[1 CPE] Practice Good Cyber Hygiene: Adopt a Framework to Protect Your Enterprise

  Presented by CompuNet

A cybersecurity framework helps businesses develop a structured approach to securing their systems. This session will focus on the practical implementation of security measures; how to prioritize and get the maximum benefit from your resources. The discussion will be framed around the Center for Internet Security’s Critical Controls, although several frameworks will be briefly discussed. The focus will be on protecting against ransomware while still taking a holistic approach. The discussion will be directed from the management or IT governance direction rather than from an engineering or systems approach.

[1 CPE] Is DDoS a Crime?

  Presented by Radware

2022 has a serious “DDoS is a not a crime” vibe. A little over two months ago, performing Distributed Denial-of-Service (DDoS) attacks was not without consequences. Today, because of recent escalations in conflict, a more significant percentage of the general public believes that DDoS attacks are not a crime if they are morally aligned and part of a socially acceptable operation. But is this true? ….and what led to this current perception?

[1 CPE] Disrupting the Means to Prevent the End: A Guide to Detecting Ransomware

  Presented by Red Canary

Ransomware has been a dominant cybersecurity threat for the better part of the last decade. However, it doesn’t walk alone. It’s almost always the eventual payload delivered by earlier-stage malicious software or activity. Luckily, if you can detect the threats that deliver the ransomware, you can stop the ransomware before it arrives.

In this talk, we’ll extensively reference Red Canary’s 2022 Threat Detection Report, examining the malware and other malicious tools that adversaries often use to deliver ransomware. While the specific trojans and strains of ransomware may change from one attack to the next, adversary tactics, techniques, and procedures are often similar across campaigns and threats. By developing robust detection coverage for the techniques adversaries abuse most often, rather than focusing on individual threats, security teams can achieve defense-in-depth against the many threats that leverage those techniques and the broader trends that dominate the infosec landscape.

Want to learn more about the prevalent adversary techniques and threats that can lead to a ransomware infection? Attendees will leave with:

  • A better understanding of the threats and tools that commonly precede a ransomware infection
  • Guidance on relevant collection and data sources that offer visibility into the threats and techniques that adversaries use to deliver ransomware
  • Actionable information on how security teams can develop the capacity to detect, prevent, and mitigate ransomware and other threats
  • Strategies for testing their ability to observe and detect common threats with free and easy-to-use tools like Atomic Red Team

[1 CPE] 2022 Threat Review

  Presented by Malwarebytes

The Malwarebytes 2022 Threat Review is an annual report on the latest threats, attack trends, and privacy breaches impacting individuals, organizations, and national security. Researchers detail threat intelligence across operating systems and examine how privacy has shifted and the ways that cybercriminals and crimes are evolving. With a stronger understanding of the threat landscape, organizations and individuals can make more informed security and cyber-protection decisions.

[1 CPE] Should I Stay, or Should I Go?

  Presented by INTERFACE Advisory Council • Panel Discussion

Over the past year, the professional workforce has dealt with extensive turnover. In what is being labeled “The Great Resignation,” employees are vacating roles en masse, sometimes with no future employment lined up. There are many reasons why this is happening. Employees report their priorities changed following the pandemic of 2020 and the coinciding lockdown. All of this has brought challenges for Managers and Directors across industries.

In the IT industry, shops are struggling to maintain needed levels of staffing. With so many IT jobs capable of remote working, IT staffers are taking positions at out-of-market companies with higher salaries. Across the country, there are examples of employees moving to a preferred destination while working a remote job. For IT leaders in New Mexico, there is an ongoing challenge to maintain needed staffing levels and provide proper service.

Join a group of distinguished local IT leaders for an open discussion on the challenges of staffing and supporting current employees.

Panelists:

  • Jose Diaz, Director, Information Services, Gerald Champion Regional Medical Center
  • Steve Cox, Director, Information Technology, The Downs Casino and Racetrack
  • Aaron Frankel, Information Security Officer, TriCore Reference Laboratories
  • Mike Kelley, Chief Information Officer, Mesilla Valley Transportation
  • Dee Skinner, Director, IT Services, Haverland Carter LifeStyle Group

[1 CPE] Challenge the Threat of Ransomware: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Ransomware attacks continue to rise in volume, severity, and costs to businesses attacked while cyber criminals continue inventing new and unexpected methods to spread malware and encrypt critical data. As attacks continue to specialize, no organization is immune to ransomware. So how do you avoid being forced to pay a ransom, disruptions to services and supply chains, and damage to your brand in the news? Join recovery and data protection experts from Zerto to discuss best practices for when – not if – ransomware strikes. Be prepared to minimize downtime, data loss, and mitigate the risks of ransomware. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • Steps you can take to reduce the likelihood of attacks on your system
  • How to choose a best-in-class recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recover quickly
  • Real example of a company hit twice by ransomware and how they improved recovery time from weeks to minutes by planning ahead

[1 CPE] Pure SOC Fury: The Cybersecurity Book of Bad Decisions

  Presented by Arctic Wolf

Join this presentation for insights taken from the frontlines of security operations. The session will draw on experiences and observations from real-world incidents and interesting SOC data points and trends. There are four broad bad decisions that we see being played out, time and again, across cybersecurity and from which everyone can and should learn. Arctic Wolf will show how a focus on Security Operations aligned with outcomes that matter to you will position you to start your journey toward ending your cyber risk.

[1 CPE] How to Affect Tech Policy through Collective Action

  Presented by New Mexico Technology Council

When companies or individual professionals join forces for a common cause, they demonstrate the impact of collection actions. The session will explore the ability of associations, like the New Mexico Technology Council, to mobilize the exceptional talent and wide reach of their members to build a stronger New Mexico. Participants will learn how associations identify the principles and challenges their members have in common and then guide them to solutions. The session demonstrates the essential role collective action plays in improving society and maintaining a thriving tech economy.

[1 CPE] Navigating Today’s Threat Landscape: A Current State of Cybersecurity

  Presented by Fortinet

Join this session for a comprehensive look at the current state of cybersecurity. Today’s ever-evolving threat landscape requires an integrated, automated approach to security. Learn how you can mitigate risk in your organization, optimize your security team’s operations, and gain best practices to integrate and consolidate your security tools; whether you’ve taken a multi-vendor or single-vendor approach.

[1 CPE] Active Defense: Be the Hunter, not the Prey

  Presented by AQUILA

In this session, we’ll discuss Active Defense and why it’s a critical part of any mature security program. Active Defense requires continuous monitoring, threat hunting, and incident response. We will focus specifically on internal threat hunting and monitoring of the dark web. Join to gain an understanding of what active defense is, what threat hunting is, and the wealth of intelligence that can be found on the dark web.