[1 CPE] Zero Trust—Let’s Dive into Security

  Presented by Kevin Heide, Director of Enterprise Networking • Cerium Networks

Spend the morning with us while we explore the world of Zero Trust Architecture—but with a twist. Instead of a high-level overview of this strategic cybersecurity approach, we’ll get hands-on and show you practical examples using tools and environments that most of us are already familiar with.

Buckle up and join us on this exciting journey as we learn how to integrate different elements and policies across our organizations. We’ll also focus on optimizing our policies and enhancing threat protection.

[1 CPE] Beyond the Backup: A Guide to Resiliency Program Development

  Presented by CompuNet

If you follow the news, it is easy to see – disruptive events affecting critical business operations are becoming more prevalent. In this presentation, our guests from CompuNet will step through a comprehensive framework for Business Continuity & IT Disaster Recovery Program development, highlighting methodology that integrates with cybersecurity risk management and builds upon the capabilities of an organization’s backup strategy. For context, CompuNet’s presenters will examine the technical and non-technical challenges organizations may face during cybersecurity events and how resiliency planning can help mitigate those challenges..

[1 CPE] The Trek Toward Zero Trust

  Presented by Travis Light • Cybersecurity Advisor, CISA

You have heard the buzz phrase “zero trust”, but what exactly is it? Join Travis Light for a breakdown of zero trust using a case study that highlights the pitfalls of the traditional “castle-and-moat” perimeter approach to network design. He’ll also discuss CISA’s zero-trust Maturity Model (ZTMM) 2.0. The ZTMM is a roadmap that organizations can follow as they transition towards a zero-trust architecture.

Travis Light serves as a Cybersecurity Advisor (CSA) in Montana for the Integrated Operations Division (IOD) of the Cybersecurity and Infrastructure Security Agency (CISA). He supports the CISA mission of strengthening the security and resilience of the nation’s critical infrastructure in Region VIII. His daily responsibilities include coordinating cyber preparedness information sharing and collaboration, developing risk mitigation strategies, responding to cyber incidents, and providing cyber security resources including conducting strategic and technical assessments.

Before joining CISA in January 2023, Travis spent nine years as a federal employee with the Montana Army National Guard (MTARNG) in a variety of technical positions covering network administration, enterprise architecture, telecommunications infrastructure, database administration, and information systems security for classified and unclassified enclaves in the Regional Network Enterprise Center and the state’s Data Processing Center.

Travis holds numerous professional industry certifications including GIAC Security Leadership Certification (GSLC), GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Examiner (GCFE), Cisco Certified Network Associate (CCNA), Cisco Certified Design Associate (CCDA), ITIL 4 Foundation, CompTIA Secure Infrastructure Specialist, and CompTIA Project+. He has earned a Bachelor of Science in Network Operations and Security from Western Governors University.

[1 CPE] Don’t Pay the Ransom

  Presented by Rubrik

The Rubrik team will provide an overview of what they are seeing in the market. What questions data protection teams and IT leaders are being asked concerning the uptick in cyber events. We will pull back the curtain to explain how Rubrik detects ransomware, identifies sensitive data, and searches for indicators of compromise with threat hunting. If time allows, we will dive into the Rubrik interface and show you how we accomplish this in a single secure interface.

[1 CPE] Create a Safe Security Culture

  Presented by Lynn Soeth, Service Manager, Security Services • High Point Networks

You have a company-wide security culture. Is it a positive one? A safe security culture includes practices, policies, and attitude that prioritize the protection of sensitive information and the well-being of team members. It involves creating a positive environment where everyone feels empowered to ask questions and report potential security incidents. Using real world situations, let’s look at how you can actively participate in and grow a safe security culture at work and home.

[1 CPE] How to Simplify and Secure Your Network & What You Need to Know About Wi-FI 6e

  Presented by Matt Helm, Sr Systems Engineer  • Extreme Networks

During the presentation, we will discuss how to simplify your network and make it more secure by using the IEEE standard 802.1aq. We explain the standard, and how it is easier to use than traditional networking and much more secure. We will demo its simplicity and what makes it secure.

We will then move into Wifi 6e and how it is changing the way we must look at wireless deployments. We will discuss all the changes that it has brought us and what we must be planning for with the higher speeds that we will be able to achieve.

[1 CPE] How to Stop East/West Attacks in Your Data Center

  Presented by Aruba Networks

70% of all breaches are caused by endpoint security vulnerabilities, followed by lateral movement in the data center. Halt that hacker traffic. Attend this session to learn about a new category of data center switch that combines best-of-breed L2/3 switching with the industry’s first hardware-accelerated programmable processor. This new tool augments your malware and ransomware detection and response capabilities by delivering stateful firewall services inline, at scale, with wire-rate performance and orders of magnitude improvement over traditional data center L2/3 switches. You will learn how to gain visibility and enforce security policy for all East/West flows between workloads to protect the critical assets in your data center.

[1 CPE] Transforming Networks: Harnessing AI and ML for Optimal Performance

  Presented by Pine Cove Consulting & Ruckus

In today’s digitally interconnected world, networks play a critical role in ensuring seamless communication and data transfer. However, network performance and reliability can often be challenging to maintain. Each year, we see an increased number of devices added to our networks along with more use of high-bandwidth applications. IT teams often lack the tools to ensure required network service levels in an environment of ever-increasing user connectivity demands and network complexity. This presentation aims to explore the potential of artificial intelligence (AI) and machine learning (ML) techniques in overcoming these challenges.

The presentation will delve into various strategies and technologies that can help organizations improve their network performance. We will discuss proactive approaches to troubleshoot network issues before they escalate, saving valuable time and resources. By leveraging AI-powered tools and techniques, attendees will learn how to gain quick yet in-depth insights into their network’s health, enabling them to identify and resolve potential bottlenecks efficiently.

This presentation will also emphasize the importance of customized data reports in network management. Attendees will discover how AI and ML tools can process vast amounts of network data, providing valuable information tailored to their specific needs. This capability allows network administrators to make informed decisions and optimize network performance based on relevant metrics and key performance indicators.

Additionally, cloud radio resource management (CRRM) will be explored to address co-channel interference—a common problem in wireless networks. We will shed light on how CRRM leverages AI and ML to intelligently allocate and manage radio resources via algorithms, mitigating interference and enhancing overall network performance. Attendees will gain insights into the benefits of this approach and its potential to revolutionize wireless network operations.

Overall, this presentation aims to empower network administrators and professionals with the knowledge and tools to transform their networks using AI and ML. By embracing these cutting-edge technologies, organizations can enhance network performance, ensure better reliability, and streamline their operations in the ever-evolving landscape of modern networking.

[1 CPE] Supply Chain Attacks: Who’s at Risk and How Can You Stop Them

  Presented by EverFast & High Wire Networks

Supply chain attacks are increasingly in the news as more businesses are impacted by third-party vendors being used to circumvent the businesses’ defenses to propagate ransomware and digital extortion. Most companies today leverage some type of third-party software for business operations. Join us as we discuss the risk of supply chain attacks, recent breaches and how you can defend your enterprise.

  • What is a Supply Chain attack?
  • How do they work – postmortem
  • Who is at risk?
  • What’s the current threat condition?
  • How can you stop supply chain attacks from impacting your business?

[1 CPE] Cybersecurity is a Big Data Problem: How XDR Solves for Risk

  Presented by EverFast & High Wire Networks

Today’s connected business and the digital transformation has led to massive improvement in the customer experience and business agility. The flip side is a massive expansion of your attack surface that is increasingly difficult to get your arms around. Join the discussion on the impact digital transformation has had on business risk and how more businesses are turning to XDR services to reduce risk exposure and improve cyber resilience.

  • Trends in cyber security attacks
  • What has changed in the threat state
  • What is XDR and how does it reduce risk
  • What is driving growth of XDR services among business today
  • Is XDR right for your business, vetting an XDR offering