[1 CPE] Translating Real-World Scenarios into Impactful Incident Response Training

  Presented by Don Pecha, CISO, and Arturo Romero, Cloud Security Architect • FNTS

The probability of an IT incident happening in your organization is not “if” but “when.”

Social engineering, insider risks, data leaks, equipment failure, and exploits are among the long list of real-world incidents facing today’s enterprises. Do you have a plan in place to prevent and respond to threats that could result in downtime, disruption, and lost revenue?

FNTS Chief Information Security Officer Don Pecha and Cloud Security Architect Arturo Romero will discuss how to build cyber resiliency strategies that include having a cyber incident response training plan and multiple security layers to protect and secure IT platforms from different types of threats.

[1 CPE] The Human Factor: Quantifying Human Risk

  Presented by Sara Anstey, Director of Data Analytics and Risk  • Novacoast

This talk will explore the growing field of human risk management and quantification, diving into the next step in an organization’s risk journey: quantifying people. We will discuss where the market is, how people are adopting it, and what organizations can gain from human risk management.

Join this session on the emerging and evolving field of human risk quantification, which aims to apply quantitative methods to assign risk scores to every employee at a company based on their actions and access. This space is very similar to where cyber risk quantification was about 4 years ago when there were a few start-ups in the market and a few active voices on LinkedIn advocating for the adoption of these practices. Now, human risk quantification is an organizational priority. Having done extensive research into where the players in the market are and how companies utilize these strategies, human risk quantification has become the next step of a risk journey for many companies. Over 80% of breaches involve the human element –– if organizations want to stop them, they need to understand how the people they employ affect their security posture.

[1 CPE] Demystifying Zero Trust: Simplifying Network Security

  Presented by Tanner Harrison, Systems Engineer • Fortinet

Today’s ever-changing threat landscape challenges traditional security models. The emergence of the Zero Trust model represents a transformative approach, reshaping how organizations protect their assets. This presentation aims to demystify Zero Trust, offering a comprehensive understanding that goes beyond buzzwords. We will explore the foundational concepts of Zero Trust, emphasizing the “never trust, always verify” philosophy. By the end of this session, attendees will be equipped with the knowledge to begin their Zero Trust journey, enhancing their security posture, and protecting critical data and systems from modern threats. Whether you are a security professional, IT manager, or organizational leader, this discussion will empower you to take decisive action toward a more secure future.

[1 CPE] Could You Recover from a Cyberattack?

  Presented by Jeff Polczynski, Director of Solutions Architecture • 11:11 Systems

Cybercrime continues to be the number one worry for most organizations, and for good reason. Cyberattacks are the most common reason for an outage — and the most impactful. But defending against cyberattacks is only one part of a holistic plan for surviving a ransomware attack. Could you recover if cyber criminals targeted your organization?

During our presentation, we’ll discuss how to create a holistic cyber resilience strategy that considers ongoing technical drift and changes.

Jeff T. Polczynski is the Director of Solutions Architecture at 11:11 Systems. Previously, he was a key member of the Network Engineering team, where he helped design and build the network infrastructure for the 11:11 Cloud. Jeff has more than 20 years of experience in data center, networking and security roles across government, financial services, and service provider companies. Outside of work, he loves backpacking and is always on the lookout for the perfect spot to hang his hammock for a night under the stars.

[1 CPE] Sprung a Leak! Unit 42’s 2024 Leak Site Analysis

  Presented by Palo Alto Networks & Structured

Unit 42 monitors ransomware and extortion leak sites closely to keep tabs on threat activity and monitors data from dedicated leak sites (DLS) that are often only accessible through the dark web. Throughout our analysis, we compare activity results so that we are accounting for any seasonal fluctuations that can occur due to annual holidays, travel seasons and other recurring events that may impact threat activity. Here we will take a dive into those key leak site trends impacting the state of cybersecurity.

[1 CPE] Proactive Threat Mitigation Through East/West Traffic Isolation

  Presented by HPE Aruba Networking & Structured

Ransomware and targeted cyber security threats are on the rise. A proactive prevention strategy should use both tried and proven methodologies as well as new and emerging technologies. East West traffic identification and isolation is key in preventing malicious content from spreading, both in the Data Center and at the Campus Edge of the network. We will focus on innovative approaches to address the security compliance, performance, agility, and scalability demands of today’s highly distributed, hybrid, network environments.

[1 CPE] SLED Challenges: Budgets, Compliance, E-Rate

  Presented by Michael Townsend, Solutions Architect, & Robert Gherbaz, vCIO • Barracuda & BlackPoint IT

SLED (State/Local Government, Education) customers face unique challenges when adopting new technologies, such as limited budgets, lengthy approval processes, and outdated infrastructure. With over 30 years of experience in the K-12 education sector, Michael understands these hurdles firsthand. His deep insight into the constraints faced by SLED organizations enables him to guide decision-makers through the complexities of implementing new solutions.

In the cybersecurity space, where threats evolve rapidly, Michael helps SLED customers navigate the landscape while working within the confines of limited resources and procedural barriers. His “been there, done that” experience ensures that SLED clients overcome challenges and adopt essential technologies.

[1 CPE] The Intersection of AI and Cybersecurity

  Presented by Gregory Pepper, Security Architect • Check Point

As artificial intelligence (AI) permeates our lives, it’s crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.

[1 CPE] Moving to Agile at Gonzaga: Lessons Learned

  Presented by Borre Ulrichsen • Chief Information Officer, Gonzaga University

Gonzaga is seeing an increasing need for flexibility and agility in implementing and supporting information technology in a higher education environment that is constantly evolving. In this session, Borre Ulrichsen, Chief Information Officer, will cover the drivers behind Gonzaga’s transition to agile, how information technology worked with the community during the transition, and some of the benefits the university is reaping from this new way of working.

Borre Ulrichsen has served as the Chief Information Officer at Gonzaga University since August 2016. From 2011 to 2016 he was the Chief Information Officer and Associate Vice President for IT Services at California State University, East Bay. From 2002 to 2011, he was the Director of Information Systems Projects at San Francisco State University. Previous to that he held various IT leadership roles in the private sector. Borre completed his MBA at the Haas School of Business at UC Berkeley. He also earned a master’s degree in engineering from the Norwegian University of Science and Technology.

[1 CPE] AI Unleashed: Navigating the AI Landscape for Responsible Adoption

  Presented by Hunter Helfgott, AI Adoption Specialist, & Kevin Heide, Director of Technical Sales • Cerium Networks

In today’s digital era, AI is not just a buzzword but a robust toolset that, when wielded with precision, can unlock unprecedented value and competitive advantage. As we embark on this journey, we must anchor our strategies in the bedrock of security, ensuring that our AI systems not only enhance our capabilities but also safeguard our assets. This presentation explores practical steps to weave AI into our business fabric, turning challenges into a springboard for growth and innovation. Our goal is to present you with concepts and avenues to consider as you learn to navigate your adoption. Let’s embark on this journey to harness AI’s potential responsibly and effectively.