[1 CPE] Architecture Matters: What You Need to Know When Evaluating SASE & SSE Solutions

  Presented by Jason Bellmont, Platform Solutions Architect • Netskope

SASE and SSE are more than just buzzwords; they represent the future of network and security. But before you entrust all your critical traffic to these cloud solutions, a deeper dive into their underlying architecture is essential. Not all clouds are created equal, and understanding the nuances of these solutions, which are built on the global internet, is paramount for success.

This session will empower attendees with the crucial architectural questions to ask your SASE/SSE providers, ensuring you make an informed decision. We’ll explore:

  • Public vs. Private Cloud: What are the implications for your data and performance?
  • Server Locations: Where are security services hosted, and why does proximity matter?
  • Network Architecture: How is the provider’s network built and managed for optimal reliability and speed?
  • Capacity Management: How do they scale to meet your evolving demands and ensure consistent performance?
  • Performance Measurement: What metrics should you track, and how do providers guarantee their SLAs?
  • Incident Response: What happens when something breaks, and how quickly can services be restored?

Arm yourself with the right questions to build a secure and high-performing SASE/SSE future.

[1 CPE] Role of Network Heartbeat Services in Hybrid Multi-Cloud Transformation

  Presented by Faraz Aladin, Vice President, Technical Marketing • Infoblox

As organizations embrace hybrid multi-cloud strategies, managing core network heartbeat services—DNS, DHCP, and IP Address Management (DDI)—becomes increasingly complex. Traditional approaches to DDI often struggle with the scale, agility, and security demands of modern cloud architectures. In this session, we will explore how a cloud-first, automated, and secure DDI solution can enhance network visibility, simplify operations, and improve performance across on-premises and cloud environments.

[1 CPE] FBI Cybersecurity Briefing: Safeguarding Against Modern Threats

  Presented by Nick Smith • FBI Special Agent

Join FBI Special Agent Nick Smith for a discussion on the top cyber threats of today. This presentation will cover some of the basic mitigation strategies available that users can enact right now. This discussion will also provide an overview of the FBI’s role in addressing various cyber threats.

Special Agent Nick Smith is a cyber agent with the Federal Bureau of Investigation’s Phoenix Division, focusing on criminal cyber matters including computer intrusions, malware, ransomware, and combating criminal infrastructures. Prior to working for the FBI, Nick served several cyber-related roles across government and within the U.S. Intelligence Community. He also served as a Police Officer in Ohio for several years and is a veteran of the U.S. Air Force.

Nick holds a BS in Homeland Security from Embry-Riddle Aeronautical University and an MS in Information Systems Engineering from the Johns Hopkins Whiting School of Engineering. He also maintains certification as a Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH).

[1 CPE] Reinventing TPRM: Managing Third-Party Cyber Risk with Intelligence

  Presented by Mark Nafe, Director, Solutions Consulting • RiskRecon by Mastercard

In today’s hyperconnected enterprise, your cybersecurity risk doesn’t end at the firewall—it extends to every vendor, supplier, and partner in your digital ecosystem. Yet many organizations struggle to gain visibility into third-party risk, relying on outdated methods that can’t keep pace with modern threats.

This session explores how leading organizations are leveraging machine learning, threat intelligence, and continuous monitoring to transform their third-party risk management (TPRM) programs from reactive check-the-box exercises into proactive, intelligence-driven strategies. You’ll learn how advanced technologies are enabling security teams to identify high-risk vendors before they become the weak link—and how TPRM is evolving into a critical pillar of enterprise resilience.

Whether you’re already managing vendor risk or just starting to explore the issue, this session will provide the business case, practical frameworks, and technology insights you need to elevate your security posture.

[1 CPE] Active Directory: Ransomware, Risk, Review, Recovery

  Presented by Rob Ingenthron, Sr Solution Engineer • Semperis

Cyberattackers are adept at finding ways through your defenses and into identity systems like Active Directory. Many organizations use Active Directory as the primary identity service, and Active Directory is typically tied into almost everything, including Entra ID. From there, they can move laterally, escalate privileges, access sensitive resources, and inject malware or ransomware. Implementing a layered defense that includes identity threat detection and response (ITDR) is key to protecting your operational resilience.

Join Rob Ingenthron, Sr Solution Engineer, to learn:

  • How layered defense has changed over time
  • Why ITDR is now an essential part of a robust layered defense strategy
  • The continuing importance of hygiene and auditing for Active Directory
  • How a layered defense can help you combat attacks that are designed to bypass traditional methods of defense
  • Which best practices lead to a strong layered defense

[1 CPE] Hackers Gonna Hack: When Defenses Break Down

  Presented by Jason Graun, Director of Sales Engineering • Fortinet

Organized threat actors continue to be the most dangerous risk in Cybersecurity. The tactics used to get into endpoints are constantly evolving in sophistication and scale. In this session, we will discuss industry trends/challenges, as well as walk through the tactics, techniques, and procedures used by threat actor groups by using a known active group as an example. We will also discuss practical real-world situations and how to defend against them using a unique approach to stopping ransomware before it becomes an active breach.

Jason Graun is the Sales Engineering Director for the Fortinet Security Operations team. He brings over 20 years of experience in information security and has spent 11 years at Fortinet. He regularly speaks at industry events, CIO/CISO summits, and works closely with IT executives to understand the business challenges they face in securing assets across an ever increasingly mobile workforce. Jason’s focus is to find ways technology can solve the biggest challenges in information security, he also holds a patent on cloud security malware inspection methods.

[1 CPE] Securing the Future of Cybersecurity Protection in an AI-Driven Digital Landscape

  Presented by Charles Everette, Field CISO Advisor • ESET

In today’s digital age, advancements in artificial intelligence are reshaping how businesses approach cybersecurity. AI technologies offer powerful tools for detecting, preventing, and responding to cyber threats in real time. However, they also introduce new challenges, including adversarial attacks and ethical concerns. This presentation explores the transformative role of AI in modern cybersecurity strategies. By understanding both the opportunities and risks AI presents, organizations can better protect their digital assets and adapt to the evolving threat landscape.

[1 CPE] Breaking Down Silos: Unify Assets, Minimize Attack Exposure

  Presented by Lucas Zaichkowsky, Sr Sales Engineer • Axonius

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.

Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.

As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.

[1 CPE] Surfing the Different Waves of AI

  Presented by Tyler Stuart, Sales Engineer, Trellix • Cyberuptive

Riding the ever-breaking wave of AI security model evolution can feel like a gnarly wipeout. This presentation will help your security team hang ten by navigating the diverse swells of Language Learning Models (LLMs), paddling through the currents of Retrieval-Augmented Generation, and catching the perfect set of Agentic AI. Our goal is to provide the knowledge you need to confidently choose and manage the right boards – I mean, tools – for your organization’s security lineup.