[1 CPE] Protecting Your Data from Ransomware Where it Lives: Your Last Line of Defense

  Presented by Hitachi Vantara

If an attack happens and it makes it all the way to your data, then they have already broken through all of your walls. Where your data lives IS your last line of defense, which is why the Armed Forces that protects the USA trusts Hitachi to protect them. Prevention is great and all but without that last line of defense, you’re a sitting duck. Attend this session to learn how Hitachi serves as your last line of defense against ransomware attacks.

[1 CPE] Automate or Die: DevSecOps in the Age of Software Supply Chain Attacks

  Presented by Sonatype

As nimble organizations deliver new innovations, adversaries are also upping their game; something we’ve seen in recent high-profile and devastating cyber-attacks. Bad actors have the intent and ability to exploit security vulnerabilities in the software supply chain – and in some cases plant vulnerabilities themselves. They have increased scale through automation and improved breach success through precision targeting. If we don’t fight back by doing the same – automating security directly in the DevOps pipeline – then we’ll always be at the hackers’ mercy. This session will provide new research on the above and details on how to get started.

Key takeaways:

  • Real-world examples of how large and small companies are implementing DevSecOps practices in their own delivery pipelines and increasing developer awareness of risks
  • A walkthrough of how security principles have been automated into a CICD pipeline and what standards for implementation are beginning to follow suit
  • Why DevSecOps is more than a buzzword and why it’s vital to protecting your software supply chain
  • How automating the security of policies makes it harder to ignore

[1 CPE] E911 Laws and Regulations: What You Need to Know

  Presented by CompuNet

The details of this presentation will be available soon. Join this session to gain an understanding of Emergency Services Laws and Regulations.

CompuNet is an IT systems integrator and service provider, with 8 offices in the NW. Our approach is to understand our clients’ business needs, engineer IT solutions that precisely fit those needs, and deploy those solutions on time and on budget.

[1 CPE] Migrating to a Multi-Cloud Environment: A Non-idealistic Approach

  Presented by Cerium Networks

Multi-Cloud. A new buzzword? Or a path of digital transformation on which many have unknowingly already embarked?

During this session, we will explore the definition of “”Multi-Cloud””, the maturity level of various providers – including your private cloud(s), and the competencies required to manage mission-critical applications in these cloud(s). We will review multiple migration and consumption models as well as business outcomes. The move to Multi-Cloud deployment is a strategy generally explored for greater efficiency, greater flexibility, and reduced complexity. However, these deployments often include increased compliance and security requirements, potentially additional cost, and certainly a new skill set which may not exist within your organization. We will explore these topics and more in our discussion on migrating a data center to a Multi-Cloud environment.

[1 CPE] Hacking Like a White Hat Wizard

  Presented by Check Point

Harry Potter-themed talk track about the similarities of Magic and Hacking and some of the more magical moments from Check Point Research from 2021. Discussing companies turning a blind eye to cybercrime: “If you ignore it, if you don’t learn about it, you won’t be able to protect yourself from it.”

David Hobbs currently serves in the Office of the CTO at Check Point while also managing Security Engineering in the Pacific Northwest. With over 25 years of experience, David has served as a consultant to numerous Federal and State Agencies, including the FBI, US Army Counterintelligence, Secret Service, and many private investigation companies.

David is certified on several technology platforms including Firewalls, IPS/IDS, UTM, Malware Prevention, and Encryption technologies, and has a deep understanding of security and networking overall. In addition to his technical expertise, David served as an expert in several practice areas including exploit research, penetration testing, forensic investigation, security countermeasures, wireless and radio security, social engineering, and compliance. David has taught ethical hacking to some of the largest national organizations and has been published in many articles and publications.

[1 CPE] Stopping Attacks, Not Your Business: AI & Autonomous Response

  Presented by Darktrace

With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join this session to explore the benefits of Autonomous Response as a must-have that goes beyond ‘defense,’ including real-world threat finds and attack scenarios.

[1 CPE] INNOVATION—Alive and Well in Idaho?

  Presented by Jay Larsen • President, Idaho Technology Council

The purpose of a business is to create and maintain a customer. Idaho businesses need to focus on innovative disruption to meet their customers’ demands today and more importantly, in the future. How are Idaho companies doing with innovation and technology and is Idaho on the upswing?

Jay Larsen is the founder and CEO/President of the Idaho Technology Council, a private sector organization focused on developing the innovative ecosystem in Idaho and helping technology in Idaho and the region start, grow, and thrive. Larsen is a native Idahoan who obtained his BA from Brigham Young University and his MBA from Boise State University.

Telecommunication has been the industry where Jay has spent 22 years of his career, with start-up long-distance companies, and has managed and led teams with US WEST Cellular, AirTouch Cellular, Qwest Communication, and Verizon Wireless in Idaho, Montana, Wyoming, New Mexico, and Utah. During these 22 years, Larsen led teams pioneering and implementing new wireless technologies. He also managed several mergers and acquisitions. He has served on a U.S. Congressman’s staff as Director of Economic Development.

Jay’s key areas of focus are organizational development, marketing, networks, innovation, and leadership. He has served on several boards focused on helping further Idaho talent and the development of innovation. Some of these boards are Idaho Workforce Development Council, Idaho Strategic Energy Alliance, Boise State University CS Industry Advisory Board, Boise State University Foundation Board, Bronco Athletic Association, Boise State University College of Business and Economics Industry Advisory Board, INBRE Advisory Board, Idaho K-12 CS Leadership Team. Larsen has coached several sports teams and lives in Boise, Idaho with his wife (who has been blessed with four sons) and their Jack Russell terrier.

[1 CPE] The InfoSec Talent Shortage That Wasn’t

  Presented by Critical Start

The experts agree: there isn’t nearly enough cyber security talent out there. But what if all the experts, news stories, conference talks, and board room conversations are wrong? What if there is more than enough cyber security talent to get organizations what they need to be successful, secure, and in a reasonable budget? In this presentation, Critical Start’s Senior Security Consultant, Alex Humphrey, will discuss ways to hire, train, and retain great cyber security talent, move business objectives forward, and keep the organization secure – all without breaking the bank.

[1 CPE] Shifting Security Left: DevSecOps

  Presented by Optiv

The ever-increasing pace and pressure for developers to ship code aren’t going to slow, and within many organizations, security is often an afterthought. The impact is products that have security bolted on at the end, impacting user experience, frustrating developers and security engineers, all while leaving security vulnerabilities open for exploiting. Organizations must find ways to meet security requirements while not causing the development teams to get bogged down and delay code delivery.

Ed Lewis, Orchestration and Automation Practice Director at Optiv, will share strategies and approaches his clients use to address common DevSecOps challenges such as poor security collaboration between siloed teams, scaling secrets management, limited automation, tool and process redundancies, and more.

[1 CPE] The Journey of Your Cybersecurity Infrastructure and Practice

  Presented by Fortinet

Many questions come to mind when looking at how and what to focus on and prioritize when you wish to security your company’s IT infrastructure from the Bad Actors. How do you know what to choose and when? What’s your best value for your investment? How does this evolve to keep up with the ever-changing cybersecurity space? What does a basic roadmap look like? Learn how to start the process and address these concerns, get ideas for yourself to allow you a future plan to secure your IT space, whether its on-premises, co-located, in the Cloud, SaaS, or a workforce of mobile/remote employees.