[1 CPE] Why is Critical Data Being Compromised?

  Presented by Matthew Olive, Partner Solutions Architect • Thales Group

Securing critical data and information was where this industry started a long time ago, but it became more challenging with the rapid growth of enterprise data in an interconnected world. The pandemic forced organizations to support a remote workforce and expose critical systems that were once only accessible from inside the company’s network. We’ve increased the attack surface and the number of vulnerabilities which has led to more data breaches. With the technology advancements in access management, data discovery and encryption we can once again shift the focus to securing our data and information. In this presentation, we will discuss a unified data-centric security approach and strategy to protecting your most critical data and information.

Matt Olive is a data security professional with over 20 years of technical cybersecurity experience. In his role at Thales Cloud Protection & Licensing, Matt is dedicated to providing customers with high-quality data security solutions that address security priorities and make the connected world more secure.

[1 CPE] Protecting Files and Microsoft 365

  Presented by Rubrik

Join us to discuss how Rubrik protects Microsoft 365. During the second half we will discuss how Rubrik protects NAS or File servers with NAS Cloud Direct. Each area will provide a high-level overview followed up with a demonstration within Rubrik Security Cloud.

[1 CPE] The AI-Driven Enterprise: Next Generation Campus/Branch Solutions

  Presented by Mark Thames, Director, Global Partner Business Development – AI Driven Enterprise • Juniper Networks

Can you have a conversation with your network? Do you have any virtual employees? I am not talking about humans who work from home. Revolutionary technology only happens occasionally. If you look at the last revolutionary technology, it would have been the smartphone. Before the smartphone, it was the Internet. AI is the latest revolutionary technology that will transform so many of the things we do daily in our lives. In this session, we will talk about the types of AI and how they are being used for positive change. I will cover how many different industries are already leveraging AI to improve business outcomes and transform how we do business and tasks. I will also cover how Juniper Networks has leveraged AI to disrupt the Networking Industry.

[1 CPE] Zero Trust—Let’s Dive into Security

  Presented by Kevin Heide, Director of Enterprise Networking • Cerium Networks

Spend the morning with us while we explore the world of Zero Trust Architecture—but with a twist. Instead of a high-level overview of this strategic cybersecurity approach, we’ll get hands-on and show you practical examples using tools and environments that most of us are already familiar with.

Buckle up and join us on this exciting journey as we learn how to integrate different elements and policies across our organizations. We’ll also focus on optimizing our policies and enhancing threat protection.

[1 CPE] Adding VX to Your LAN: A Primer on Overlay Networks

  Presented by CompuNet

As network infrastructure evolves, overlay networks are gaining popularity due to their ability to enhance network availability, security, and flexibility. Our presentation will offer a comprehensive overview of overlay network protocols and architectures, along with their role in enterprise networks. Join us to discover how overlay networks can benefit your organization and learn more about their implementation and management.

[1 CPE] Networking Deep Dive: Moving Beyond 192.16

  Presented by Pine Cove Consulting

In the world of networking, where devices and vendors multiply, IT specialists face the challenge of supporting and troubleshooting a wide array of equipment. To provide IT professionals with a comprehensive understanding of network complexities and best practices, this presentation will:

  • Highlight the impact of broadcast and multicast on network performance and strategies for efficient management
  • Discuss VLAN best practices, emphasizing the importance of segregating network traffic to enhance security and optimize performance
  • Explore the growing demand for and challenges associated with Power over Ethernet (PoE) and provide insights into effectively managing power requirements
  • Review the advantages and disadvantages of wireless connectivity compared to wired connections for specific devices and scenarios
  • Emphasize the importance of DHCP (Dynamic Host Configuration Protocol) in network management, as well as the role of ARP (Address Resolution Protocol) and MAC-address tables in troubleshooting network issues
  • Examine vendor remote access as a critical aspect of network administration, addressing the challenges and best practices associated with granting remote access to external vendors for troubleshooting and support
  • Explain LLDP (Link Layer Discovery Protocol), CDP (Cisco Discovery Protocol), and LLDP-MED (Link Layer Discovery Protocol-Media Endpoint Discovery) policies, highlighting their significance in network discovery and device configuration
  • Explore the uses of SNMP (Simple Network Management Protocol), focusing on its role in network monitoring, performance management, and device configuration
  • Discuss Syslog, both local and remote, as a valuable tool for collecting and analyzing network event logs, aiding in troubleshooting and security investigations
  • Examine the placement of cameras and access control systems on the network, and the considerations for parallel networks, to ensure optimal security and performance
  • Acknowledge the challenges of implementing Voice over IP (VoIP) systems, highlighting the complexities, and emphasizing the importance of proper planning and configuration

By delving into these topics, this presentation equips IT professionals with valuable insights and practical knowledge for managing and troubleshooting complex networks. It aims to deepen their understanding of network intricacies, empowering them to make informed decisions and optimize network performance and security.

[1 CPE] How I Really Feel About ChatGPT from an IP Lawyer’s Perspective

  Presented by Bradlee Frazer Esq., Partner, Hawley Troxell Law Firm  • INTERFACE Advisory Council

Everyone wants to use artificial intelligence to increase productivity. AI is a great way to maximize employee efficiency in the enterprise environment. But, in this interactive session, IP lawyer Brad Frazer will give you his perspectives on the legal risks of the unrestrained use of AI in the workplace. He’ll also give you some best practices for using it safely and correctly, to minimize your legal risks.

Bradlee Frazer is a partner with Hawley Troxell and is Chair of the firm’s Intellectual Property & Internet practice group. In addition to emphasizing and focusing on all facets of Internet law, Intellectual Property law, and Information Technology law, he also helps clients with related transactional work and litigation.

Brad is a published novelist, and he has also written extensively for national legal publications and law blogs. He is also a frequent speaker on internet, intellectual property, and computer law topics and is a regular guest lecturer at Boise State University on those subjects.

A Boise native, Brad began his legal career in 1989 as an intellectual property attorney and commercial litigator at a Boise-based law firm. In 1997 he accepted an in-house position as Senior Intellectual Property Counsel with Fortune 1000 company, Micron Electronics, Inc., and remained there through the company’s merger with Interland, Inc. (now Web.com), then the nation’s largest Web hosting company. He eventually became Deputy General Counsel for Micron Electronics, Inc., and Interland, Inc. From June 2003 to February 2006, Mr. Frazer served as Deputy General Counsel to MPC Computers, LLC, in Nampa, Idaho.

[1 CPE] Zero Trust Framework as a Baseline for Identity Management

  Presented by Andrew Massi, Digital Security Consultant, Identity • Entrust

With the recent increase in cyber-attacks that involve the use of weak / compromised credentials, it is critical for organizations to secure their environment and resources with a Zero Trust framework and a Phishing resistant RBA in mind. Organizations can establish trust through verifiable, phishing-resistant, certificate-based identities across users, devices, and apps to implement a secure first line of defense against cyberattacks.

Today’s technology leaders must navigate different tools and methodologies yet remain confident they’re quantifying risk effectively. During this session, we’ll be discussing emerging digital security trends and how your peers are shaping the way the market approaches cybersecurity and risk management.

Specifically, we will discuss:

  • How to establish trust across users, devices, and apps that secure a first line of defense
  • How to support the Zero Trust framework through the adoption of Phishing resistant passwordless authentication

[1 CPE] How Do You Secure ANY-ANY-NOW?

  Presented by Grant Asplund, Growth Technologies Evangelist • Check Point Software Technologies

  • ANY Device
  • ANY Location
  • Access To Corporate Resources NOW

Today, more than any other time in history, we are digitally connected. With a continuous rise in mobile-related attacks, and an ever-increasing use of mobile devices to perform business tasks, protecting your organization from mobile threats is more critical than ever. Despite our best efforts, threats and breaches continue to increase.

Join Grant Asplund for this insightful presentation to learn about the latest mobile and user protection including Check Point’s Harmony suite for securing users and access. Today’s mobile security needs to prevent the download of malicious files to mobile devices, not just from the web and email but also from collaboration tools like Teams and Slack, and others. Learn how you can achieve 99.7% efficacy against zero-day threats across your entire enterprise leveraging ThreatCloud, an industry-leading threat intelligence solution.

[1 CPE] Building a Ransomware Resilience Strategy

  Presented by Alfred Rojas, Systems Engineer • Zerto & 11:11 Systems

Ransomware attacks are affecting every industry and every size organization with the threats of downtime, data loss, reputation damage, and more. You can protect your organization from these threats by building ransomware resilience into your IT infrastructure. As ransomware threats evolve, so do the available technologies to protect your organization, and having a ransomware resilience strategy is more important than ever. In this session, we will discuss how:

  • The threat of ransomware has become systemic in data recovery planning
  • Prevention alone is not enough, and recovery alone is not enough
  • A ransomware resilience strategy relies on early detection to be effective
  • Air-gapped and isolated recovery are critical for ransomware resilience
  • Speed of recovery and minimal data loss recovery prevent ransom payments