[1 CPE] Panel: Retaining Your IT Staff in New Mexico, Can it Be Done?

  Presented by INTERFACE Advisory Council

“The other company is offering higher wages. I get to work remotely as much as I want and get a four-day workweek. Sorry, but I must take it.” Have you heard this just a few times? So many IT hiring managers are having to find creative ways to keep staff members in-house. While budgets and major company overhauls can’t always be achieved, some methods can help.

New Mexico has unique challenges in retaining IT staff. Join the INTERFACE Advisory Council for an open conversation on how to keep your local IT staff intact. This panel features local IT hiring managers and leaders dealing with these challenges in their shops. We also will have the input of non-managerial employees who will speak to what they look for in a company. Bring your questions as there will be an opportunity to get advice on your specific needs.

Panelists:

  • Steve Cox, Director, Information Technology, The Downs Casino and Racetrack
  • Matt Hesley, IT Security Manager, TriCore Reference Laboratories
  • Jessica Johnson, Sr IT Security & Program Operations Manager, Westrock
  • Kristen Lucero, Information Security Risk Lead, PNM Resources, Inc.
  • Anthony Weaver, Lead Solutions Architect, Cloud Engineer, PNM Resources, Inc.

[1 CPE] Implementing DMARC (Without Getting Fired)

  Presented by Kristen Sanders, Sr Security Advisor • Aquila

DMARC is free and effective, but how do you implement it? Learn about DMARC and how to use it (WITHOUT bringing your email to a screeching halt). This discussion will cover what DMARC is, creating a DMARC record, SPF record, leveraging DKIM, and best practices.

[1 CPE] Next-Gen Networking

  Presented by JR Garcia, Director of Solutions Engineering • ANM

Trends in the industry are moving toward a more automated and central way to control network infrastructure and security policies. With the introduction of Software Defined Networking (SDN) some years ago, network engineers are now able to do more with less. We discuss the concept of SDN and provide real examples of how engineers can use it to automate tasks and improve security through tools like microsegmentation and centralized management.

[1 CPE] Optimizing Network Performance Using Artificial Intelligence

  Presented by Pine Cove Consulting & Ruckus

Discover how Artificial Intelligence (AI) transforms network performance, bolstering reliability for technology-focused operations. This presentation highlights AI’s role in resolving disruptions, optimizing resource allocation, and predicting traffic trends. Explore the proactive approach of AI for issue resolution and efficient network management. Unveil how AI augments network analysis, reporting, and the creation of adaptive, secure infrastructures, revolutionizing technology integration.

[1 CPE] Fireside Chat: Why the Village of Los Lunas Adopted a Continuous Threat Exposure Management Strategy

  Presented by Ken Ballard, Vice President of FortifyData and Luis Brown, IT Director for the Village of Los Lunas

Join Luis Brown, IT Director for the Village of Los Lunas and FortifyData’s Ken Ballard who will interview Luis on the challenges that led to the decision. This will cover what continuous threat exposure management is and explore the challenges and considerations that Luis was facing in how their IT team can effectively identify and manage cyber risks. Some of the issues include how to get the full picture of attack surface threats with accurate asset identification, integrating risk data from disparate sources, and efficiently managing all of this for the team to respond.

[1 CPE] How Do You Secure ANY-ANY-NOW?

  Presented by Gregory Pepper, Security Architect, Office of the CTO • Check Point Software Technologies

  • ANY Device
  • ANY Location
  • Access To Corporate Resources NOW

Today, more than any other time in history, we are digitally connected. With a continuous rise in mobile-related attacks, and an ever-increasing use of mobile devices to perform business tasks, protecting your organization from mobile threats is more critical than ever. Despite our best efforts, threats and breaches continue to increase.

Join Greg Pepper for this insightful presentation to learn about the latest mobile and user protection including Check Point’s Harmony suite for securing users and access. Today’s mobile security needs to prevent the download of malicious files to mobile devices, not just from the web and email but also from collaboration tools like Teams and Slack, and others. Learn how you can achieve 99.7% efficacy against zero-day threats across your entire enterprise leveraging ThreatCloud, an industry-leading threat intelligence solution.

[1 CPE] Intune: What’s New and What’s Next

  Presented by Chris McDuffie, Vice President of Cloud Architecture • Structured

Microsoft Intune is quickly becoming a strategic part of not only device management, but compliance and security as well. Structured will cover what’s new and how Intune will impact your Windows PC strategy management.

[1 CPE] Plan, React, and Recover: An Incident Response Workshop (Part 2)

  Presented by Dan Brown and Ronald Waters, Cybersecurity Advisors • Cybersecurity and Infrastructure Security Agency

Incident Management can be frequently looked at in a causal manner –– until it happens to you. Do you have the correct plan in action? Have you ever tested your incident plan? Join us for an extended workshop to discuss the parties that need to be involved in this response plan. Our speakers will also share strategies on how often you should test and update your plan.

The Cyber Risk Landscape will also be examined. While threat actors are coming from multiple areas, you will be prepared to consider the insider threat as well. Join us for this two-hour session for an extensive workshop for you to develop a thorough incident response plan.

The experts on this panel are Cyber Security Advisors for the federal agency known as CISA, The Cybersecurity and Infrastructure Security Agency. They will help you assess your environment, identify vulnerabilities, and provide education about the latest threats you will face. CISA has many resources available for you and those will be discussed as well.

[1 CPE] Plan, React, and Recover: An Incident Response Workshop (Part 1)

  Presented by Dan Brown and Ronald Watters, Cybersecurity Advisors • Cybersecurity and Infrastructure Security Agency

Incident Management can be frequently looked at in a causal manner –– until it happens to you. Do you have the correct plan in action? Have you ever tested your incident plan? Join us for an extended workshop to discuss the parties that need to be involved in this response plan. Our speakers will also share strategies on how often you should test and update your plan.

The Cyber Risk Landscape will also be examined. While threat actors are coming from multiple areas, you will be prepared to consider the insider threat as well. Join us for this two-hour session for an extensive workshop for you to develop a thorough incident response plan.

The experts on this panel are Cyber Security Advisors for the federal agency known as CISA, The Cybersecurity and Infrastructure Security Agency. They will help you assess your environment, identify vulnerabilities, and provide education about the latest threats you will face. CISA has many resources available for you and those will be discussed as well.

Speaker Details:

Dan Brown serves as the Cybersecurity Advisor for Eastern Washington and is based in Spokane, WA. He supports CISA’s mission of leading the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure.

He offers CISA resources that coordinate cyber preparedness, risk mitigation, and incident response. He provides cybersecurity resources, including assessments, to public and private stakeholders in the nations’ sixteen critical infrastructures, including auxiliary support for state, local, tribal, and territorial government entities.

Prior to joining CISA, Dan worked in information technology and cybersecurity for more than 25 years. Most recently, he worked at the Community Colleges of Spokane as their Information Security Officer (ISO). Before that, he worked for 17 years at Washington State University as an Assistant Director of Systems and Security.

His education includes an undergraduate degree in Management Information Systems (MIS) from Eastern Washington University and an M.B.A. from Washington State University. Current certifications include CISSP, CISM, and ITIL foundation.

Ron Watters serves as the Region 10 Private Sector Cybersecurity Advisor for CISA. Based in Seattle, WA, he supports the Department of Homeland Security (DHS) mission of strengthening the security and resilience of the nation’s critical infrastructure.

His program coordinates cyber preparedness, risk mitigation, and incident response, and provides cyber security resources, including assessments, to the nation’s sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities.

Before joining DHS, Ron served 27 years with the U.S. Navy and Naval Reserve as a Submarine Sonar Technician and Diver. Ron interviewed and was hired as the Region X Cybersecurity advisor in June of 2017 and has filled that position presently.

[1 CPE] Seeing Your Attack Surface Through the Eyes of an Adversary

  Presented by Palo Alto Networks

Modern attack surfaces are dynamic. Without clear visibility that is constantly updated, it is all too easy to have persistent exposures and unmanaged assets. Security practitioners can only be as good as the data they have, so having a strong foundation of continuous discovery and monitoring ensures you can keep up with modern, dynamic attack surfaces to find, prioritize, and mitigate exposures as they arise.