[1 CPE] The Most Important Shift for Cybersecurity in a Generation

  Presented by Steve Riley, Field CTO • Netskope

We live in a world where everything is hybrid and the blend between personal, corporate, private, and public is ever-changing and presents us with a host of new challenges. This has increased and complicated the attack surface and the pressure to converge tools and do “more with less” is at peak levels. We must meet this watershed moment with the right team, plans, and technology.

Join this interactive session to learn:

  • How to build an effective plan for change without adding to the chaos
  • What consolidation approaches save money without sacrificing security
  • Use cases that deliver immediate value and efficiency while improving user experience

Steve Riley is a Field CTO at Netskope. Having worked at the intersection of cloud and security for pretty much as long as that’s been an actual topic, Steve offers that perspective to field and executive engagements and also supports long-term technology strategy and works with key industry influencers. A widely renowned expert speaker, author, researcher, and analyst, Steve came to Netskope from Gartner, where for five years he maintained a collection of cloud security research that included the Magic Quadrant for Cloud Access Security Brokers and the Market Guide for Zero Trust Network Access. Before Gartner, Steve spent four years as Deputy CTO of Riverbed Technology and held various security strategy and technical program management roles at Amazon Web Services for two years and at Microsoft for eleven years. Steve’s interest in security began all the way back in 1995 when he convinced his then-employer that it would be a good idea to install a firewall on their brand-new internet connection.

[1 CPE] How AI Can Think Like an Attacker

  Presented by Darktrace

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

[1 CPE] Cyber Audibles: Making the Most of Your Digital Defense

  Presented by Jamion Aden, Solutions Architect • IP Pathways

In the realm of cybersecurity, no conventional game plan, Business Continuity Plan, or tabletop exercise can fully anticipate and mitigate the challenges posed by cyber threats. Join us as we navigate through real-world encounters, and ‘calling the play at the line,’ when ransomware becomes the opposing force.

Our Solutions Architect, Jamion Aden, leverages over 18 years of comprehensive industry experience to lead this engaging and interactive presentation. In doing so, we aim to equip you with the necessary insights and strategies essential to effective event preparedness, as well as furnish your security toolkit with the necessary tools for bolstering your organization’s cyber defenses.

[1 CPE] Learning from the IT Titans of Omaha & Lessons from the Recent Past

  Presented by Scott Davis, CDW Enterprise Architecture Team Field CTO & former Hitachi Field CTO  • Hitachi Vantara & CDW

You deserve a raise. Scratch that, you deserve a vacation and a raise. As an IT Titan, you were immeasurable in keeping your company afloat when the world halted in 2020 and threw all your initiatives into chaos. As an IT Titan, you persevered when all your priorities shifted to supporting every employee remotely and transforming your business into running 24/7 during the WFH mandate, while still caring for your loved ones. You achieved migrating your organization into the cloud, extending your security firewalls into the homes of your workforce, keeping stringent compliance requirements, and automating workflows to continue meeting stretch goals with limited staff. Whew!

As you reflect on your accomplishments, what did you learn? And what could you have done differently that will be top of mind to adapt to the woes of today, including perhaps mounting technical debt, a looming recession, an upcoming election year, ongoing supply chain issues, and urgent sustainability efforts?

  • In the year of efficiency, how can businesses leverage cloud repatriation efforts and containerization to cut ballooning cloud costs?
  • As you continue layering security tool after security tool, how can you implement cyber resiliency and drastically limit your risk from attackers?
  • With the looming recession and a hiring freeze, how can IT departments meet stretch goals by leveraging adaptive automation technologies, such as ChatGPT? And how can compliance teams regulate these new tools to ensure data privacy while maintaining brand equity?
  • How can you help accelerate your organization’s timeline for becoming carbon net-zero and ditch reusable straws and $0.10 plastic bags?

Join us as we review the top IT trends for 2023/2024 with CDW’s Scott Davis, Strategist and Former Hitachi Field CTO. As a former CTO and COO, Scott brings a unique perspective in guiding programs for organizational change. He brings his executive experience to help identify customer goals and challenges that disrupt the status quo to enable a better digital transformation roadmap leveraging the value of data, the IoT, and AI to achieve new business insights faster.

[1 CPE] Selecting an MDR Vendor for Your Organization

  Presented by Tim Evans, Co-Founder and Senior Vice President • Adlumin

Join Adlumin’s EVP, Tim Evans, as he provides guidance on selecting the right Managed Detection and Response (MDR) vendor for your organization. Evans will cover key considerations such as assessing your organization’s security needs, evaluating the vendor’s capabilities and expertise, and ensuring alignment with your organization’s goals and objectives. Attendees will gain insights into the critical factors to consider when choosing an MDR vendor to enhance their organization’s cybersecurity posture.

[1 CPE] How to Prepare and Respond to Data-Oriented Cyberattacks in Realtime

  Presented by Jonathan Halstuch, Co-Founder and CTO • RackTop Systems with SD3IT

Today’s cyber threats call for a new approach to data security, placing protections closer to the data. In this session, you’ll develop an understanding of why advanced cyber storage solutions are critical for defending production data from theft and destructive cyberattacks like ransomware. Learn strategies for reducing your organization’s threat window with a data-centric zero-trust architecture and artificial intelligence. Improve security and cyber hygiene while embracing the CISA Zero Trust Maturity Model to ensure your organization’s data is defended during each of the three phases of an attack.

Key takeaways:

  • Stay ahead of insider threats, data theft, ransomware, and extortionware with active defense
  • Improve security and cyber hygiene by aligning with the CISA Zero Trust Maturity Model
  • How to involve stakeholders in a data-centric approach to security

[1 CPE] Optimizing Mainframe Environments Against Today’s Cybersecurity Threats

  Presented by Don Pecha, Chief Information Security Officer • FNTS

IBM Z is more modern than you may think. The IBM Mainframe is inherently built around security and quantum proof. Mainframes are still at the core of many businesses. Their mission critical data is secured and runs on a mainframe. Insurance, Finance, Manufacturing, Grocery, and Healthcare among other businesses are still actively leveraging mainframes. How do we know these critical machines are secure?

[1 CPE] Defend Today, Secure Tomorrow

  Presented by Warren Hagelstien • Cybersecurity Advisor, CISA

Join Warren Hagelstien, CISA Cybersecurity Advisor, for a discussion of the evolution of ransomware, beginning with the first reported incident to the present. This presentation will provide a high-level overview of one incident followed by a look at the lessons learned. We’ll close with an introduction to the Department of Homeland Security’s (DHS) youngest agency, the Cybersecurity and Infrastructure Security Agency (CISA), and resources available at “no cost” to State, Local, Tribal, and Territorial Governments and Organizations with Critical Infrastructure.

Mr. Warren Hagelstien serves as a Cybersecurity Advisor for Region 7 (IA, KS, MO, and NE) for CISA in the Integrated Operations Division. Based in Omaha, NE he supports the Department of Homeland Security’s mission of partnering with industry and government to understand and manage risk, strengthening the security and resilience of the nation’s critical infrastructure. Mr. Hagelstien provides cyber preparedness assessments and protective resources, working group support, leadership, partnership in public-private development, and coordination and support in times of cyber threat, disruption, or attack to the nation’s sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities.

Mr. Hagelstien holds a Master of Science in Cybersecurity and a Master of Business Administration from Bellevue University. He also holds a Bachelor of Science degree in Management Information Systems from Bellevue University. He is a member of (ISC)2 and has been a Certified Information System Security Professional (CISSP) in good standing for the past 12 years.

[1 CPE] Educating Your Guesses: How to Quantify Risk and Uncertainty

  Presented by Sara Anstey, Director of Data Analytics and Integration • Novacoast

Asking for budget and justifying spend in cybersecurity departments can be a difficult task due to limited data and high uncertainty of future events. This talk will dive into quantitative risk analysis as it relates to cybersecurity –– how to model uncertain events and understand financial risk. Attendees will see a first-hand demonstration of how quantitative modeling can be used to communicate risk and understand ROI. Attendees will walk away with the tools needed to present cyber risk as a dollar amount that can be easily understood by other business decision-makers at their company.

[1 CPE] Retaining Your IT Staff in Nebraska, Can it Be Done?

  Presented by INTERFACE Advisory Council

“The other company is offering higher wages. I get to work remotely as much as I want and get a four-day workweek. Sorry, but I must take it.” Have you heard this just a few times? So many IT hiring managers are having to find creative ways to keep staff members in-house. While budgets and major company overhauls can’t always be achieved, some methods can help.

Companies throughout Nebraska have challenges in retaining IT staff. Join the INTERFACE Advisory Council for an open conversation on how to keep your local IT staff intact. This panel features local IT hiring managers and leaders dealing with these challenges in their shops. Bring your questions as there will be an opportunity to get advice on your specific needs.

Moderator: Ron Woerner, Professor, Bellevue University

Panelists:

  • Samantha Harvey-Fleeman, Account Director, LinkedIn
  • Rob LaMagna-Reiter, Chief information Security Officer, Hudl
  • Lisa McKee, President, ISACA Omaha