[1 CPE] LIVE Hack: Unmasking AI’s Dark Side

  Presented by Wayne Johnson, CEO • Stellar

In this eye-opening presentation, we will delve into the darker applications of artificial intelligence, specifically focusing on its potential to craft malicious code and generate deceptive voice replicas. As AI continues to evolve, its capabilities extend beyond beneficial innovations, posing significant ethical and security challenges. This session aims to shed light on how AI can be manipulated to perform nefarious tasks, such as writing harmful software or impersonating voices with high accuracy. Through live demonstrations and critical discussions, we aim to equip the audience with a comprehensive understanding of these risks and foster a dialogue on developing robust countermeasures and ethical guidelines to prevent misuse of AI technologies. Join us as we explore the shadowy corners of AI applications, understanding their implications and preparing for a secure technological future.

[1 CPE] Data Resilience to Keep Every Business Running

  Presented by Joshua Sasser, Senior Systems Engineer • Veeam

Every business should be able to bounce forward after a disruption with the confidence and control of all their data whenever and wherever they need it. We call this radical resilience, and we’re obsessed with creating innovative ways to help businesses achieve it. Join this session to learn how you can achieve data resilience with data backup, data recovery, data freedom, data security, and data intelligence across all environments.

[1 CPE] Achieving Ransomware Resilience and Disaster Recovery in a Multi-Cloud World

  Presented by Ken Smallwood, Systems Engineer • Zerto

Discover how to achieve an always-on 24/7 business, ensuring that customers and stakeholders can expect uninterrupted access to their data and applications. Learn how to solve for Ransomware Resilience, Disaster Recovery, and Multi-Cloud mobility for virtualized environments, with continuous data protection (CDP) for any app, any cloud, and any threat. With the right solutions in place, your organization can seamlessly protect critical data and applications, mitigate the risk of ransomware attacks, and maintain business continuity.

Explore strategies for achieving ransomware resilience, automated disaster recovery planning and testing, and flexible hybrid-cloud capabilities that allow you to move applications and scale capacity on demand. By integrating comprehensive data protection measures, you can ensure compliance with regulatory mandates and provide robust resilience against evolving cyber threats. This approach empowers your IT team to focus on strategic initiatives by reducing the burden of manual recovery processes and ensuring rapid restoration of operations.

[1 CPE] Don’t Build a Fire Department

  Presented by Matt Martin, Sr Sales Engineer, Large Enterprise • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24×7 monitoring across your collective attack surfaces.

[1 CPE] Pragmatic AI: Moving from Aspirations to Operations to Outcomes

  Presented by Seth Crosby, Principal Architect • GCSIT

Ready to cut through the AI hype? Join us for a no-nonsense guide to making AI actually work for your business. We’ll map today’s real AI capabilities (not the social-network demos), show you practical entry points whether you’re just starting or ready to scale, and reveal the essential ingredients for successfully managing AI projects without drowning in complexity. Most importantly, you’ll learn how to deliver and measure genuine business value through smart pilot programs without budgetary surprises. This session transforms intimidating AI concepts into actionable plans with tangible results—because impressive demos are nice, but outcomes are what really matter.

What You’ll Learn:

  • How to apply a pragmatic framework to assess your AI control and develop a personalized adoption strategy
  • Techniques to identify AI opportunities that enhance your specific professional expertise
  • Methods to overcome resistance to change
  • Strategies to maintain your position as the “intelligence director” while leveraging AI as your thought assistant”
  • Practical approaches to deliver and measure genuine business value through smart, budget-conscious initiatives

This session is ideal for IT professionals and leadership in small to mid-market businesses looking for a pragmatic pathway to AI competency.

[1 CPE] Restoration in 72 Hours, Not 72 Days: Building Cyber Resilience in Healthcare

  Presented by James Cramer, PNW Healthcare GTM Lead • Rubrik

A singular focus on prevention and security is proving necessary but not sufficient to ensure continuity of operations and quality care. In an era of increasing cyberattacks, understanding the foundational principles of cyber resilience is essential for safeguarding patient data, ensuring organizational resilience, and ultimately, upholding patient care standards.

This session will explore the core concepts of cyber resilience and how they enable rapid recovery following cyber-attacks. With a focus on quantifying the impacts to operational downtime, legal costs and regulatory fines, as well as reputational damage, this discussion is tailored to help C-suite leaders prioritize cyber resilience strategies.

  • Explore the fundamental principles of cyber resilience, focusing on preserving continuity of care and business operations.
  • Assess the financial and operational risks of data breaches and ransomware attacks, including real-world examples from healthcare.
  • Discuss how to communicate the value of and build support for cyber resilience initiatives.

[1 CPE] How SASE Will Deliver Efficient and Cost-Effective Outcomes

  Presented by Johan Dupuis-Lund, Account Manager and Santhosh Suresh, Solutions Architect • Cato Networks

Secure Access Service Edge (SASE) is transforming networking and security by eliminating the complexity and costs of fragmented infrastructure. With SASE, organizations can eliminate the effort and costs required to maintain complex and fragmented infrastructure made of point solutions. Join Converge and Cato Networks as we explore how a strong SASE strategy drives business outcomes while reinforcing zero-trust security. This will be an informational and interactive presentation, including a brief demo of Cato’s SASE solution.

[1 CPE] Security First AI-Powered Networking

  Presented by Jim Galiardi, System Engineering Manager • HPE Aruba Networking

Innovations in network visibility and telemetry now allow the network to be more than just plumbing. By actively participating in your zero-trust strategy the network can now offer additional insights and methods to protect users and data on and off the network. AI/ML will be the key to managing the wealth of telemetry now available, dynamically applying policy, and the beginnings of self-aware/self-healing networks.

[1 CPE] Modern Security: Quantum Computing, AI, and External Key Management in the Cloud

  Presented by Thales

In this presentation, we will explore the emerging data threats posed by quantum computing and artificial intelligence and discuss their implications for data security. We will also delve into the advantages of external key management for cloud data, examining various strategies for protection, including encryption.

Join us to gain insights into the latest advancements in data security and learn how to safeguard your data against evolving threats.

[1 CPE] AI-Backed Cybersecurity Threats Require AI-Backed Solutions

  Presented by Chris Blanding, Public Sector Security Sales Specialist • Juniper Networks

Context: Supported by AI, cybersecurity threat actors are accelerating both the speed and breadth of attacks. Every indicator, from increasing click rates on phishing emails to shrinking attacker breakout times suggests a sea change in the threat landscape. Consequently, integration and AI/ML-backed automation across a layered cybersecurity stack is more important than ever. Historically, cybersecurity solutions were developed to address specific threats. Consequently, as the number and diversity of threats grew the number and complexity of cybersecurity solutions in the system enterprise also grew, driving complexity, slowing response times, and ultimately reducing efficacy. SIEM, SOAR, and XDR platforms were developed to visualize cybersecurity telemetry across the system enterprise, investigate, and respond to threats. While these solutions greatly improved visibility and response they are unable to respond quickly and efficiently enough to stop AI-backed threats.

Approach: In addition to the broad adoption of layered security services providing visibility across the system enterprise, the solution is to leverage a strategically integrated, AI/ML-backed, enterprise security stack that accelerates detection and automates response.

Implications: While an integrated, AI-backed enterprise security stack will allow enterprises to stay ahead of cyber risk the impact on the system enterprise is far greater. By integrating security into the broad enterprise stack, you will mature network, application, and data visibility creating opportunities for more granular, targeted SLAs that ultimately impact uptime, quality of service, flexibility and speed. That makes businesses more competitive and public entities more responsive to citizens.