[1 CPE] Restoration in 72 Hours, Not 72 Days: Building Cyber Resilience in Healthcare

  Presented by James Cramer, PNW Healthcare GTM Lead • Rubrik

A singular focus on prevention and security is proving necessary but not sufficient to ensure continuity of operations and quality care. In an era of increasing cyberattacks, understanding the foundational principles of cyber resilience is essential for safeguarding patient data, ensuring organizational resilience, and ultimately, upholding patient care standards.

This session will explore the core concepts of cyber resilience and how they enable rapid recovery following cyber-attacks. With a focus on quantifying the impacts to operational downtime, legal costs and regulatory fines, as well as reputational damage, this discussion is tailored to help C-suite leaders prioritize cyber resilience strategies.

  • Explore the fundamental principles of cyber resilience, focusing on preserving continuity of care and business operations.
  • Assess the financial and operational risks of data breaches and ransomware attacks, including real-world examples from healthcare.
  • Discuss how to communicate the value of and build support for cyber resilience initiatives.

[1 CPE] How SASE Will Deliver Efficient and Cost-Effective Outcomes

  Presented by Johan Dupuis-Lund, Account Manager and Santhosh Suresh, Solutions Architect • Cato Networks

Secure Access Service Edge (SASE) is transforming networking and security by eliminating the complexity and costs of fragmented infrastructure. With SASE, organizations can eliminate the effort and costs required to maintain complex and fragmented infrastructure made of point solutions. Join Converge and Cato Networks as we explore how a strong SASE strategy drives business outcomes while reinforcing zero-trust security. This will be an informational and interactive presentation, including a brief demo of Cato’s SASE solution.

[1 CPE] Security First AI-Powered Networking

  Presented by Jim Galiardi, System Engineering Manager • HPE Aruba Networking

Innovations in network visibility and telemetry now allow the network to be more than just plumbing. By actively participating in your zero-trust strategy the network can now offer additional insights and methods to protect users and data on and off the network. AI/ML will be the key to managing the wealth of telemetry now available, dynamically applying policy, and the beginnings of self-aware/self-healing networks.

[1 CPE] Modern Security: Quantum Computing, AI, and External Key Management in the Cloud

  Presented by Thales

In this presentation, we will explore the emerging data threats posed by quantum computing and artificial intelligence and discuss their implications for data security. We will also delve into the advantages of external key management for cloud data, examining various strategies for protection, including encryption.

Join us to gain insights into the latest advancements in data security and learn how to safeguard your data against evolving threats.

[1 CPE] AI-Backed Cybersecurity Threats Require AI-Backed Solutions

  Presented by Chris Blanding, Public Sector Security Sales Specialist • Juniper Networks

Context: Supported by AI, cybersecurity threat actors are accelerating both the speed and breadth of attacks. Every indicator, from increasing click rates on phishing emails to shrinking attacker breakout times suggests a sea change in the threat landscape. Consequently, integration and AI/ML-backed automation across a layered cybersecurity stack is more important than ever. Historically, cybersecurity solutions were developed to address specific threats. Consequently, as the number and diversity of threats grew the number and complexity of cybersecurity solutions in the system enterprise also grew, driving complexity, slowing response times, and ultimately reducing efficacy. SIEM, SOAR, and XDR platforms were developed to visualize cybersecurity telemetry across the system enterprise, investigate, and respond to threats. While these solutions greatly improved visibility and response they are unable to respond quickly and efficiently enough to stop AI-backed threats.

Approach: In addition to the broad adoption of layered security services providing visibility across the system enterprise, the solution is to leverage a strategically integrated, AI/ML-backed, enterprise security stack that accelerates detection and automates response.

Implications: While an integrated, AI-backed enterprise security stack will allow enterprises to stay ahead of cyber risk the impact on the system enterprise is far greater. By integrating security into the broad enterprise stack, you will mature network, application, and data visibility creating opportunities for more granular, targeted SLAs that ultimately impact uptime, quality of service, flexibility and speed. That makes businesses more competitive and public entities more responsive to citizens.

[1 CPE] Cybersecurity and Compliance For 2025

  Presented by Rob Wayt, Director of Governance, Risk, and Compliance • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI, and security best practices. Presented by Rob Wayt, Director of Governance, Risk, and Compliance at Structured, this discussion will focus on security solutions to these challenges, including penetration testing and zero-trust implementations.

[1 CPE] AI in Cybersecurity: Navigating the New Frontier of Cyber Defense

  Presented by Devin Johnstone, Security Operations Consultant • Palo Alto Networks

In an era where cyber threats are becoming increasingly sophisticated, traditional security measures are often insufficient. Devin Johnstone, Security Operations Domain Consultant at Palo Alto Networks with vast experience in network security, threat intelligence, and cloud security will delve into the transformative role of Artificial Intelligence (AI) in modern cybersecurity. Attendees will gain insights into how AI enhances threat detection, enables proactive defense strategies, and addresses the evolving landscape of cyber threats. The discussion will also cover the benefits and challenges associated with integrating AI into cybersecurity frameworks, providing a comprehensive overview of how AI is shaping the future of cyber defense.

Devin has spent over a decade in the trenches of a Security Operations Center and is passionate about sharing his lived experience in building a successful SecOps team from the ground up. 8 years ago, he joined Palo Alto Networks to begin architecting the internal SOC and went on to lead the development of the Security Automation, Data Loss Prevention, Insider Risk, and Customer Outreach programs.

Devin has had the opportunity to advise thousands of security teams, big and small, in their security operations journeys through media, tours of Palo Alto Networks SOC facility, and at events in 7 countries. He has since moved into a Consultant role to help customers accelerate their realization of “the art of the possible”: AI-enabled security operations strategies prepared for whatever the future brings.

[1 CPE] Into the Future: A Virtual Tour of Palo Alto Networks’ SOC

  Presented by Devin Johnstone, Security Operations Consultant • Palo Alto Networks

Security leaders everywhere are asking the same question: how can I future-proof my cybersecurity strategy with less resources? Automation and AI are already within your reach! Learn how Palo Alto Networks is protecting itself and its customers and how you can take advantage of the same tools and strategies today.

Devin has spent over a decade in the trenches of a Security Operations Center and is passionate about sharing his lived experience in building a successful SecOps team from the ground up. 8 years ago, he joined Palo Alto Networks to begin architecting the internal SOC and went on to lead the development of the Security Automation, Data Loss Prevention, Insider Risk, and Customer Outreach programs.

Devin has had the opportunity to advise thousands of security teams, big and small, in their security operations journeys through media, tours of Palo Alto Networks SOC facility, and at events in 7 countries. He has since moved into a Consultant role to help customers accelerate their realization of “the art of the possible”: AI-enabled security operations strategies prepared for whatever the future brings.

[1 CPE] AI for IT Project Management: Tools, Techniques, and Use Cases

  Presented by Jim Bates, Founder, President & CEO  • Business Improvement Group

Discover how Artificial Intelligence (AI) is being used to transform IT Project Management approaches and how it can impact our IT project effectiveness and efficiency. We will explore trends and separate the hype from reality. We will discuss tools and techniques and demonstrate how we use AI to save time and more accurately predict and control our project outcomes, manage risk, and support transparent and defensible project governance.

[1 CPE] Mitigating the Risk of AI in the Corporate Environment

  Presented by Teresa Rule, President, RNT Cyber Academy, Member • ISACA Anchorage

In the corporate environment, mitigating the risks associated with artificial intelligence (AI) is crucial for ensuring operational resilience and strategic growth. AI, while offering unparalleled benefits in risk management through predictive analytics and real-time monitoring, also introduces new challenges such as data breaches, algorithmic bias, and cybersecurity threats. To effectively manage these risks, organizations must adopt a systematic approach. This includes identifying areas of risk, such as financial, operational, and cybersecurity vulnerabilities, and evaluating data quality to support AI implementation. Choosing the right AI technology and training AI algorithms with historical data are also essential steps. Furthermore, integrating AI into existing processes and continuously evaluating its performance are vital for refining risk mitigation strategies. By leveraging frameworks like the NIST AI Risk Management Framework and engaging in proactive threat assessments, businesses can ensure that AI enhances their risk management capabilities while minimizing its inherent risks. Ultimately, a well-managed AI strategy can transform traditional risk assessment, enhance decision-making, and foster a secure and efficient corporate environment.