[1 CPE] The Future of AI-Enabled Data Platforms

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Removing the infrastructure silos and administration complexity around your application’s data gives you the flexibility to consume solutions and deliver total data freedom. Join us as we showcase the future of data storage as a single hybrid cloud platform for applications. Allowing you to consume the data services you need, where and when you need it! Offering a single data plane and control plane across block, file, object, and mainframe, with one common experience for administration, analytics, and automation.

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Eric Vanderbur, Global Solutions Architect • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

[1 CPE] Exploring AI for the Modern Organization

  Presented by Shovit Bhari, Brand Technical Specialist • IBM & Converge

As AI reshapes the business landscape, understanding and integrating generative AI is crucial for staying competitive. This presentation will cover the fundamentals of generative AI, including its capabilities in natural language processing and machine learning. We’ll explore strategic approaches to incorporate AI into business models, highlighting both opportunities and challenges.

We’ll delve into the latest advancements in generative AI, demonstrating their impact through real-world examples. The session will conclude with practical advice on preparing your business for AI adoption, focusing on workforce upskilling, IT infrastructure updates, and ethical considerations.

Join us to learn how to leverage AI effectively to transform and future-proof your enterprise.

[1 CPE] Adversaries for Hire!

  Presented by Steven Massey, Regional Sales Manager • Secureworks & Dell

By exploring modern threat tactics, tooling, and anonymized cases from Healthcare, Critical Infrastructure, and Finance sectors, this talk aims to equip participants with insights into how adversaries operate, enhancing their ability to secure their organizations against breaches and cyber-attacks.

By incorporating various skillsets from active operations, Secureworks has amassed a wealth of offensive knowledge and tradecraft that allows our operators to perform complex offensive security engagements and provide remediation advice and controls to businesses of all types and technologies.

[1 CPE] Adventures in CIS: Settings Standards for Windows Workstations and Servers

  Presented by INTERFACE Advisory Council

The Bank of Hawaii has recently completed a project implementing a set of benchmarks defined by the Center for Internet Security (CIS). The intent of this project was to standardize and document security settings on all Windows Workstations and Servers across the organization. The scope of this project was enormous, but the benefits of having completed the implementation are great. Preston and Mike will be discussing the trials and tribulations they encountered along the two-and-a-half-year implementation. In addition, they will offer suggestions for organizations wishing to harden their own security profile through the implementation of CIS benchmarks.

Speakers:

  • Mike Lotter, Systems Automation and Security Engineer, Bank of Hawaii
  • Preston Robler, Manager, Infrastructure Application Services, Bank of Hawaii

Preston Robler was born and raised in Colorado. He obtained a degree in Computer Science from the University of Colorado and has 12 years of experience developing applications in the Java programming language. His adventures in software development have taken him from Colorado to Massachusetts, New Zealand, Alaska, and finally Hawaii. Currently, he manages the Systems Automation and Security team at the Bank of Hawaii.

Mike Lotter has spent over 10 years in systems and network administration across two continents, with a focus on Microsoft products and security. For the last 3 years, he has worked in the Systems Automation and Security team at Bank of Hawaii, two of which were spent on the CIS implementation project.

[1 CPE] AI-Driven Networking

  Presented by Will Bonilla, Enterprise Strategic Accounts • Juniper Networks

Every connection counts. Nearly every vital experience in modern-day life requires a strong network connection. At Juniper, we believe that connectivity is not the same as experiencing a great connection. When you shift from simply measuring connectivity to focusing on the experience of the end-to-end connection – everything changes. Join us to learn how Juniper is revolutionizing networking with an experience-first approach driven by the industry’s only AI-Native Platform.

[1 CPE] One Click Away: Lateral Movement Stemming from Office 365 Compromises

  Presented by Wayne Johnson, CEO • Stellar Technologies

In the rapidly evolving digital age, the security of cloud-based platforms like Office 365 is paramount for businesses worldwide. “One Click Away: Lateral Breaches Stemming from Office 365 Compromises” delves into the hacker’s mindset, unveiling how the hack occurs (LIVE DEMONSTRATION) and how a seemingly minor compromise can trigger a cascade of security breaches with profound implications for businesses. This presentation will explore the multifaceted threat landscape of Office 365, Active Directory, SAML, and SSLVPN, illuminating the pathways through which a simple breach can spread across an organization’s digital ecosystem. Attendees will gain insight into the initial indicators of compromise, empowering them with the knowledge to detect early signs of infiltration. By emphasizing preventative measures and best practices, the session aims to equip participants with robust strategies to safeguard businesses from everyday threats. Furthermore, it will outline effective incident response and mitigation strategies, providing a blueprint for responding to breaches with precision and agility. The presentation will also underscore the far-reaching consequences of breaches, from operational disruptions to severe financial and reputational damage, highlighting the critical need for a proactive and informed approach to cybersecurity in the era of cloud computing.

[1 CPE] The Intersection of AI and Cybersecurity

  Presented by Robbie Elliott, Head of Engineering, West & Eric Darancette, Security Engineer • Check Point

As artificial intelligence (AI) permeates our lives, it’s crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.

[1 CPE] Meaningful Compliance: More than Just Checking Off Boxes

  Presented by Mark Fitzgerald • Chief Compliance Officer, Brigham Young University Hawaii

A key to creating a culture of compliance is to make it meaningful for all who are involved. Too often compliance is seen as a restriction rather than a series of best practices that can keep all of us safe and enhance user experiences. By adopting practices learned from your help desk –– knowledge management, continual improvement, setting expectations, and practice communications –– you can transform compliance into a tool to help users trust in what IT is delivering to them.

Mark Fitzgerald is BYU Hawaii’s Chief Compliance Officer in the Office of Compliance & Ethics and oversees the Purchasing Department. In this position, Fitzgerald manages programs and activities for establishing standards and implementing procedures to help leaders and managers ensure the university’s compliance with applicable laws and regulations.

Fitzgerald has worked in higher education information technology for over 25 years. Most recently, he worked as the Chief Information Security Officer at Boise State University where he had responsibility for IT compliance. He has also held positions as Executive Director for the Office of Information Technology and Director of Customer Care and Academic Technologies. He taught in the Master of Business Administration program at Boise State University. He also spent some of the early years of his career at BYU in Provo, Utah.

Fitzgerald has a Master of Business Administration in Information Technology from Boise State University and a Bachelor of Arts in Marketing Communications from Brigham Young University in Provo. He has several certifications and associations, including being a Lean Six Sigma Yellow Belt. He also had the privilege of teaching in the Boise State University MBA and Master of Cybersecurity programs.