[1 CPE] AI in Cybersecurity: Navigating the Double-Edged Sword

  Presented by Johan Bloomhart, Principal Sales Engineer • WatchGuard & BlackPoint IT

The rise of Artificial Intelligence (AI) has introduced both transformative opportunities and unprecedented risks to the cybersecurity landscape. While AI is a powerful tool for automating threat detection and enhancing security protocols, it also presents new avenues for cybercriminals to launch more sophisticated attacks. In AI in Cybersecurity: Navigating the Double-Edged Sword, we’ll explore AI’s dual impact—empowering both defenders and attackers—and discuss how to harness AI responsibly to protect against emerging threats.

This session will cover:

  • An overview of AI’s evolution and its prominence in the modern business world.
  • How malicious actors exploit AI for nefarious purposes, and the vulnerabilities that arise.
  • How cybersecurity professionals use AI to fortify defenses, identify threats, and mitigate risks.
  • Predictions for AI’s long-term influence on the security industry.
  • The latest technological tools and techniques that can mitigate the risks posed by AI.

We’ll also offer guidance on developing an artificial intelligence policy that allows your organization to leverage AI’s productivity benefits while minimizing risks to data security. Participants will walk away with actionable insights into how to implement AI securely in their business, staying ahead of both competitors and cyber threats.

[1 CPE] The Future of AI-Enabled Data Platforms

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Removing the infrastructure silos and administration complexity around your application’s data gives you the flexibility to consume solutions and deliver total data freedom. Join us as we showcase the future of data storage as a single hybrid cloud platform for applications. Allowing you to consume the data services you need, where and when you need it! Offering a single data plane and control plane across block, file, object, and mainframe, with one common experience for administration, analytics, and automation.

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Liran Chen, Vice President, Sales Engineering & Technical Services • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

[1 CPE] Cyber Threats: Facts, Frauds, and Fallout

  Presented by Robert L. Kardell, Esq. • INTERFACE Advisory Council

This session will explore the current trends of cyber threats, crypto frauds, including the trading platforms, and the international aspects of the cryptocurrency exchanges. We will also review how the platforms are being used to commit fraud as well as the investigative steps necessary to identify the ultimate recipients of the trades and transfers. Finally, we will discuss the investigation and litigation steps necessary to protect consumers from cyber threats and cryptocurrency scams and the discovery and recovery processes.

Robert L. Kardell (Bob) is an attorney whose practice focuses on cyber-breach incident response, legal and technology-based risk management solutions, technology and cyber-defense policy and protections, intrusion remediation, and fraud prevention and investigation. Bob has more than 22 years of experience working for the Federal Bureau of Investigation as a Special Agent and Supervisory Special Agent, as well as a Program Coordinator for Public Corruption, Complex Financial Crime, Healthcare Fraud, and Domestic Terrorism.

[1 CPE] Recovery Revolution: How to Stay Ahead of the Unexpected

  Presented by IP Pathways

This presentation will explore cutting-edge approaches, best practices, and innovative technologies that can strengthen your disaster recovery preparedness. Learn how to stay ahead of emerging risks and revolutionize your recovery plan for long-term resilience. Executives and IT leaders must understand not only why DR is important, but how the architecture behind it ensures rapid recovery, data integrity, and minimal disruption in the event of a disaster.

[1 CPE] Don’t Build a Fire Department

  Presented by Andrew Schori, Enterprise Account Executive • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24×7 monitoring across your collective attack surfaces.

[1 CPE] Winning the IT Talent War: Attracting, Hiring, & Retaining Top Resources

  Presented by Dr. Matthew McCarville • Chief Information Officer, State of Nebraska

Job hopping in the IT industry has only increased in recent years in both the public and private sectors. There is never a shortage of opportunities from help desk positions to engineers and managers. This has created a complex challenge for IT leaders to retain their staff and not lose valuable experience from their team.

Join us for an open panel conversation on the challenges of staffing today’s IT departments. State of Nebraska CIO Matthew McCarville will lead this discussion with several visionary local leaders. They will share their experiences and offer you tips on how to maintain a team. You will also have a chance to learn more about the best moves as you navigate your own career.

Panelists:

  • Derek Kruse, Chief Information Officer, Douglas-Omaha Technology Commission
  • Larra Petersen-Lukenda, Chief Operating Officer, CyncHealth
  • Deb Sander, Director of Human Resources, City of Omaha
  • Nate Watson, CEO, Contemporary Analysis (CAN) and Omaha Data Science Academy (ODSA)

Dr. McCarville is a results-driven executive with a diverse background spanning higher education, government, data analytics, and global consulting. As an accomplished leader, educator, and technology strategist; he is committed to driving positive change and harnessing the power of data and technology for the benefit of organizations, education, and society. He is also dedicated to fostering a culture of innovation, ethical data use, and strategic decision-making in any organization he engages with.

With extensive experience as a Chief Information Officer, Chief Data Officer & Vice Chancellor; Dr. McCarville has managed complex operations, led large teams, and navigated budget challenges/constraints with an innovative mindset. His work in higher education and government has allowed him to play a pivotal role in shaping the strategic direction of information resources and technology to support state, academic, research, and service operations. He is also a 1st generation college student and Creighton Alumni, a 50% Hispanic, an 18 year Hodgkin’s Lymphoma Cancer Survivor, a PCA stroke survivor, prior public assistance program beneficiary, ward of the state, group home, and adoption process ‘alumni.’

Additionally, Dr. McCarville’s experience in global consulting as Vice President at MTX Consulting Group/Maverick AI (MavQ) as well as at PwC Global Consulting involved heading thought leadership and sales management for international business and public sector verticals. He has extensive expertise in implementing data consolidation, systems modernization, AI/ML, as well as a strong track record in business process re-engineering and robotic process automation (RPA).

As the former CDO for the State of Florida, Dr. McCarville’s work in the public sector involved collaborating with various political, agency and county stakeholders and to implement RPA and BPR as well as creating innovative data management strategies that contributed to efficiency, transparency, and data-driven decision-making.

[1 CPE] Disaster Preparedness and Data Protection Strategies for Business Continuous Availability

  Presented by Arcserve

As natural disasters like hurricanes, wildfires, and severe winter events become more frequent and intense, businesses face increasing economic and operational challenges. High-profile disasters, including the Camp Fire in 2018, which incurred a staggering $16.5 billion in damages, and Hurricane Maria’s profound impact on Puerto Rico, estimated at $139 billion for full recovery, underscore the escalating financial stakes.

This presentation will explore effective strategies to bolster business resilience in the face of natural catastrophes.

Key elements of the session will include:

  • Critical insights from Arcserve’s annual global research study on disaster preparedness.
  • A comprehensive Disaster Preparedness Checklist tailored for companies.
  • Practical tools designed to safeguard business operations and data resilience.

We will delve into the details of a 5-step disaster and ransomware recovery plan template, as well as the 3-2-1-1 backup strategy, which ensures robust data recovery through multiple backup copies stored both locally and offsite. By implementing these strategies, businesses can minimize financial losses, reduce operational downtime, and achieve a rapid recovery, thereby ensuring continuity even during catastrophic events. This session aims to arm business leaders with the essential tools and knowledge to safeguard their enterprises amidst an increasingly unpredictable global landscape.

[1 CPE] AI: Friend or Foe? An Open Discussion With Your Colleagues

  Presented by INTERFACE Advisory Council

Artificial Intelligence has made a mark already and its use will only continue to expand. Are we fully prepared to embrace AI in our workplaces? Viewpoints differ on how widely AI should be used at this point. Commonly used applications and software now include AI capabilities as a part of their standard offerings. How is this governed in your company? Do you even have an AI policy drafted?

Join the INTERFACE Advisory Council for an open discussion on all things AI. We will cover the risks associated with using AI –– and the risk of NOT using it. What knowledge do you need right now? Bring your questions as we explore the starting points that every IT department needs to consider for an effective AI policy.

Panelists:

  • Jason Boche, Sr Director, Corporate Development & Strategy, Union Pacific
  • Dr. Lisa McKee, Assistant Professor Cybersecurity, Bellevue University
  • Terrance Steinhart, Manager, Cybersecurity, Blue Cross & Blue Shield of Nebraska
  • Justin Williams, Director, Information Security, Hudl

[1 CPE] Global Insights on Identity Security Maturity: Why it Matters? Why Now?

  Presented by Seth Garlett, Solutions Engineer • CyberArk

In our global survey of 1,500 identity-related security experts, we found only 9% of organizations have the highest level of maturity. These Transformative organizations have the most mature identity security programs as they strategically focus on four key tenets: tools, integration, automation, and continuous threat detection & response. As a result, these organizations significantly outperform their competition in driving business outcomes and reducing risk. Learn how you can mature your identity security program because the future of security starts with identity.

Key Session Takeaways:

  • Top challenges for identity security
  • The four tenets of identity security
  • How to take a holistic approach to identity security
  • Key considerations in evaluating identity security providers

Seth Garlett is an accomplished professional with experience in Sales Engineering and Software Engineering. Seth has significant experience in the development of web applications for organizations ranging from small businesses to Fortune 500 companies. His expertise lies in creating identity-based solutions and leading software development teams. Seth is now dedicated to utilizing his extensive knowledge to provide valuable insights and support in helping clients achieve their identity goals and milestones.