[1 CPE] How to Prepare and Respond to Data-Oriented Cyberattacks in Realtime

  Presented by Jonathan Halstuch, Co-Founder and CTO • RackTop Systems with SD3IT

Today’s cyber threats call for a new approach to data security, placing protections closer to the data. In this session, you’ll develop an understanding of why advanced cyber storage solutions are critical for defending production data from theft and destructive cyberattacks like ransomware. Learn strategies for reducing your organization’s threat window with a data-centric zero-trust architecture and artificial intelligence. Improve security and cyber hygiene while embracing the CISA Zero Trust Maturity Model to ensure your organization’s data is defended during each of the three phases of an attack.

Key takeaways:

  • Stay ahead of insider threats, data theft, ransomware, and extortionware with active defense
  • Improve security and cyber hygiene by aligning with the CISA Zero Trust Maturity Model
  • How to involve stakeholders in a data-centric approach to security

[1 CPE] Optimizing Mainframe Environments Against Today’s Cybersecurity Threats

  Presented by Don Pecha, Chief Information Security Officer • FNTS

IBM Z is more modern than you may think. The IBM Mainframe is inherently built around security and quantum proof. Mainframes are still at the core of many businesses. Their mission critical data is secured and runs on a mainframe. Insurance, Finance, Manufacturing, Grocery, and Healthcare among other businesses are still actively leveraging mainframes. How do we know these critical machines are secure?

[1 CPE] Defend Today, Secure Tomorrow

  Presented by Warren Hagelstien • Cybersecurity Advisor, CISA

Join Warren Hagelstien, CISA Cybersecurity Advisor, for a discussion of the evolution of ransomware, beginning with the first reported incident to the present. This presentation will provide a high-level overview of one incident followed by a look at the lessons learned. We’ll close with an introduction to the Department of Homeland Security’s (DHS) youngest agency, the Cybersecurity and Infrastructure Security Agency (CISA), and resources available at “no cost” to State, Local, Tribal, and Territorial Governments and Organizations with Critical Infrastructure.

Mr. Warren Hagelstien serves as a Cybersecurity Advisor for Region 7 (IA, KS, MO, and NE) for CISA in the Integrated Operations Division. Based in Omaha, NE he supports the Department of Homeland Security’s mission of partnering with industry and government to understand and manage risk, strengthening the security and resilience of the nation’s critical infrastructure. Mr. Hagelstien provides cyber preparedness assessments and protective resources, working group support, leadership, partnership in public-private development, and coordination and support in times of cyber threat, disruption, or attack to the nation’s sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities.

Mr. Hagelstien holds a Master of Science in Cybersecurity and a Master of Business Administration from Bellevue University. He also holds a Bachelor of Science degree in Management Information Systems from Bellevue University. He is a member of (ISC)2 and has been a Certified Information System Security Professional (CISSP) in good standing for the past 12 years.

[1 CPE] Educating Your Guesses: How to Quantify Risk and Uncertainty

  Presented by Sara Anstey, Director of Data Analytics and Integration • Novacoast

Asking for budget and justifying spend in cybersecurity departments can be a difficult task due to limited data and high uncertainty of future events. This talk will dive into quantitative risk analysis as it relates to cybersecurity –– how to model uncertain events and understand financial risk. Attendees will see a first-hand demonstration of how quantitative modeling can be used to communicate risk and understand ROI. Attendees will walk away with the tools needed to present cyber risk as a dollar amount that can be easily understood by other business decision-makers at their company.

[1 CPE] Retaining Your IT Staff in Nebraska, Can it Be Done?

  Presented by INTERFACE Advisory Council

“The other company is offering higher wages. I get to work remotely as much as I want and get a four-day workweek. Sorry, but I must take it.” Have you heard this just a few times? So many IT hiring managers are having to find creative ways to keep staff members in-house. While budgets and major company overhauls can’t always be achieved, some methods can help.

Companies throughout Nebraska have challenges in retaining IT staff. Join the INTERFACE Advisory Council for an open conversation on how to keep your local IT staff intact. This panel features local IT hiring managers and leaders dealing with these challenges in their shops. Bring your questions as there will be an opportunity to get advice on your specific needs.

Moderator: Ron Woerner, Professor, Bellevue University

Panelists:

  • Samantha Harvey-Fleeman, Account Director, LinkedIn
  • Rob LaMagna-Reiter, Chief information Security Officer, Hudl
  • Lisa McKee, President, ISACA Omaha

[1 CPE] Thirty Years of Arguing with Adults

  Presented by Paul Dant, Senior Director of Cybersecurity Research • Illumio

In this talk, you’ll hear hilarious stories from a former child hacker that eerily predict the treacherous security landscape of today. Do you want to know why we’re still losing to ransomware? Attend this talk to find out and get insight into how you can start actually solving security problems and prepare your organization for the inevitable breach.

Paul has been coding and hacking since 1987. As a security researcher, he has performed offensive security testing of facilities ranging from nuclear energy plants to hospitals to tent-pole film sets. He’s presented to countless audiences the realities of cyberattacks, the hacker mindset, and new paradigms to address the potentially life-impacting threats we are faced with today.

He is currently the Senior Director of Cybersecurity Research at Illumio, where he works across industries to help organizations understand how to protect their critical assets in the “assume breach” mentality of zero trust.

[1 CPE] Hybrid Cloud: Empowering IT with Resiliency, Multicloud Strategies, Optimal Spend, & Sustainability

  Presented by Michael Donahue, Sr Director, Hybrid Cloud Solutions • Hitachi Vantara

The hybrid cloud has emerged as a game-changing paradigm for modern IT infrastructure, offering IT Leaders and above a wealth of opportunities to drive innovation and efficiency. With the ever-increasing demand for cyber resiliency, flexibility, and sustainability, it is crucial for IT constituents to grasp the intricacies of the hybrid cloud, including key concepts such as security, multicloud, nearcloud, cloud spend optimization, data refactorization, and sustainability practices.

Throughout the session, real-world case studies and examples will be shared from Day 0, Day 1, and Day 2 customers.

  • Day 0 means you want to take advantage of this new framework but are still working through how to adopt hybrid cloud, how to secure it, and how to recruit proper talent to maximize it.
  • Day 1 means your organization took the first step and has a minimum spend commit they must meet. However, you’re still unsure of how to meet it because you’re still determining which applications to refactor, which containerized microservices to adopt, how to reskill existing talent, and how to implement your compliance and governance strategy.
  • Day 2 means your organization has already overcome these hurdles. Nice work! Instead of worrying about hitting a minimum spend commit, you’re now focused on optimizing your environment to limit sprawling cloud costs and looking towards data repatriation efforts.

Participants will have the opportunity to engage in interactive discussions and pose questions, fostering a collaborative learning environment. By the end of this session, IT Leaders will have the knowledge and tools necessary to evaluate, plan, and implement hybrid cloud solutions that align with their organization’s goals, including sustainability. Afterall, Hitachi is committed to providing solutions that are exclusively carbon-neutral or zero-carbon, ensuring a sustainable and environmentally friendly approach.

[1 CPE] Cyber Security is National Security

  Presented by Kenneth A. Schmutz, Supervisory Special Agent • FBI

Cybersecurity is one of the FBI’s highest priorities. Our strategy is multifaceted. We take aim at the actors, disrupt their operations, and go after their money. One of the most important actions a business can take in preparing for a cyber security incident is to make a cyber incident response plan and include the FBI in that plan. When the FBI quickly engages with a company hit by a cyber-attack, we’re able to share indicators that help network defenders identify malicious activity and intelligence about the actors that inform a company’s decision-making during a crisis. As the cyber threat has evolved over the past 20 years, one thing has remained the same: The FBI is at the center of acting on cyber threat information to provide support to victims and impose costs on cybercriminals.

[1 CPE] How AI Can Think Like an Attacker

  Presented by Darktrace

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

[1 CPE] WiFi 7: What About It?

  Presented by Pine Cove Consulting & Ruckus

This presentation traces the evolution of Wi-Fi technologies, from the initial design for device scalability to the current demand for capacity, efficiency, and predictability. The progression from Wi-Fi 4 to 6E and the upcoming Wi-Fi 7 is analyzed, revealing trends and challenges. The fragmented global regulatory environment, slow 6GHz adoption, and deployment intricacies are discussed. The differences among Wi-Fi 6, 6E, and 7 are highlighted, along with their respective enhancements. Major Wi-Fi 7 advancements, such as punctured transmission and enhanced quality of service, are examined. The emergence of the Wi-Fi 7 ecosystem and the increasing demand for Power over Ethernet (PoE) are also explored, offering insights into the changing landscape of network technologies.