[1 CPE] Rethinking Your Data Strategy with Zero Trust Privacy

  Presented by Dr. Lisa McKee Ph.D., CISA, CDPSE, CRISC • Director of Governance, Risk, Compliance, and Privacy, Hudl

At the foundation of Zero Trust Privacy, should be data – and for good reason! Organizations that have visibility into their data and the activities around it are better equipped to implement a successful privacy program using the principles of zero trust. Many believe identity is the core principle of zero trust, but how does one implement effective access controls without knowing the data they are granting permissions to? Zero Trust Privacy supports privacy compliance while enabling the implementation of proper access controls to detect suspicious behavior, even when other security controls have been compromised.

The key points covered in this presentation will be as follows:

  • Understand what Zero Trust Privacy is and why data should be the foundation of any security and privacy program.
  • Identify methods for coordination and collaboration between privacy and security within a Zero Trust strategy.
  • Execute techniques for implementing and overcoming challenges of integrating Zero Trust Privacy.
  • Initiate discussions with organizational stakeholders on steps for creating a Zero Trust Privacy strategy for their organization.

Lisa McKee Ph.D., CISA, CDPSE, CRISC, has 20 years of industry experience in Cybersecurity, Privacy, Information Technology, Vendor Management, Software Development, IT Audit, Compliance, PCI, and GRC. McKee assists companies in conducting security and privacy assessments, program implementation, and managing compliance. She is a highly regarded privacy expert and a regularly featured speaker at conferences and events locally, nationally, and globally for IAPP, ISACA, IIA, ISC2, NEbraskaCERT, and RSAC. McKee is a member of the Accredited Standards Committee X9 providing input on industry standards. She is a member of several professional association boards and an adjunct instructor for security and privacy courses. She is passionate about privacy and security.

[1 CPE] Shifting Your Workforce Strategy to Support Your Growing Organization

  Presented by IP Pathways

The technology landscape continues to evolve. Finding cloud talent to architect & build a custom solution continues to be challenging and even harder to retain. Lead times for hardware continue to increase making it hard to support growing businesses. During this session, we will outline the trends being used to supplement your workforce strategy.

[1 CPE] Open-Source Developers Are Security’s New Front Line

  Presented by Sonatype

Bad actors have recognized the power of open source and are now beginning to create their own attack opportunities. This new form of assault, where OSS project credentials are compromised and malicious code is intentionally injected into open-source libraries, allows hackers to poison the well. In this session, Sonatype will explain how both security and developers must work together to stop this trend or risk losing the entire open-source ecosystem.

[1 CPE] Scaling Network Infrastructure: From the Remote Employee to The Corporate Office

  Presented by Pine Cove Consulting

In the world we live in, employees are now working from home. However, that does not mean they do not need adequate network infrastructure, so their workday runs smoothly. During this presentation, we will talk about how to implement network devices like servers, on a very small scale like a home office, and how networking technology changes when scaling up to fit a larger space and more employees, like the corporate office.

[1 CPE] Navigating Today’s Threat Landscape: A Current State of Cybersecurity

  Presented by Fortinet

Join Fortinet for comprehensive look at the current state of cybersecurity. Today’s ever-evolving threat landscape requires an integrated, automated approach to security. Learn how you can mitigate risk in your organization, optimize your security team’s operations, and gain best practices to integrate and consolidate your security tools; whether you’ve taken a multi-vendor or single-vendor approach.

After leaving our session, you will understand:

  • More about the current state of cybersecurity and how it relates to your business
  • How to scale company growth while securing against constantly evolving threat vectors
  • How your security tools should ideally be integrating with each other and automating security functions
  • Best practices to optimize security
  • How to consolidate security controls to improve your security posture

[1 CPE] Secure Device Onboarding with Cloudpath

  Presented by Pine Cove & Ruckus

Cloudpath provisions digital certificates to your users’ devices, providing the highest level of wireless security. You gain visibility and control over which devices are on the network and can define and manage policies so every user sees only the network resources they should see. Company-issued devices can be automatically connected to the network, and Cloudpath also provides an intuitive self-service portal for BYOD. It associates every device with a user, and you can easily revoke access at any time—for example, when a BYOD user leaves the organization. The service supports any Wi-Fi enabled device, including headless and IoT devices. Cloudpath supports all major wireless vendors, and white glove service is available for a turn-key solution.

[1 CPE] Securing Layer 8

  Presented by Synack

One of the most difficult challenges globally is securing the human element and as such, it tends to be neglected. The current solution of training with “gotcha” emails is not successful and tends to cause unintended negative consequences. We will investigate a more global approach to securing businesses by taking on the “business of hacking.” We’ll show how we can harden the human element and expand our footprint by using a better way to learn and widening our defenses. The key is to ensure we also harden society to help drive the ROI for attackers up enough that business is no longer profitable, forcing them into the technology fight in which, as an industry, security professionals have much more secure footing.

[1 CPE] Aruba User Experience Insight (UXI)

  Presented by Structured & Aruba Networks

Aruba User Experience Insight (UXI) is a cloud-based application performance monitoring solution that validates network health and troubleshoots problems that affect day-to-day user experience. Ideal for campus and branch environments alike, UXI assumes the role of an end-user, evaluating the performance, connectivity, and responsiveness of network infrastructure and applications.

[1 CPE] SOC Transformation

  Presented by Structured & Palo Alto Networks

Ransomware is on the rise and cyberattacks are getting more sophisticated. Despite investments in infrastructure security tools, cybercriminals are still getting through to the data. And when they take the data down, they take down the entire organization—and hold it for ransom or exfiltration. As the importance of data grows, we need to trust our data is safe and resilient, no matter where it resides. It’s time for a new approach.