[1 CPE] Paradise Lost: Leave Hackers Stranded with Automated Microsegmentation

  Presented by Bryan Ward, Customer Engineer • Zero Networks

Flat networks and overly permissive accounts are paradise for cyber attackers. With defenses stuck on island time while hackers work overtime, traditional network security methods lag behind modern threats. This interactive session will outline the real-world strategies a top 10 US credit union leveraged to:

  • Proactively block ransomware and sophisticated threats
  • Streamline regulatory compliance for improve audit results
  • Eradicate manual tasks like tagging, grouping, and policy creation
  • Dynamically secure privileged ports
  • Accelerate microsegmentation and Zero Trust, avoiding a multi-year project

Don’t miss this opportunity to explore proven and practical applications of microsegmentation to modernize cybersecurity strategy. Turn your network from a beach vacation into a desert island for hackers – learn how to leave attackers stranded in record time with automated microsegmentation.

[1 CPE] Heart of Agile with Aloha: Driving IT Innovation

  Presented by Bradley K. Foster, PMP, CSM, CPO, CAC, CAL • Worth Agility

Join Bradley K. Foster, founder of Worth Agility, to explore how Alistair Cockburn’s Heart of Agile—Collaborate, Probe, Deliver, Reflect, Improve—blends with Aloha’s compassion to ignite IT innovation. With 5+ years in health and aviation IT, Bradley led Hawaiian Airlines’ EDW (Microsoft-driven, real-time insights), Health Catalyst’s cloud analytics at Queens (30% efficiency gain), and Hawaii DOT’s Google CCAI demo (40% faster calls).

Learn to probe risks early, collaborate across silos, and deliver secure systems under Worth Agility’s human-centered approach, guided by DevSecOps insights from Isaac Sacolick.

Ideal for IT leaders tackling ransomware, AI, and bandwidth challenges with agility and heart.

[1 CPE] Restoration in 72 Hours, Not 72 Days: Building Cyber Resilience in Healthcare

  Presented by Daniel Tang, Healthcare Solutions Engineer • Rubrik

A singular focus on prevention and security is proving necessary but not sufficient to ensure continuity of operations and quality care. In an era of increasing cyberattacks, understanding the foundational principles of cyber resilience is essential for safeguarding patient data, ensuring organizational resilience, and ultimately, upholding patient care standards.

This session will explore the core concepts of cyber resilience and how they enable rapid recovery following cyber-attacks. With a focus on quantifying the impacts to operational downtime, legal costs and regulatory fines, as well as reputational damage, this discussion is tailored to help C-suite leaders prioritize cyber resilience strategies.

  • Explore the fundamental principles of cyber resilience, focusing on preserving continuity of care and business operations.
  • Assess the financial and operational risks of data breaches and ransomware attacks, including real-world examples from healthcare.
  • Discuss how to communicate the value of and build support for cyber resilience initiatives.

[1 CPE] AI or Die: Will Agentic AI and Hyperautomation Save the SOC?

  Presented by Aaron Edwards, Regional Sales Manager, and Rich Chen, Sales Engineer • Torq

The promise of SOAR has repeatedly failed. Organizations have invested heavily in enterprise solutions yet the ability to deliver automated, preventative, and corrective measures still remains a distant reality for most CISOs. Why? The concept of an Autonomous SOC is everywhere – promising to streamline security operations processes, reduce analyst alert fatigue, and improve overall security posture. But how does the dream of an Autonomous SOC play out in the real world of security operations? Is 2025 the year that Agentic AI where Hyperautomation saves the SOC?

[1 CPE] Don’t Build a Fire Department

  Presented by Tom Simonis, Sr Sales Engineer, Enterprise US • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24×7 monitoring across your collective attack surfaces.

[1 CPE] Empowering Hawai’i’s Future: Leading IT Innovation in State Government

  Presented by Christine Sakuda • Chief Information Officer, State of Hawaiʻi

Hawaiʻi State Chief Information Officer Christine Sakuda shares her journey transitioning from private sector leadership into her current role in the state’s central technology division. Sakuda will offer insights on how she fulfills the governors’ priorities while partnering with all executive departments to develop common IT solutions and will discuss her experience of learning to work with the legislature on bills and budget priorities.

Christine Sakuda has more than 25 years of experience in leading enterprise-level IT initiatives including leading community IT systems development, managing stakeholder relations, and collaborating with IT vendors to implement a range of technology modernization projects. She is the State’s first female CIO of Native Hawaiian ancestry. She also served as the first executive director of Transform Hawaii Government (THG), a nonprofit organization dedicated to catalyzing the modernization of public services through people, processes, and technology, and as the Executive Director of the Hawaiʻi Health Information Exchange (HHIE).

[1 CPE] Building Hawaii’s Cybersecurity Future, Together

  Presented by Michael Cardenas, CTO, Co-Founder, MC3 Technologies • Vicinity

Hawaiʻi faces a growing cybersecurity threat landscape and yet thousands of IT and cyber positions remain unfilled locally. We will share why homegrown talent is key to strengthening our region’s digital resilience. This session explores today’s top cyber risks, practical steps for small businesses to boost their security, and how collaboration between industry, education, and community partners is critical for protecting Hawaiʻi’s future. Attendees will walk away with actionable strategies to enhance their cybersecurity posture and engage in workforce development efforts that build a stronger, more secure Hawaiʻi.

[1 CPE] AI: The New Attack Surface

  Presented by Jeff Crume, Distinguished Engineer, Data and AI Security, IBM • Converge Technology Solutions

Artificial Intelligence introduces novel security challenges, including adversarial attacks and model vulnerabilities. Also, there is the issue of whether you can trust the AI you have. This session will cover six different types of AI attacks to provide a better understanding of the threatscape along with some suggestions for securing the data, the model, the usage and the infrastructure.

[1 CPE] Securing the Hyperconnected World in the AI Era

  Presented by Grant Asplund, Security Evangelist • Check Point

The AI revolution is fundamentally transforming cybersecurity, while the future of networking evolves toward Hybrid Full Mesh—integrating 5G, WiFi, Ethernet, Fiber, and other network infrastructures. This presentation examines how AI is accelerating cyber threats: attack costs are skyrocketing, incidents surging 50% year-over-year, and ransomware development compressed from nine days to mere minutes*. We’ll explore why Hybrid SASE (not cloud-only) forms the core of an effective hybrid full-mesh security architecture and how organizations can respond when the rate of change and complexity outpace their capabilities. Most importantly, we’ll demonstrate why security isn’t just a feature but the essential foundation of operations in this new era of hyperconnected vulnerability.

*Source: 2025 Check Point Research, CyberInt, Cybercrime Magazine, IBM, SAN

[1 CPE] Demystifying Zero Trust: Simplifying Network Security

  Presented by Pete Lujan, Director, Systems Engineering • Fortinet

Today’s ever-changing threat landscape challenges traditional security models. The emergence of the Zero Trust model represents a transformative approach, reshaping how organizations protect their assets. This presentation aims to demystify Zero Trust, offering a comprehensive understanding that goes beyond buzzwords. We will explore the foundational concepts of Zero Trust, emphasizing the “never trust, always verify” philosophy. By the end of this session, attendees will be equipped with the knowledge to begin their Zero Trust journey, enhancing their security posture, and protecting critical data and systems from modern threats. Whether you are a security professional, IT manager, or organizational leader, this discussion will empower you to take decisive action toward a more secure future.