[1 CPE] AI-Powered Security First Unified SASE (Secure Access Service Edge)

  Presented by HPE Aruba Networking & Structured

As the traditional security perimeter continues to dissolve, traditional networking and security architectures are now insufficient.

Over the last year, many IT leaders have embraced a Secure Access Service Edge (SASE) framework to enable faster and more secure connectivity across their global organizations. SASE converges the functions of network and security solutions into a single, cloud-native service that delivers consistent connectivity and security from everywhere.

[1 CPE] Fireside Chat for IT Leaders

  Presented by INTERFACE Advisory Council

Is your network secure? Have you tested your backups? Are there any third-party risk issues? These are all basic questions thrown at IT leaders every day. The challenges continue to grow as you need to keep a staff intact, remain on operating budget, and keep your company secure.

Join the INTERFACE Advisory Council for an open discussion on all the challenges that IT Directors and Managers face. This peer-to-peer session is designed to share ideas on how to be a better leader while managing your own work-life balance properly. We will host an open discussion to try and share success stories, and maybe some failures as well. Come network with others that face the same challenges you do.

Speakers:

  • Chris Letterman, Chief Information Officer, Bartlett Regional Hospital
  • Bronn Salmon, Chief Information Officer, Sunshine Community Health Center

[1 CPE] AI and Organizational Trust: Safeguarding Against Risks with Responsible Use

  Presented by Phillip Jackson, Chief Information Officer • Arctic IT

AI is rapidly becoming critical for organizational success, but with game-changing advancements in technology comes the immediate need for leaders to balance governance with trust within their organizations. Our presentation, AI and Organizational Trust: Safeguarding Against Risks with Responsible Use, offers insights on mitigating risks associated with AI implementation. Understand the components of organizational trust and for strategies to safeguard your AI use against bias, privacy concerns, and security threats. This session equips business leaders with essential knowledge and actionable steps to foster trust in AI systems by presenting how you can:

  • Enhance efficiencies
  • Make data-driven decisions
  • Improve your customer experience
  • Empower product enhancement

Join us in shaping a future where AI serves as a catalyst for innovation while upholding ethics and trust for our organizations.

[1 CPE] The Intersection of AI and Cybersecurity

  Presented by Dan Hackney, Security Architect • Check Point

As artificial intelligence (AI) permeates our lives, it’s crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.

[1 CPE] Full Stack Observability: What It Is and Why It Matters

  Presented by Joe Byrne, Executive CTO • Cisco

What is full stack observability (FSO) and why should I care about it? Applications are essential to almost every action we take today. Making a purchase, signing up for insurance, communicating with your doctor… these are all daily activities for most of us and we expect the applications to work. Not just work, but work well, whenever I want, wherever I am on whatever device I’m using. This is the state of things for our customers and our employees. As technologists, our attempts to make our user’s experience intuitive, simple, and reliable really make things more complex for us. The amount of telemetry available across the application ecosystem is huge and growing by the day. How do we manage it? How can we ensure an optimized experience for our users? These are the topics we will discuss in this session.

[1 CPE] Foundations of Cybersecurity

  Presented by Mark Breunig & Troy Lofven • CISA

Cybersecurity is comprised of many aspects and fields. To build into the more advanced defenses, every organization must first develop a solid foundation in each area. This presentation will touch on the practical steps necessary to begin that approach.

Speakers:

  • Mark Breunig, Alaska Cybersecurity State Coordinator
  • Troy Lofven, Cybersecurity Advisor

Mark Breunig is the Cybersecurity State Coordinator in Alaska, representing the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). CISA serves as the nation’s risk advisor and collaborates with industry and government partners to strengthen the resilience of the nation’s critical infrastructure against cyber and physical risks. In this role, Mr. Breunig is a cybersecurity liaison between state and local government officials, critical infrastructure stakeholders, and the federal government and provides strategic planning, threat awareness, risk management advice, and incident response coordination.

Prior to joining CISA, Mr. Breunig served as the Chief Information Security Officer for the State of Alaska for two and a half years. As the Chief Information Security Officer, Mr. Breunig was responsible for strategic planning and design of the State’s cyber defense posture and operational management of the State Security Office. The State Security Office provided cyber security services for all departments within the State Executive branch. Prior to his role as the Alaska Chief Information Security Officer, Mr. Breunig was the IT Compliance Officer for the Municipality of Anchorage. He was responsible for the security of over 12,000 endpoints throughout the municipality and also oversaw the Records Management Office.

Overall, Mr. Breunig has more than two decades of professional experience in cybersecurity and information assurance in the government and private sectors.

[1 CPE] Beyond the Backup: A Look into Resiliency Program Development

  Presented by Jason Tupeck, BCDR Consultant • CompuNet

The presentation “Beyond the Backup: A Look into Resiliency Program Development” delves into the intricacies of building a robust resiliency program beyond traditional backup strategies. It explores the spectrum of disruptive events, from large-scale disasters to smaller, potentially more frequent disruptions, and emphasizes the importance of a comprehensive framework for efficient response and recovery. The talk will cover key areas surrounding the “Four Ps”, offering insights into developing a mature resiliency program, emphasizing the importance of prioritization, planning, preparation, and practice as critical steps to enhancing an organization’s ability to navigate through and recover from various disruptions.

[1 CPE] AI: Friend or Foe? An Open Discussion With Your Colleagues

  Presented by INTERFACE Advisory Council

Artificial Intelligence has made a mark already and its use will only continue to expand. Are we fully prepared to embrace AI in our workplaces? Viewpoints differ on how widely AI should be used at this point. Commonly used applications and software now include AI capabilities as a part of their standard offerings. How is this governed in your company? Do you even have an AI policy drafted?

Join the INTERFACE Advisory Council for an open discussion on all things AI. We will cover the risks associated with using AI –– and the risk of NOT using it. What knowledge do you need right now? Bring your questions as we explore the starting points that every IT department needs to consider for an effective AI policy.

Panelists:

  • Mark Merchant, Chief Information Security Officer, Municipality of Anchorage
  • Tamara Serr, Director, Information Services & Cyber Security, Central Peninsula Hospital
  • Benjamin Shier, Chief Information Technology Officer, University of Alaska Anchorage
  • Bill Smith, Chief Information Officer, State of Alaska

[1 CPE] Securing the Future: Cyber Insurance and Cybersecurity Strategies for 2024

  Presented by Andrew Livingston, Cyber Security Specialist • Sentinel Technologies

In the dynamic and interconnected digital era of 2024, the landscape of cyber threats continuously evolves, posing unprecedented challenges to businesses worldwide. “Securing the Future: Cyber Insurance and Cybersecurity Strategies for 2024” delves into the intricacies of cyber insurance as a pivotal component of modern business risk management. This presentation offers a thorough exploration of the latest trends in cyber threats that businesses face, such as sophisticated AI-driven attacks, the proliferation of ransomware, and the vulnerabilities introduced by emerging technologies. It highlights the critical challenges that could lead to the denial of cyber insurance claims and potential loss of coverage, emphasizing the importance of compliance, accurate representation of cybersecurity measures, and prompt incident reporting.

Furthermore, the presentation shifts focus towards proactive strategies for enhancing an organization’s cybersecurity posture. It outlines actionable tips for businesses to not only fortify their defenses against cyber threats but also to positively influence their cyber insurance rates. Through a blend of expert insights and practical guidance, the audience will learn about the significance of regular risk assessments, the adoption of multi-factor authentication, encryption, endpoint security, and the development of robust incident response plans. We’ll discuss:

  • Insights into the evolving cyber threat landscape in 2024.
  • Common pitfalls leading to cyber insurance claim denials.
  • Strategies for enhancing cybersecurity measures to favorably impact insurance rates.
  • The future outlook of cyber insurance and the role of emerging technologies.

By the conclusion of this presentation, attendees will be equipped with the knowledge to navigate the complexities of cyber insurance and implement comprehensive cybersecurity strategies. This will not only prepare them to mitigate the risks of cyber threats but also optimize their insurance coverage in the face of an ever-changing digital threat landscape.

[1 CPE] Go Hack Yourself: More War Stories from ~50k Pentests

  Presented by Jake Mickley, Sr Sales Engineer • Horizon3.ai

Join Jake Mickley, Senior Sales Engineer at Horizon3.ai, for an eye-opening session where he’ll discuss real-world examples of what NodeZero discovered in networks just like yours. You’ll hear about how fast and easy it is to compromise some of the largest networks in the world – with full domain takeover – often in minutes, and sometimes, without even exploiting a CVE. Discover how autonomous pentesting helps find unknown weaknesses in your infrastructure that could quickly result in ransomware exposure.

During this session, you’ll learn how attackers:

  • Use OSINT and password spraying to takeover systems without ever targeting CVEs.
  • Land and expand with legitimate credentials, then poison assets to take over domains.
  • Find cloud credentials and use them to compromise cloud services.