[1 CPE] Active Directory: Ransomware, Risk, Review, Recovery

  Presented by Rob Ingenthron, Sr Solution Engineer • Semperis

Cyberattackers are adept at finding ways through your defenses and into identity systems like Active Directory. Many organizations use Active Directory as the primary identity service, and Active Directory is typically tied into almost everything, including Entra ID. From there, they can move laterally, escalate privileges, access sensitive resources, and inject malware or ransomware. Implementing a layered defense that includes identity threat detection and response (ITDR) is key to protecting your operational resilience.

Join Rob Ingenthron, Sr Solution Engineer, to learn:

  • How layered defense has changed over time
  • Why ITDR is now an essential part of a robust layered defense strategy
  • The continuing importance of hygiene and auditing for Active Directory
  • How a layered defense can help you combat attacks that are designed to bypass traditional methods of defense
  • Which best practices lead to a strong layered defense

[1 CPE] Hackers Gonna Hack: When Defenses Break Down

  Presented by Jason Graun, Director of Sales Engineering • Fortinet

Organized threat actors continue to be the most dangerous risk in Cybersecurity. The tactics used to get into endpoints are constantly evolving in sophistication and scale. In this session, we will discuss industry trends/challenges, as well as walk through the tactics, techniques, and procedures used by threat actor groups by using a known active group as an example. We will also discuss practical real-world situations and how to defend against them using a unique approach to stopping ransomware before it becomes an active breach.

Jason Graun is the Sales Engineering Director for the Fortinet Security Operations team. He brings over 20 years of experience in information security and has spent 11 years at Fortinet. He regularly speaks at industry events, CIO/CISO summits, and works closely with IT executives to understand the business challenges they face in securing assets across an ever increasingly mobile workforce. Jason’s focus is to find ways technology can solve the biggest challenges in information security, he also holds a patent on cloud security malware inspection methods.

[1 CPE] Securing the Future of Cybersecurity Protection in an AI-Driven Digital Landscape

  Presented by Charles Everette, Field CISO Advisor • ESET

In today’s digital age, advancements in artificial intelligence are reshaping how businesses approach cybersecurity. AI technologies offer powerful tools for detecting, preventing, and responding to cyber threats in real time. However, they also introduce new challenges, including adversarial attacks and ethical concerns. This presentation explores the transformative role of AI in modern cybersecurity strategies. By understanding both the opportunities and risks AI presents, organizations can better protect their digital assets and adapt to the evolving threat landscape.

[1 CPE] Breaking Down Silos: Unify Assets, Minimize Attack Exposure

  Presented by Lucas Zaichkowsky, Sr Sales Engineer • Axonius

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.

Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.

As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.

[1 CPE] Surfing the Different Waves of AI

  Presented by Tyler Stuart, Sales Engineer, Trellix • Cyberuptive

Riding the ever-breaking wave of AI security model evolution can feel like a gnarly wipeout. This presentation will help your security team hang ten by navigating the diverse swells of Language Learning Models (LLMs), paddling through the currents of Retrieval-Augmented Generation, and catching the perfect set of Agentic AI. Our goal is to provide the knowledge you need to confidently choose and manage the right boards – I mean, tools – for your organization’s security lineup.

[1 CPE] Paradise Lost: Leave Hackers Stranded with Automated Microsegmentation

  Presented by Bryan Ward, Customer Engineer • Zero Networks

Flat networks and overly permissive accounts are paradise for cyber attackers. With defenses stuck on island time while hackers work overtime, traditional network security methods lag behind modern threats. This interactive session will outline the real-world strategies a top 10 US credit union leveraged to:

  • Proactively block ransomware and sophisticated threats
  • Streamline regulatory compliance for improve audit results
  • Eradicate manual tasks like tagging, grouping, and policy creation
  • Dynamically secure privileged ports
  • Accelerate microsegmentation and Zero Trust, avoiding a multi-year project

Don’t miss this opportunity to explore proven and practical applications of microsegmentation to modernize cybersecurity strategy. Turn your network from a beach vacation into a desert island for hackers – learn how to leave attackers stranded in record time with automated microsegmentation.

[1 CPE] Heart of Agile with Aloha: Driving IT Innovation

  Presented by Bradley K. Foster, PMP, CSM, CPO, CAC, CAL • Worth Agility

Join Bradley K. Foster, founder of Worth Agility, to explore how Alistair Cockburn’s Heart of Agile—Collaborate, Probe, Deliver, Reflect, Improve—blends with Aloha’s compassion to ignite IT innovation. With 5+ years in health and aviation IT, Bradley led Hawaiian Airlines’ EDW (Microsoft-driven, real-time insights), Health Catalyst’s cloud analytics at Queens (30% efficiency gain), and Hawaii DOT’s Google CCAI demo (40% faster calls).

Learn to probe risks early, collaborate across silos, and deliver secure systems under Worth Agility’s human-centered approach, guided by DevSecOps insights from Isaac Sacolick.

Ideal for IT leaders tackling ransomware, AI, and bandwidth challenges with agility and heart.

[1 CPE] Restoration in 72 Hours, Not 72 Days: Building Cyber Resilience in Healthcare

  Presented by Daniel Tang, Healthcare Solutions Engineer • Rubrik

A singular focus on prevention and security is proving necessary but not sufficient to ensure continuity of operations and quality care. In an era of increasing cyberattacks, understanding the foundational principles of cyber resilience is essential for safeguarding patient data, ensuring organizational resilience, and ultimately, upholding patient care standards.

This session will explore the core concepts of cyber resilience and how they enable rapid recovery following cyber-attacks. With a focus on quantifying the impacts to operational downtime, legal costs and regulatory fines, as well as reputational damage, this discussion is tailored to help C-suite leaders prioritize cyber resilience strategies.

  • Explore the fundamental principles of cyber resilience, focusing on preserving continuity of care and business operations.
  • Assess the financial and operational risks of data breaches and ransomware attacks, including real-world examples from healthcare.
  • Discuss how to communicate the value of and build support for cyber resilience initiatives.

[1 CPE] AI or Die: Will Agentic AI and Hyperautomation Save the SOC?

  Presented by Aaron Edwards, Regional Sales Manager, and Rich Chen, Sales Engineer • Torq

The promise of SOAR has repeatedly failed. Organizations have invested heavily in enterprise solutions yet the ability to deliver automated, preventative, and corrective measures still remains a distant reality for most CISOs. Why? The concept of an Autonomous SOC is everywhere – promising to streamline security operations processes, reduce analyst alert fatigue, and improve overall security posture. But how does the dream of an Autonomous SOC play out in the real world of security operations? Is 2025 the year that Agentic AI where Hyperautomation saves the SOC?

[1 CPE] Don’t Build a Fire Department

  Presented by Tom Simonis, Sr Sales Engineer, Enterprise US • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24×7 monitoring across your collective attack surfaces.