization. Our learning objectives for this session are comprehensive, ranging from understanding the fundamental concepts of Power Platform to diving into its integration with Microsoft 365 apps and services. We will explore connectors, data organization with Microsoft Dataverse, collaboration through Microsoft Teams, synergies with Dynamics 365, and even harnessing the power of Azure Services. Additionally, we will discuss how Power Platform apps work together seamlessly to create efficient solutions that boost productivity. So, fasten your seatbelts, as we unravel the potential of Microsoft Power Platform.

[1 CPE] Do You Know What You Don’t Know and Why Don’t You Know It

  Presented by Ronald Watters • Cybersecurity Advisor, Cybersecurity and Infrastructure Security Agency

The Cybersecurity landscape changes daily. Keeping up with the latest threats, solutions, and strategies always keeps technology professionals busy. Part of any good cybersecurity strategy is to be as prepared as possible with an incident response plan. Your Cyber Resilience can be improved by better planning and utilizing all possible resources.

In this session, we will discuss the unknown and less thought-about areas of Cybersecurity and Resilience. The Cybersecurity and Infrastructure Security Agency (CISA) provides free resources to companies and agencies of all sizes. Join us to learn about the tools available to you.

Ron serves as the Region 10 Private Sector Cybersecurity Advisor for the Cybersecurity and Infrastructure Security Agency. Based in Seattle, WA, he supports the Department of Homeland Security (DHS) mission of strengthening the security and resilience of the nation’s critical infrastructure.

His program coordinates cyber preparedness, risk mitigation, and incident response, and provides cyber security resources, including assessments, to the nation’s sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities.

Prior to joining DHS, Ron served 27 years with the U.S. Navy and Naval Reserve as a Submarine Sonar Technician and Diver. Finding not much use for a Submarine Sonar Technician in the Surface reserve Ron utilized his talents as an Intelligence Analyst and was utilized accordingly. Ron retired from the US Navy in 2007. During his active duty, Ron completed his bachelor’s degree in public administration with Criminal Justice emphasis (Cum Laude). He completed his two master’s degrees in education (School Administration and Secondary Education) at Loyola Marymount University. He continued his education and achieved certification as a Microsoft Certified Systems Engineer and Microsoft Certified Trainer, he was hired as the Computer Science Department Chairman at Chaminade College Preparatory High School in West Hills, CA until he was recalled to Active duty following 9/11. Upon his demobilization, he was offered a position as the Deputy, Information Systems Management Officer with the 4th Marine Corps recruiting District in New Cumberland, PA. He rose to the position of S-6 before leaving in 2009 to take a position as the Chief of the Information Assurance Division, Network Enterprise Center Ft Irwin, CA. Ron remained in that position until he left to become the Branch Manager of the Cybersecurity Branch of the Puget Sound Naval Shipyard in March 2016. Ron interviewed and was hired as the Region X Cybersecurity advisor in June of 2017 and has filled that position presently.

Ron’s computer certifications are numerous including Microsoft Certified Systems Engineer (MCSE), Certified Novell Administrator (CNA), GIAC Security Leadership Certification (GSLC), CompTIA Security+ CE, and Microsoft Certified Trainer (MCT). In addition to the professional certifications, Ron has been awarded numerous Commander’s Coins for excellence and received Two Commander’s Awards for his work at Fort Irwin.

[1 CPE] Panel: Retaining Your IT Staff in Seattle, How it Can Be Done!

  Presented by INTERFACE Advisory Council

“The other company is offering higher wages. I get to work remotely as much as I want and get a four-day workweek. Sorry, but I must take it.” Have you heard this just a few times? So many IT hiring managers are having to find creative ways to keep staff members in-house. While budgets and major company overhauls can’t always be achieved, some methods can help. 

Join the INTERFACE Advisory Council for an open conversation on how to keep your local IT staff intact. This panel features local IT hiring managers and leaders dealing with these challenges in their shops. Bring your questions as there will be an opportunity to get advice on your specific needs. 

Moderator: Tony North, Sr Manager of IT Services, King County, Washington

Panelists:

  • Yasmin Karimli, Vice President, Strategic Transformation, T-Mobile
  • Brian Moore, Director, Information Technology, Tacoma-Pierce County Health Dept
  • Tony Sheehan, Director, Information Services, Seattle Convention Center
  • Artem Zakharchenko, Senior Vice President, Robert Half

[1 CPE] Security Trends & Predictions

  Presented by Peter Ingebrigtsen, Sr Technical Marketing Manager • Arctic Wolf

In a dynamic cybersecurity landscape and fast-paced market, organizations grapple with ever-changing threats. Uncertainty abounds as they seek to benchmark themselves against their peers and prioritize initiatives. Join Arctic Wolf to explore key areas organizations are focusing on, top threat concerns, and responses by established organizations to emerging threats. Leveraging Arctic Wolf research, we’ll further present five critical security predictions for the next 12 months.

[1 CPE] Exploring the Anatomy of Modern-Day Breaches

  Presented by Tim Medin, CEO • Red Siege

Join this presentation for a comprehensive overview of modern cybersecurity threats and how breaches occur. We will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited. Throughout the presentation, we’ll discuss the importance of a proactive approach to cybersecurity, including regular security assessments, penetration testing, and vulnerability scanning, as well as education and training for employees to recognize and report suspicious activity. There are a lot of vulnerabilities in the wild, and IT administrators and security professionals often focus on the wrong issues because they are easier to monitor or measure. By the end of the presentation, you will have gained valuable insights into the latest cybersecurity threats and how to protect against them.

[1 CPE] The SMB’s Playbook for Cybersecurity in 2024

  Presented by BlackPoint IT Services

The SMB’s Playbook for Cybersecurity in 2024 speaking session offers a concise yet comprehensive overview of the cybersecurity landscape tailored for small and medium-sized businesses. This presentation traverses the evolution of digital threats, providing insights into past trends and current challenges while forecasting future risks. It emphasizes practical strategies for proactive defense and effective incident response. Attendees will learn about the latest advancements in cybersecurity, gain knowledge on managing cyber incidents, and understand the importance of building a cybersecurity-aware culture. This session is vital for SMBs seeking to enhance their digital resilience against the backdrop of an ever-evolving cyber threat environment.

Speakers:

Andrew Hutchison, Director of Service Delivery at BlackPoint IT Services

Sean Banahan, Director of US Channel Sales at WatchGuard