[1 CPE] How to Stop East/West Attacks in Your Data Center

  Presented by Aruba Networks

70% of all breaches are caused by endpoint security vulnerabilities, followed by lateral movement in the data center. Halt that hacker traffic. Attend this session to learn about a new category of data center switch that combines best-of-breed L2/3 switching with the industry’s first hardware-accelerated programmable processor. This new tool augments your malware and ransomware detection and response capabilities by delivering stateful firewall services inline, at scale, with wire-rate performance and orders of magnitude improvement over traditional data center L2/3 switches. You will learn how to gain visibility and enforce security policy for all East/West flows between workloads to protect the critical assets in your data center.

[1 CPE] AI, ML, and the Cybersecurity Checklist

  Presented by Paul Carugati • Global Head of Information Security, Syngenta

The dynamic threat landscape is evolving as new cyberattack methods are introduced daily. Generative Artificial Intelligence (AI) and Machine Learning (ML) algorithms are equally evolving and becoming more sophisticated. Navigating AI/ML services against your organization’s cybersecurity risk posture is a maturing discipline, but it may be more familiar than you think. Let’s discuss the practical risk elements of AI & ML in the modern enterprise and how best to protect, detect, respond, and recover from cybersecurity incidents.

Paul is a seasoned IT and Information Security leader with over 20 years of experience in Fortune 300 enterprises. An accomplished information security executive, Paul has a proven ability in the successful execution of global Cybersecurity and Risk Management programs. Paul specializes in building high-performing security teams and fostering a culture of data protection through business enablement, achieving positive, measurable behavioral change through accountability and integrity.

[1 CPE] Zero Trust Framework as a Baseline for Identity Management

  Presented by Andrew Massi, Digital Security Consultant, Identity • Entrust

With the recent increase in cyber-attacks that involve the use of weak / compromised credentials, it is critical for organizations to secure their environment and resources with a Zero Trust framework and a Phishing resistant RBA in mind. Organizations can establish trust through verifiable, phishing-resistant, certificate-based identities across users, devices, and apps to implement a secure first line of defense against cyberattacks.

Today’s technology leaders must navigate different tools and methodologies yet remain confident they’re quantifying risk effectively. During this session, we’ll be discussing emerging digital security trends and how your peers are shaping the way the market approaches cybersecurity and risk management.

Specifically, we will discuss:

  • How to establish trust across users, devices, and apps that secure a first line of defense
  • How to support the Zero Trust framework through the adoption of Phishing resistant passwordless authentication

[1 CPE] Maelstrom of Security

  Presented by Jerry Petru, President • InfraGard Washington

This session is designed for individuals responsible for their organizations’ Confidentiality, Integrity, and Availability from the front door firewall administrator with IDS/IPS, cloud, compliance, data governance, and networking all the way to the Chief Executives of an organization. In a world of ever-changing threat landscapes, this session will cover the overall magnitude of the challenge! We’ll discuss the evolution as it took place and what to do about fixing what is in our hands today.

We’ll cover how to speak to the C-Suite and get the business side of the conversation to move toward better security hygiene and answer the question of how much security is enough. This session is truly about information security risk. The risk is Very High for all organizations. The NIST 800-30 defines Very High Risk as that of a threat event that could be expected to have multiple severe or catastrophic adverse effects on organizational operations, organizational assets, individuals, other organizations, or the Nation. The discussion will be open and free-flowing, covering real-world business issues and providing a platform to ask your questions.

Bio: Jerry Petru is the President of the Washington State InfraGard Chapter and a Fellow of the British Computer Society, The Charted Institute for IT. He is an innovative and technically sophisticated professional, offering substantial years of broad-based experience in evaluating large corporate systems. Powered with a comprehensive background in development and implementation, he has authored more than forty-seven different courses based on AIX, Encryption, Linux, Networking, Security, and Virtualization technologies teaching to an audience of tens of thousands around the world for the past twenty-five years.

Mr. Petru is equipped with a proven track record of success in designing and implementing systems and policies based on Confidentiality, Integrity, and Availability to meet business continuity and disaster recovery for long-range strategic plans of Fortune 100 Companies. He is also armed with stellar qualifications in all facets of project lifecycle development, from initial analysis and conceptual design to implementation, quality review, and enhancement to optimize operational efficiencies that improve business and IT operations.

[1 CPE] Modernizing Physical Security

  Presented by Verkada

In this session, we’ll look at the technologies at the forefront of enterprise building security. Connected security devices can provide users with real-time insights and a full picture of the health and safety of their environments. We’ll explore how to minimize security risks, workplace frustrations, and costly inefficiencies with best–in–class solutions that provide a scalable way to easily configure, monitor and respond to events from anywhere. Learn how modernizing your physical security can help you seamlessly safeguard the physical world –– without sacrificing privacy –– to operate safer, smarter buildings.

[1 CPE] Go Hack Yourself: War Stories from ~20k Pentests

  Presented by Habibeh Deyhim, Director of Customer Success • Horizon3.ai

In an ecosystem where you know you’re being targeted daily, how can you prove you’re secure? Are you finding and fixing the most critical attack paths, logging the right data, and alerting on the right events? Do you know if you’re ready to respond to an incident and are your security controls configured and integrated correctly? All this effort is supposed to measurably reduce your risk, but is any of it working?

Join Habibeh Deyhim, Director of Customer Success at Horizon3.ai, to learn a proven way to find, fix, and verify that you’re secure. Habibeh will discuss several real-world examples of what autonomous pentesting discovered in networks just like yours. And you’ll hear more about how fast and easy it was to safely compromise some of the biggest (and smallest) networks in the world – with full domain takeover in a little more than a few hours. Learn how you can safely do the same in your own network today!

[1 CPE] Zero Trust—Let’s Dive into Security

  Presented by Kevin Heide, Director of Enterprise Networking • Cerium Networks

Spend the morning with us while we explore the world of Zero Trust Architecture—but with a twist. Instead of a high-level overview of this strategic cybersecurity approach, we’ll get hands-on and show you practical examples using tools and environments that most of us are already familiar with.

Buckle up and join us on this exciting journey as we learn how to integrate different elements and policies across our organizations. We’ll also focus on optimizing our policies and enhancing threat protection.

[1 CPE] Intune: What’s New and What’s Next

  Presented by Chris McDuffie, Vice President of Cloud Architecture • Structured

Microsoft Intune is quickly becoming a strategic part of not only device management, but compliance and security as well. Structured will cover what’s new and how Intune will impact your Windows PC strategy management.

[1 CPE] Modernizing Physical Security

  Presented by Verkada

In this session, we’ll look at the technologies at the forefront of enterprise building security. Connected security devices can provide users with real-time insights and a full picture of the health and safety of their environments. We’ll explore how to minimize security risks, workplace frustrations, and costly inefficiencies with best–in–class solutions that provide a scalable way to easily configure, monitor and respond to events from anywhere. Learn how modernizing your physical security can help you seamlessly safeguard the physical world –– without sacrificing privacy –– to operate safer, smarter buildings.

[1 CPE] How to Stop East/West Attacks in Your Data Center

  Presented by Aruba Networks

70% of all breaches are caused by endpoint security vulnerabilities, followed by lateral movement in the data center. Halt that hacker traffic. Attend this session to learn about a new category of data center switch that combines best-of-breed L2/3 switching with the industry’s first hardware-accelerated programmable processor. This new tool augments your malware and ransomware detection and response capabilities by delivering stateful firewall services inline, at scale, with wire-rate performance and orders of magnitude improvement over traditional data center L2/3 switches. You will learn how to gain visibility and enforce security policy for all East/West flows between workloads to protect the critical assets in your data center.