[1 CPE] Seamless Hybrid Connectivity: Leveraging Cellular (5G) and LEO

  Presented by Ericsson

In an era of digital transformation, enterprises need agile, secure, and reliable connectivity that overcomes the limitations of terrestrial networks. This presentation shows how Wireless WAN edge routers, cloud management platforms, through Public/Private/LEO options unlocks the full potential of WAN Connectivity. Attendees will learn how to deploy Wireless WAN for fast primary, Day-1 Internet, WAN redundancy, IoT and In-Vehicle applications. Extending seamless coverage with private 5G for challenging indoor/outdoor environments and apply zero-trust security through simplified SASE to protect against growing threats.

Through real-world examples, discover how these solutions enable rapid deployment at distributed sites, vehicles, IoT ecosystems, and pop-up locations—driving better performance, operational efficiency, enhanced mobility, and business growth without infrastructure constraints. Leave equipped to harness 5G/Hybrid Connectivity for innovation and scalability anywhere.

[1 CPE] Rethinking Fire Suppression in Mission Critical Facilities

  Presented by Jeff De Hart, Director of Data Center Vertical Development • Kidde Fire Systems

As data centers continue to scale in size and complexity, traditional fire suppression approaches are being challenged to keep pace. In this session, Jeff De Hart, Director of Data Center Vertical Development at Kidde Fire Systems, draws on nearly three decades of experience to explore modern strategies for protecting mission-critical environments. Attendees will learn how simplified system design can reduce hardware requirements, lower installation and recharge costs, and deliver continuous protection across the data hall—without compromising safety or resilience.

Jeff leads the hyperscale data center and BESS strategy across the United States and Canada, is a recognized authority in special-hazard and clean-agent solutions for mission-critical environments, and serves on the Fire Suppression Systems Association (FSSA) Technical Committee.

[1 CPE] Observations from the Front Lines: The People Behind the Threats and Trends

  Presented by Peter Ingebrigtsen, Sr Technical Marketing Manager • Arctic Wolf

Cybersecurity threats don’t emerge in isolation—they are observed, analyzed, and stopped by real people working on the front lines every day. This session pulls back the curtain on modern security operations, focusing on the human-driven research that powers effective threat detection, incident response, and adaptive security strategies.

Drawing on Arctic Wolf Labs research, SOC analyst expertise, and real-world incident data, this talk examines how today’s attacks are identified, contextualized, and disrupted in live environments. Attendees will gain insight into the patterns behind the most persistent threats, how adversaries continually adapt, and why defenders must evolve just as quickly. Rather than focusing solely on tools or alerts, this session highlights the people, processes, and intelligence that transform raw telemetry into actionable defense – illustrating how to turn frontline observations into scalable protection for organizations of all sizes.

[1 CPE] Industry Leading Alternatives to VMware and other Legacy Hypervisors

  Presented by Scale Computing

As organizations modernize their IT environments, many are exploring alternatives to traditional hypervisor platforms. Hyperconverged infrastructure (HCI) integrates compute, storage, and virtualization into a unified platform designed to simplify deployment, scaling, and management. This session will examine how these architectures can improve resilience, reduce operational complexity, and support both core data center and edge environments.

We’ll look closely at hyperconverged and edge computing solutions designed to make IT infrastructure simple, scalable, and highly available for organizations of all sizes and verticals –– integrating servers, storage, and virtualization into a single, easy-to-manage solution.

[1 CPE] The AI Mutiny: Regaining Control of the Unauthorized Intelligence Explosion

  Presented by Palo Alto Networks

Your employees are already using AI—the only question is whether you’re invited to the party. Statistics show that nearly 60% of the workforce has bypassed IT to use AI tools, leading to a surge in data exposure and breach incidents. The “Shadow” has returned, and it’s smarter than ever. Join us for a look at the reality of Shadow AI in the enterprise. We’ll analyze real-world breach scenarios and provide a roadmap for reclaiming control. Learn how to empower your workforce with approved, secure AI alternatives that satisfy the need for speed without sacrificing security.

[1 CPE] Capture the Flag: A Hands-On Threat-Hunting Workshop

  Presented by Carmie Mach, Cortex Domain Consultant • Palo Alto Networks

Sharpen your incident response and digital forensics skills at INTERFACE Anchorage 2026. Tackle real-world cybersecurity challenges and expand your expertise through a hands-on exercise at the Palo Alto Networks SecOps Capture the Flag competition event. How quickly can you investigate the threat at hand?

Join Carmie Mach of Palo Alto Networks for an interactive Capture the Flag (CTF) workshop designed to sharpen your real-world security skills. Participants will tackle hands-on challenges across areas like network defense, threat detection, and vulnerability analysis in a guided, collaborative environment. Whether you’re new to CTFs or looking to level up, this session offers practical experience you can immediately apply in your day-to-day cybersecurity work.

[1 CPE] Cybersecurity and Compliance For 2026

  Presented by Structured

This session examines how organizations can align cybersecurity, privacy, and compliance programs with the realities of 2026. The presentation reviews current threat trends, executive accountability requirements, and the expanding impact of artificial intelligence on risk management. It then connects federal, state, and industry obligations, including NIST CSF 2.0, HIPAA, CJIS, PCI DSS 4.0, CMMC, and emerging privacy laws to practical security program design. Attendees will leave with a clear framework for building a complete security program that integrates governance, segmentation, risk management, Zero Trust principles, and penetration testing to reduce risk and support regulatory readiness.

[1 CPE] AI-Native Networking: From Reactive IT to Autonomous Operations

  Presented by HPE Networking

Traditional networks were designed for human troubleshooting. As environments scale and expectations rise, reactive operations and manual workflows no longer meet the needs of modern enterprises.

AI-Native Networking represents a fundamental architectural shift — where AI is not layered on top of infrastructure, but built into its foundation. By combining real-time telemetry, cloud-native microservices, and continuously trained models, AI-Native platforms move IT from reactive firefighting to autonomous operations.

The result: measurable improvements in user experience, reduced operational overhead, faster root-cause resolution, and infrastructure that continuously optimizes itself.

This session explores what it truly means to be AI-native, how it differs from legacy “AI-enhanced” approaches, and the business outcomes organizations are achieving by embracing this new model.

[1 CPE] From Liability to Asset: Securing Unstructured Data at Scale in the Era of AI

  Presented by Rubrik

Unstructured data is the lifeblood of the modern organization, yet its sheer volume often outpaces the strategies meant to protect it. As this data becomes the fuel for future AI initiatives and business intelligence, the “old way” of managing NAS has become a primary point of failure.

In this session, we’ll dive into how Rubrik NAS Cloud Direct (NCD) redefines the protection of PB-scale file systems. We will explore a modern architectural approach that provides the speed, visibility, and cloud-native flexibility required to turn massive data sets into resilient assets. Whether you are preparing for an AI-driven future or simply struggling with the growth of your current footprint, this session will provide a blueprint for total unstructured data control.

[1 CPE] The Enterprise Buyer’s Guide to AI Security Platforms

  Presented by Cato Networks

AI adoption is accelerating faster than security and governance, exposing organizations as sensitive data flows through copilots, LLM-powered apps, and agentic systems that legacy tools can’t properly protect. With a surge of AI security vendors entering the market, buying the right platform can be confusing. This presentation helps security leaders evaluate AI security solutions by clarifying the new risks AI creates, explaining the core pillars of AI security, and outlining how to compare platforms, ask the right questions, and avoid common buying mistakes.