[1 CPE] Navigating Today’s Threat Landscape: A Current State of Cybersecurity

  Presented by Fortinet

Join this session for a comprehensive look at the current state of cybersecurity. Today’s ever-evolving threat landscape requires an integrated, automated approach to security. Learn how you can mitigate risk in your organization, optimize your security team’s operations, and gain best practices to integrate and consolidate your security tools; whether you’ve taken a multi-vendor or single-vendor approach.

[1 CPE] Infrastructure Modernization: Your Foundation for Innovation and Business Agility

  Presented by Hitachi Vantara

Today’s infrastructure must be engineered to support digital innovation, such as accelerating your cloud, applications, and data. The agility, efficiency, and resilience required for new workloads, applications, and requirements are needed for a modernized infrastructure. Join us as we guide you on your infrastructure, application, and data modernization journey so that you can make smart modernization decisions and build Your Cloud, Your Way.

[1 CPE] Stopping Attacks, Not Your Business: AI & Autonomous Response

  Presented by Darktrace

With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join this session to explore the benefits of Autonomous Response as a must-have that goes beyond ‘defense,’ including real-world threat finds and attack scenarios.

[1 CPE] Building a Modern Cyber Security Program: Zero Trust

  Presented by Sanity Solutions

Join Chad Schamberger, Director of Cyber Security at Sanity Solutions, to discuss key guidelines for incorporating Zero Trust into your existing security posture. In this session, you’ll learn about enabling controls that follow the 7 disciplines of a Modern Cyber Security Program that will establish a Zero Trust Security Model.

[1 CPE] Disrupting the Means to Prevent the End: A Guide to Detecting Ransomware

  Presented by Red Canary

Ransomware has been a dominant cybersecurity threat for the better part of the last decade. However, it doesn’t walk alone. It’s almost always the eventual payload delivered by earlier-stage malicious software or activity. Luckily, if you can detect the threats that deliver the ransomware, you can stop the ransomware before it arrives.

In this talk, we’ll extensively reference Red Canary’s 2022 Threat Detection Report, examining the malware and other malicious tools that adversaries often use to deliver ransomware. While the specific trojans and strains of ransomware may change from one attack to the next, adversary tactics, techniques, and procedures are often similar across campaigns and threats. By developing robust detection coverage for the techniques adversaries abuse most often, rather than focusing on individual threats, security teams can achieve defense-in-depth against the many threats that leverage those techniques and the broader trends that dominate the infosec landscape.

Want to learn more about the prevalent adversary techniques and threats that can lead to a ransomware infection? Attendees will leave with:

  • A better understanding of the threats and tools that commonly precede a ransomware infection
  • Guidance on relevant collection and data sources that offer visibility into the threats and techniques that adversaries use to deliver ransomware
  • Actionable information on how security teams can develop the capacity to detect, prevent, and mitigate ransomware and other threats
  • Strategies for testing their ability to observe and detect common threats with free and easy-to-use tools like Atomic Red Team

[1 CPE] Have We Reached the End of the “Internet Frontier”?

  Presented by Tonaquint Data Center

Join Carl Wilkins, Chief Technology Officer for Tonaquint Data Center, for a discussion on what’s left to conquer in our globally connected world.

Carl Wilkins’ passion for IT work began many years ago as a young teenager helping support PeachTree accounting software for family members on Windows 3.11 and MS-DOS. Since then, his computing “clouds” have only grown! Before joining Tonaquint in 2020, he wore the various “hats” of a systems integrator, administrator, architect, and engineer. He has worked in non-profit, higher education, and the financial service sectors. His most recent experience was managing the systems infrastructure, engineering, and operations team of a large, federally-chartered Credit Union. He has a BS in Computer Science from Utah Valley University.

[1 CPE] Visibility is Key: What You Need to Know About Cloud Migrations and Security

  Presented by ReliaQuest

The pace of cloud technologies adoption has left security operations teams scrambling to keep up with the change. Many teams are unsure how best to protect their business as sensitive data and assets move beyond the traditional enterprise perimeter.

Is cloud security different from traditional on-premises security and if so, what should you be aware of? How best should you approach it?

We address these questions and more on how best to secure your cloud environment. We will explore recommendations on how best to secure the world’s top cloud platforms and providers including Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, and multi-cloud environments.

[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve

Data is expected to grow to 200 ZB by the end of 2025. More data to manage, more data to protect. IDC recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new “1” is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies of it allow for a resilient recovery plan. Your cyber security plan is incomplete without a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us as we share best practices to help keep your data protected and secure with multiple layers of defenses. We will share our perspective on how organizations can simplify the approach of incorporating guidance from NIST’s Cybersecurity Framework into their own environments.

[1 CPE] Zero-Trust Architectures

  Presented by Rubrik

Organizations have invested heavily in IT security, attempting to fortify their perimeter, network, endpoint, and application protections. Despite these investments, hackers are successfully penetrating these defenses and targeting enterprise data, including backup data. Ransomware is starting to specifically target online backups by encrypting or deleting them. If your organization was the target of an attack today, how do you know what data was impacted and where? Manually sifting through millions of files and comparing each snapshot consumes FTE time and prolongs recovery exponentially. Mass restores of the entire environment could mean high data loss and weeks’ worth of work down the drain. In this session, we will discuss how to protect your last line of defense, the backups. We will walk through the anatomy of a recovery, the best practices, and advanced tools to ensure you will not have to pay a ransom, and how to quickly recover your data to continue business operations.

[1 CPE] Accidentally Zero Trust

  Presented by Zscaler

Zero Trust is the latest buzz phrase in the industry that promises to be the panacea for the malware and ransomware challenges faced by enterprises today. Shifting to a Zero Trust Architecture strategy, however, can have major business operations benefits that go far beyond information security.

Join Brett James, Director of Transformation Strategy at Zscaler, as he recalls “accidentally” delivering a Zero Trust Architecture strategy for a global engineering and construction company that started life simply as a way to reduce capital expenditure and start using cloud.