[1 CPE] Seeing Your Attack Surface Through the Eyes of an Adversary

  Presented by Kraig Faulkner, Channel Systems Engineer, Cortex • Palo Alto Networks

Modern attack surfaces are dynamic. Without clear visibility that is constantly updated, it is all too easy to have persistent exposures and unmanaged assets. Security practitioners can only be as good as the data they have, so having a strong foundation of continuous discovery and monitoring ensures you can keep up with modern, dynamic attack surfaces in order to find, prioritize, and mitigate exposures as they arise.

[1 CPE] Why is Critical Data Being Compromised?

  Presented by Thales & Structured

Securing critical data and information was where this industry started a long time ago, but it became more challenging with the rapid growth of enterprise data in an interconnected world. The pandemic forced organizations to support a remote workforce and expose critical systems that were once only accessible from inside the company’s network. We’ve increased the attack surface and the number of vulnerabilities which has led to more data breaches. With the technology advancements in access management, data discovery and encryption we can once again shift the focus to securing our data and information. In this presentation, we will discuss a unified data-centric security approach and strategy to protecting your most critical data and information.

[1 CPE] Security Service Edge (SSE) is redefining Cloud, Data, and Network Security

  Presented by Netskope

The inversion effect of cloud applications, users, and data outside of the corporate network, along with the new hybrid workforce, demands a new approach to IT security and network architecture. Cloud application traffic has overtaken web traffic in the enterprise, creating blind spots and complexity with existing legacy security and network solutions that were designed for access to data centers through on-premises security stacks. These challenges demand a new approach to cloud security that delivers the simplicity and agility for access, security, and performance that businesses need for their successful digital transformation journeys while securing their critical data assets and embracing zero-trust principles. They also demand an intelligent solution approach based on a converged, cloud-native architecture.

[1 CPE] How to Stop East/West Attacks in Your Data Center

  Presented by Aruba Networks

70% of all breaches are caused by endpoint security vulnerabilities, followed by lateral movement in the data center. Halt that hacker traffic. Attend this session to learn about a new category of data center switch that combines best-of-breed L2/3 switching with the industry’s first hardware-accelerated programmable processor. This new tool augments your malware and ransomware detection and response capabilities by delivering stateful firewall services inline, at scale, with wire-rate performance and orders of magnitude improvement over traditional data center L2/3 switches. You will learn how to gain visibility and enforce security policy for all East/West flows between workloads to protect the critical assets in your data center.

[1 CPE] Dark Web Monitoring: It’s time for an Offensive Strategy!

  Presented by Jeff Simpson, Sr Sales Executive, Cybersecurity Solutions • AT&T Alaska

Many organizations discover a cybersecurity breach many months later, too late for any substantial mitigation. With the average cost of breaches in the US at $9.4M, (without including ransom paid), it is advisable for organizations to take a more offensive stance. What if there was a way to detect compromised corporate credentials well before they were used to cause widespread fraud? Dark Web Monitoring goes where cybercriminals traffic stolen emails, usernames, and passwords, and can alert an organization if personal or corporate user information shows up in the Darknet layers. Learn how using a tool like this can help protect an organization’s employees, consumers, and vendors, as well as its reputation.

[1 CPE] Solutions Success with Sourcewell

  Presented by Mitel & Structured

Sourcewell is a national cooperative purchasing program that exists to help organizations save time and money by purchasing from ready-to-use, competitively solicited contracts. Sourcewell often meets the competitive bid requirements for some public sector customers, eliminating the need for a formal RFP process when acquiring a new phone system and expediting the purchasing process for IT Professionals.

For Alaskan State & Local Government, Native Alaskan Tribes & Native Corps, Education, and Nonprofit organizations, there is an opportunity to leverage Sourcewell contracts. And because this contract vehicle is more than just UC Communications, it’s often already approved by purchasing groups inside these entities and provides an easy-to-use solution.

Local Mitel Partner, Structured Communications, currently services and supports Alaskan customers, many of whom have acquired premise or private cloud-based Mitel Phone Systems. We will highlight a few case studies that have used the Sourcewell contract and showcase how Mitel & Structured solved their business concerns through customized solutions.

[1 CPE] Zero Trust Begins with Identity

  Presented by Sami Laine, Director of Technology Strategy • Okta

IAM didn’t rank in the NASCIO priority list before 2019 but has now moved up to #5 and will continue to climb. Yet, many State and Local Government entities find it difficult to articulate a comprehensive IAM strategy and governance framework. To address challenges posed by legacy applications, technical debt, and organizational inertia, a vision of Identity as a Platform can allow for rapid adoption, improved user experience, reduced administrative burden, and contribute to your Zero Trust initiatives. Join this session to:

  • Understand the value of a platform approach to IAM
  • Learn how to enhance existing investments in Microsoft, Duo, and other security solutions
  • Improve cross-functional relationships and employee on/off-boarding

[1 CPE] How to Simplify and Secure Your Network & What You Need to Know About Wi-FI 6e

  Presented by Jerry Yarborough, Sr SLED Account Executive • Extreme Networks

During the presentation, we will discuss how to simplify your network and make it more secure by using the IEEE standard 802.1aq. We explain the standard, and how it is easier to use than traditional networking and much more secure. We will demo its simplicity and what makes it secure.

We will then move into Wifi 6e and how it is changing the way we must look at wireless deployments. We will discuss all the changes that it has brought us and what we must be planning for with the higher speeds that we will be able to achieve.

[1 CPE] AI Innovations Fueling Demand for Rapid Network Modernization

  Presented by Joshua Gardiner, Engineering Lead of AI-Driven Enterprise • Juniper Networks

AI recently jumped from a buzzword to the start of a revolution. Juniper is visionary in its use of AI in IT Networking, and we invite you to join our session that highlights the advantages of adopting AI-Driven technologies in your enterprise network.

Attendees will learn how AI can simplify the management of wired & wireless networks as well as support the ever-increasing demands for modern technologies like NAC & SDWAN.