[1 CPE] Work Smarter, Not Harder: How to Choose the Best Partners

  Presented by Zane Smith, Principle Solutions Architect • Tech Heads

Want to know the secret to gaining expertise in cybersecurity, AI, digital transformation, cloud migration, and more? The secret is: you don’t have to become an expert in these areas – you just have to become an expert in picking the right partner. Learn from an IT Industry veteran and CISSP-certified cybersecurity expert about the top 5 criteria for selecting the right external partner, ensuring your team focuses on innovation, not information overload or fire-fighting. Elevate your strategy, empower your team, and don’t miss out on this game-changing session – your IT leadership success starts here!

[1 CPE] Unveiling the Power of Zero Trust: Unlocking Business Value & Building Resilience

  Presented by Optiv & Akamai

Join us for an enlightening fireside chat as we delve into the realm of Zero Trust security architecture. Discover how Zero Trust principles can revolutionize your organization’s cybersecurity approach, mitigate risks, and drive tangible business outcomes. Our expert panelists will demystify Zero Trust, offering actionable insights and strategies to harness its full potential in today’s dynamic threat landscape.

Speakers:

  • Dan Brown, Technical Director, Optiv
  • Umar Carter, Sr Security Advisor, Optiv
  • Tony Lauro, Director of Security Technology & Strategy, Akamai

[1 CPE] Global Insights on Identity Security Maturity: Why it Matters? Why Now?

  Presented by Brian Roberts, Sr Solutions Engineer • CyberArk

In our global survey of 1,500 identity-related security experts, we found only 9% of organizations have the highest level of maturity. These Transformative organizations have the most mature identity security programs as they strategically focus on four key tenets: tools, integration, automation, and continuous threat detection & response. As a result, these organizations significantly outperform their competition in driving business outcomes and reducing risk. Learn how you can mature your identity security program because the future of security starts with identity.

Key Session Takeaways:

  • Top challenges for identity security
  • The four tenets of identity security
  • How to take a holistic approach to identity security
  • Key considerations in evaluating identity security providers

Brian Roberts is a motivated, technically-minded individual with 12 years of solutions engineering experience ranging from backup and disaster recovery to identity security. He primarily focuses on Privilege Access Management and Least Privilege Enforcement with self-hosted and cloud assets.

[1 CPE] A Review of FRSecure’s 2023 Annual Information Security Report

  Presented by Dave Tuckman, Information Security Consultant • FRSecure

FRSecure (an Information Security company located in Edina, MN) took the results of +/- 400 Validated Information Security Assessments and 55 Incident Response Engagements conducted in 2022 and created an anonymized report from the data called: The State of Information Security. Full details and access to the report are available here: https://frsecure.com/2023-annual-infosec-report/

In this presentation, FRSecure Information Security Consultant Dave Tuckman will highlight key findings in the report, and what we can learn from it.

Understand how you can mitigate risk going forward to protect your business and clients in an ever-changing threat landscape. Dave will provide additional perspective on how you can leverage this information for a better understanding of your third-party (supply, vendor, contractor) relationships.

Topics include:

  • FRSecure’s Annual State of InfoSec Report, informed by over 400 validated security assessments
  • Where organizations are getting it right vs. falling behind
  • How you can use this report to inform your own business’s security decisions
  • How you can use this report to inform your business’s Third-Party Risk Management

[1 CPE] Addressing Cybersecurity Concerns for Critical Infrastructure Organizations

  Presented by Leslie Ann Kainoa, Oregon Cybersecurity State Coordinator • CISA

In this session, we will address the current cybersecurity threats and critical infrastructure stakeholder concerns. We will focus on under-discussed topics, including how to address resource constraints and organizational dependencies. We will also review CISA’s recommended best practices and offer guidance for how all critical infrastructure organizations can effectively leverage CISA resources.

Leslie Ann Kainoa is the Oregon Cybersecurity State Coordinator for the Cybersecurity and Infrastructure Security Agency (CISA), Region 10. In her current role, Leslie provides cybersecurity assistance and support to public and private Critical Infrastructure sectors throughout the State. She is focused on working with these organizations to improve cybersecurity and critical infrastructure resilience.

[1 CPE] 2024 Global CISO Predictions

  Presented by Greg Pepper, Security Architect • Check Point

Join this session to leverage strategic, evidence-backed insights from top voices in the field. Tap into the expertise of seasoned professionals to untangle complexity and stay ahead of the curve. In this must-attend CISO session, discover how to keep up with artificial intelligence trends, cloud security challenges, and cyber security solutions that can cancel attacks faster than you can say ‘distinctive cyber-readiness’.

Greg Pepper, Security Architect, will share reflections on 2023 and identify a variety of key cyber threats and cybercriminal tactics that could influence your cybersecurity plans in the year ahead.

Gregory (Greg) Pepper is a Senior Architect and a Check Point Evangelist. Greg has been an IT professional for 20+ years with expertise in Security, Networking & Cloud Computing. At Check Point, Greg’s main focus is to work with customers, partners and Check Point employees to help plan, design and implement security solutions across their networks, clouds, endpoints & mobile devices. Greg has been involved with a significant number of our of major cloud migrations and transformation across some of the largest Enterprise, Commercial and Public Sector Customers. Prior to Check Point, Greg has worked at well-known companies like Sony, Cisco and Price Waterhouse Coopers and Organic. Greg holds a Bachelor of Business Administration from Emory University – Class of 1998.

[1 CPE] Data Security: Challenge Met Through Immutable Storage

  Presented by Isaac Story, Data Intelligence Sales Specialist • Hitachi Vantara

In a world with increasingly complex attacks being carried out on enterprise data assets, immutable storage is becoming a powerful defense against data breaches and Ransomware. Learn how customers are using this age-old technology that has come of age with more adaptable access options and increasing application integrations.

Isaac Story is a Data Intelligence Specialist with Hitachi Vantara. He has over 23 years of experience in IT infrastructure with a specific focus on advanced and emerging storage technologies including object storage and high-speed parallel file systems.

[1 CPE] Intelligent SSE: Secure Everything from Anywhere

  Presented by Matt Senechal, Regional Sales Manager • Netskope

This session will provide a technical overview of Security Service Edge (SSE), focused on the following topics:

  • Unintentional or unapproved data movement
  • Data protection for internal and external threats
  • Conditional and contextual access to safely enable cloud & SaaS applications
  • Protection from cloud-enabled SaaS and web threats
  • Work from anywhere with a secure, fast experience

You will walk away understanding the fundamentals of SSE and how it will benefit your business.

[1 CPE] Zero Trust Microsegmentation: It’s Easier Than You Think

  Presented by Tony Steffe, Sr Systems Engineer, CISSP • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

Tony is a knowledgeable technical professional with 20+ years of experience developing, selling, and integrating technology for enterprise customers. He is effective in sales engineering, Internet security, project management, computer networking, and interpersonal relations. Exceptional at managing the personal and technical challenges that arise from building something new, Tony has successfully built out several high-impact IT projects.