[1 CPE] Stopping Attacks, Not Your Business: AI & Autonomous Response

  Presented by Darktrace

With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join this session to explore the benefits of Autonomous Response as a must-have that goes beyond ‘defense,’ including real-world threat finds and attack scenarios.

[1 CPE] 2022 Threat Review

  Presented by Malwarebytes

The Malwarebytes 2022 Threat Review is an annual report on the latest threats, attack trends, and privacy breaches impacting individuals, organizations, and national security. Researchers detail threat intelligence across operating systems and examine how privacy has shifted and the ways that cybercriminals and crimes are evolving. With a stronger understanding of the threat landscape, organizations and individuals can make more informed security and cyber-protection decisions.

[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve

Data is expected to grow to 200 ZB by the end of 2025. More data to manage, more data to protect. IDC recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new “1” is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies of it allow for a resilient recovery plan. Your cyber security plan is incomplete without a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us as we share best practices to help keep your data protected and secure with multiple layers of defenses. We will share our perspective on how organizations can simplify the approach of incorporating guidance from NIST’s Cybersecurity Framework into their own environments.

[1 CPE] Top 10 Myths and Misconceptions About Ransomware

  Presented by Bitdefender

2021 was “the year of ransomware.” But so were 2017, 2018, 2019, and 2020 – and so far, 2022 is not very different. Ransomware is no longer a problem discussed only in the cybersecurity and tech communities – it is now a regular topic in mainstream media headlines and executive board meetings.

So why is ransomware such a menace, and why can we not seem to get rid of it? One of the reasons is that we seem to miss the continued evolution of ransomware. We keep preparing for the last war. Ransomware in 2022 is very different than ransomware in 2017, yet we still treat it the same way.

Roy Correa, Enterprise Field Engineer will help you to learn more about:

  • Ransomware evolution and what we need to un-learn to effectively combat it
  • The most common myths, misunderstandings, and misconceptions about ransomware and the threat actors behind it
  • The most effective tips to become more cyber resilient and prevent security incidents from turning into catastrophic breaches

[1 CPE] What is “Universal Zero Trust Network Access” for IT and OT Environment?

  Presented by Airgap

Hybrid workforce is forcing IT to manage two sets of access products for remote work and for in-office work. This inefficiency leads to higher costs, operational complexity of managing duplicate policies, and different experience for on-prem and remote workers. Why must IT organizations deal with VLANs, ACLs, port, 802.1x, NACs and their configurations for when your employees are on-premises versus when the employees are working from remote locations?

In this session, you’ll learn the key principles of Universal Zero Trust Network Access and how a unified stack across hybrid workforce can reduce operational complexities, improve user experience, and reduce downtime for IT and OT organizations.

[1 CPE] Asset Visibility is Foundational to Effective Attack Surface Management

  Presented by Armis

Organizational assets are everywhere, across any network, and with diversified asset types like IT, IoT, OT & IoMT. Today’s organizations struggle to manage this extended attack surface, leaving unseen gaps in risk posture. So why is it that in 2022 organizations still fail to instantly and accurately answer basic questions of what they have, never mind understanding risks and threats across the heavily expanded footprint? Is it the manual effort to find and understand the asset landscape or that existing tools are only focused on a particular asset types like IT? Join Armis for this informative session where we’ll explore what the expanded attack looks like and how to address the increased threat that most organizations face.

[1 CPE] Pure SOC Fury: The Cybersecurity Book of Bad Decisions

  Presented by Arctic Wolf

Join this presentation for insights taken from the frontlines of security operations. The session will draw on experiences and observations from real-world incidents and interesting SOC data points and trends. There are four broad bad decisions that we see being played out, time and again, across cybersecurity and from which everyone can and should learn. Arctic Wolf will show how a focus on Security Operations aligned with outcomes that matter to you will position you to start your journey toward ending your cyber risk.

[1 CPE] Why Smart Cities Are Safer Cities Thanks to Real-Time Data and AI

  Presented by iT1 Source & Wireless Guardian

Intelligent technology helps public safety organizations gain a holistic understanding of their cities, deepen public confidence and strengthen community connections. This session will explain the relationship the using Real-Time Data and Artificial Intelligence to create safer, more resilient communities. As part of the discussion, the presenter will explain the following:

  • Data and AI are helpful in real-time response
  • Data and AI are also reshaping long-term public safety processes
  • How smart safety technologies aid in environmental monitoring, emergency management and other situations
  • How smart technology pulls in signals from an array of sources across cities

The presenter will also stress public safety isn’t a top-down hierarchy. It’s actually a collective effort that prioritizes the needs of the community and depends on strong relationships. By realizing the future of public safety, smart city technology transforms the ability to serve local communities.

[1 CPE] Zero-Trust Architectures

  Presented by Rubrik

Organizations have invested heavily in IT security, attempting to fortify their perimeter, network, endpoint, and application protections. Despite these investments, hackers are successfully penetrating these defenses and targeting enterprise data, including backup data. Ransomware is starting to specifically target online backups by encrypting or deleting them. If your organization was the target of an attack today, how do you know what data was impacted and where? Manually sifting through millions of files and comparing each snapshot consumes FTE time and prolongs recovery exponentially. Mass restores of the entire environment could mean high data loss and weeks’ worth of work down the drain. In this session, we will discuss how to protect your last line of defense, the backups. We will walk through the anatomy of a recovery, the best practices, and advanced tools to ensure you will not have to pay a ransom, and how to quickly recover your data to continue business operations.