[1 CPE] How to Have a Successful Relationship (With an MSP)

  Presented by Joe Hatton, Director, Cloud Services • Structured

In today’s fast-paced business world, finding the right help is tougher than ever, especially with constant cybersecurity threats making vigilance a top priority. Outsourcing to Managed Service Providers (MSPs) might seem like an easy fix, but did you know that half of all businesses aren’t happy with their MSP? This talk will dive into how you can pick the right MSP and keep things running smoothly. We’ll cover what to look for in an MSP, how to work well together, and ways to keep the relationship strong and beneficial for everyone involved.

[1 CPE] PKIaaS: Empowering Trust in a Dynamic Digital Landscape

  Presented by Matt Rose, Manager, Technical Sales Consulting • Entrust

Digital transformation accelerates at a fast pace, and organizations struggle to secure their digital identities. PKI as a Service (PKIaaS) is a game changer for security. It isn’t just about keys; it’s a blend of agility, scalability, and trust. PKIaaS will provide:

  • Quick Deployment: PKIaaS deploys and expands in minutes to secure your business use cases.
  • Cloud-Native Scalability: Growth at nearly limitless capabilities
  • Security First: Entrust manages the PKI infrastructure for you

We will also review our integration and the ease in which PKIaaS plays with MDM vendors, Microsoft Active Directory and certificate automation and how to seamlessly leverage PKI with your existing enterprise IT platform.

  • Microsoft Intune: Securely enroll devices, manages their lifecycle, and handle certificates.
  • Other MDM vendors: PKIaaS collaborates seamlessly with various MDM partners, enhancing your Zero Trust strategy.
  • Microsoft Active Directory support
  • ACMEv2 and SCEP (Simple Certificate Enrollment Protocol)

As we continue to navigate security within organizations, PKIaaS will provide the assurance that you need.

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Liran Chen, Vice President, Sales Engineering & Technical Services • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

[1 CPE] Modern Logging & Analytics: Will Modularization Make Your SIEM Better?

  Presented by Marty McDonald, Sr Domain Security Advisor • Optiv

In this session, we will discuss trends Optiv is seeing in the SIEM market and how they may relate to your environment. We will focus on the move towards a single collection of logs and routing of those logs to multiple platforms to meet the use cases and requirements of the business and security. Once the collection of the logs is separate from the search, correlation, and analytic layers what does it mean to you?

Marty has 20 years of deep cyber security industry experience gained from a variety of value-added resellers and solutions integrators. Prior roles include Senior Consultant in Security Intelligence for Datalink, and Senior Consultant in the Technology Solutions Delivery team at Accenture. Marty is a cybersecurity professional with experience ranging over a wide variety of clients from small to Fortune 500 corporations in a multitude of industries including government, healthcare, retail, manufacturing, banking, and technology. He has delivered projects for the rationalization of technologies and reference architectures for analytics platforms. He is a subject matter expert (SME) in the design and implementation of Security Incident and Event Management (SIEM) systems and is well-versed in creating detection mechanisms that enhance Security Operation Centers (SOC) and compliance effectiveness. He possesses a unique ability to turn business needs into technology solutions in a cost-effective manner for his clients.

[1 CPE] A Review of FRSecure’s Annual Information Security Report

  Presented by Dave Tuckman, Information Security Consultant • FRSecure

FRSecure (an Information Security company located in Edina, MN) took the results of +/- 400 Validated Information Security Assessments and 55 Incident Response Engagements conducted in 2022 and created an anonymized report from the data called: The State of Information Security. Full details and access to the report are available here: https://frsecure.com/2023-annual-infosec-report/

In this presentation, FRSecure Information Security Consultant Dave Tuckman will highlight key findings in the report, and what we can learn from it.

Understand how you can mitigate risk going forward to protect your business and clients in an ever-changing threat landscape. Dave will provide additional perspective on how you can leverage this information for a better understanding of your third-party (supply, vendor, contractor) relationships.

Topics include:

  • FRSecure’s Annual State of InfoSec Report, informed by over 400 validated security assessments
  • Where organizations are getting it right vs. falling behind
  • How you can use this report to inform your own business’s security decisions
  • How you can use this report to inform your business’s Third-Party Risk Management

[1 CPE] The Intersection of AI and Cybersecurity

  Presented by Gregory Pepper, Security Architect • Check Point

As artificial intelligence (AI) permeates our lives, it’s crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.

[1 CPE] Demystifying Zero Trust: Simplifying Network Security

  Presented by Tanner Harrison, Systems Engineer • Fortinet

Today’s ever-changing threat landscape challenges traditional security models. The emergence of the Zero Trust model represents a transformative approach, reshaping how organizations protect their assets. This presentation aims to demystify Zero Trust, offering a comprehensive understanding that goes beyond buzzwords. We will explore the foundational concepts of Zero Trust, emphasizing the “never trust, always verify” philosophy. By the end of this session, attendees will be equipped with the knowledge to begin their Zero Trust journey, enhancing their security posture, and protecting critical data and systems from modern threats. Whether you are a security professional, IT manager, or organizational leader, this discussion will empower you to take decisive action toward a more secure future.

[1 CPE] The Decarbonization of the Data Center

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Balancing the need for substantial data infrastructure with more eco-friendly policies should be top of all organizational to-do lists. Rather than a competition between corporations, these initiatives should be focused on the larger benefit of a healthier world. That’s why creating a specific data center decarbonization strategy will be key. This will range from improving the visibility and measurement of power usage, to actually reducing the carbon footprint of each operational layer. But where should organizations begin?

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

[1 CPE] AI Unleashed: Navigating the AI Landscape for Responsible Adoption

  Presented by Zach Feingold, Engineering Manager, & Susan Anderson, Vice President of Sales • Cerium Networks

In today’s digital era, AI is not just a buzzword but a robust toolset that, when wielded with precision, can unlock unprecedented value and competitive advantage. As we embark on this journey, we must anchor our strategies in the bedrock of security, ensuring that our AI systems not only enhance our capabilities but also safeguard our assets. This presentation explores practical steps to weave AI into our business fabric, turning challenges into a springboard for growth and innovation. Our goal is to present you with concepts and avenues to consider as you learn to navigate your adoption. Let’s embark on this journey to harness AI’s potential responsibly and effectively.