[1 CPE] Unlock the Future of Secure Workspaces with Prisma Access Browser

  Presented by Palo Alto Networks

As work increasingly moves to the cloud, traditional network perimeters dissolve, and the browser becomes the new frontline for productivity and risk. This presentation explores how Prisma Access Browser is redefining security by shifting focus from network-based controls to the user’s primary workspace: the Browser. We’ll dive into how this solution uniquely protects users and data at the browser level. Join us to understand how a secure, zero-trust approach to browser activity can streamline compliance, enhance user experience, and fortify your security posture without compromising productivity. This session includes a live demo.

[1 CPE] Modern Data Center Network Automation

  Presented by Bill Wester, Sr Product Manager  • Juniper Networks

The presentation will focus on Juniper Apstra and Designing Data Centers with Intent. We will discuss the design, deployment, and operation of modern EVPN VXLAN data centers and talk about how machine learning and AI are helping to make data center operations easier for the operators. We hope that the attendees will take away a new appreciation of how modern automation can help solve the hardest data center problems with ease.

[1 CPE] Next-Gen Defense: The Future of Cybersecurity

  Presented by Hubert Ralph Bonnell, CISSP, CCSM – Security Engineer • Check Point

As artificial intelligence (AI) permeates our lives, it’s crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.

[1 CPE] The Decarbonization of the Data Center

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Balancing the need for substantial data infrastructure with more eco-friendly policies should be top of all organizational to-do lists. Rather than a competition between corporations, these initiatives should be focused on the larger benefit of a healthier world. That’s why creating a specific data center decarbonization strategy will be key. This will range from improving the visibility and measurement of power usage, to actually reducing the carbon footprint of each operational layer. But where should organizations begin?

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

[1 CPE] The Modern Kill Chain: How Attacks Have Gone from Months to Minutes

  Presented by Tony Kelly, Sr Manager, Sales Engineering • Lookout

Cloud breaches are now happening in minutes, not months. Threat actors are exploiting the fact that mobile devices are more susceptible to social engineering, enabling them to gain direct access to cloud infrastructure and swiftly compromise data. Join us for this 50-minute presentation to learn:

  • How the traditional cyber kill chain has evolved to exploit mobile users
  • Why attacks utilizing a mobile device are increasing
  • What makes your organization vulnerable to a modern-day attack
  • Why stopping breaches requires the ability to identify anomalous data movements
  • The three key capabilities you need to defend against modern breaches

[1 CPE] Breaking Down Silos: Unify Assets, Minimize Attack Exposure

  Presented by Mike Brown, Sr Systems Engineer • Axonius

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.

Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.

As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.

[1 CPE] Push Your Vulnerability Management Program Forward

  Presented by Chaney Edwards, Sr Security Solutions Engineer • Rapid7

We will begin focusing on building a framework that we will dive into the elements of in greater detail later in the presentation. These elements will be:

  1. Know your leadership, user base, regulations, and requirements
  2. Building policy and procedures
  3. Scan scheduling, design, and validation
  4. Remediation and exception processes
  5. Validation of program
  6. Flexibility and the OODA loop

We will start by focusing on the importance of knowing your leadership, user base, regulations, and requirements –– and ensuring others know that Leadership and Management buy-in is critical to the success of the program. We will talk about how to interact with your user base and what you should communicate with those individuals. We will also touch on how regulations and business requirements will play a part in your program design as well. Next, we will spend time on building policy and procedures and understanding the hierarchy and differences around Information Security Policy vs. Guidelines vs. Procedures.

From there we will shift gears and focus on scan scheduling, design, and validation of the scans in place. While many feel this is the most important part of a program, getting the data is the least important part of the whole process and we will discuss why that is. We will cover topics including scan frequency, targets, and validation. We will touch on the benefits of tagging, the use of agents, and reporting. The focus will be that there is no “right way” to scan and rather several considerations to guide you to what is right for you and your environment. We will also discuss remediation methods and how to track said remediations. With any remediation process, exceptions will occur, and we will touch on best practices for not only accepting that risk into your environment but curating that list for a continual review.

Finally, we will discuss program validation, flexibility, and the OODA loop (Observer, Orient, Decide, Act) and how where you are on day one in your program will inevitably change over time. For validation we will cover reporting not only to leadership but to internal stakeholders like security and governance programs, but also the user base as well. We will discuss topics requiring your program to be flexible like new assets, mergers and acquisitions, new projects, leadership changes, and more. Leveraging the OODA loop we will discuss processes to help tackle these changes and ensure your program can survive an ever-changing landscape.

The session will then end with a live Q&A to discuss any topics had or to field any thoughts on the matter to garner a collaborative end to the talk and allow for audience participation.

[1 CPE] How to Talk to Executives About Technology

  Presented by Dr. Ethan Benatan • Chief Information Officer, TriMet

As IT practitioners and leaders, you have deep knowledge about the benefits, risks, and costs associated with your IT operations. Yet IT is too often seen only as a cost center, as order-takers, or as a bunch of smart people who understand the things that our users see at the Service Desk. How can you increase your impact by helping your boss, their boss, executives, and the CEO understand what you have to offer? In this session, we will learn from real experience and leave with a toolkit that will help you better serve your organization –– and your career.

Dr. Ethan Benatan has led IT departments for over 25 years, spending over 10 of those years on executive teams across four different industries and overseeing IT portfolios worth up to a half-billion dollars. He currently serves as the Executive Director of IT and Chief Information Officer for TriMet, the regional transit authority in Portland Oregon, where he is proud to lead an IT team of over 100 professionals in service to the region.

Dr. Benatan is passionate about aligning IT with business needs and building effective communication between IT and internal customers. He is inspired by human potential and enjoys mentoring and teaching. He is a practiced communicator, facilitator, and trainer with skills in nonviolent communication and mindful compassionate dialog. In his spare time, he loves to nerd out on his hobbies which include billiards, flying, and salsa dancing.

[1 CPE] From Back-End to Boardroom: Securing Your Seat at the Table

  Presented by INTERFACE Advisory Council

Decisions are made every day at your organization that will impact all employees. Budgets, policies procedures, and more are discussed in board rooms, on conference calls, or at a staff lunch. Who is a part of these discussions? Are you? So often Information Technology departments are not included in key decisions about the direction of an organization, and they should be.

Join the INTERFACE Advisory Council for an open discussion about securing your “seat at the table.” IT performs so many crucial services that help all aspects of a business, it makes sense that you are offering up the needed insight into technology’s role in key decisions. Join this panel discussion to hear from your peers about how you can accomplish this tough task.

Moderator: Brandon Gatke, AVP of Information Technology and Security, Portland Community College

Panelists:

  • Ed Arib, Technology Manager, Portland Police Bureau
  • Steve Hankel, Vice President of Information Technology, Johanson Transportation Service
  • Brian Hole, Deputy CISO, Legacy Health
  • Jaya Srinivasan, CISO, Director of Cybersecurity, M Financial Group