[1 CPE] 2022 Threat Review

  Presented by Malwarebytes

The Malwarebytes 2022 Threat Review is an annual report on the latest threats, attack trends, and privacy breaches impacting individuals, organizations, and national security. Researchers detail threat intelligence across operating systems and examine how privacy has shifted and the ways that cybercriminals and crimes are evolving. With a stronger understanding of the threat landscape, organizations and individuals can make more informed security and cyber-protection decisions.

[1 CPE] Protecting Your Critical Data

  Presented by Optiv & Rubrik

Businesses today rely heavily on technology and data. Though most organizations have developed strategies to access critical data during an outage caused by natural disasters or power disruptions, these strategies are ineffective during a cyber attack. Interconnected users, servers, cloud devices, and continuous web access results in an environment that is open for cybercriminals to significantly disrupt operations and/or take an entire network hostage.

How can you support the identification and protection of critical data that must be shielded from the impact of cyber attacks, while also enabling rapid recovery to a secure state? Join us to learn how you can automatically store backups in a malware-protected, air-gapped vault or a remote cloud-based solution that safeguards your data’s confidentiality, integrity, and availability. We’ll discuss how you can ensure your data is verified and clean before entering the vault and is maintained in an immutable state while within the vault, significantly reducing recovery time by guaranteeing that you are recovering to a known good state.

[1 CPE] Educating Your Guesses: How to Quantify Risk and Uncertainty

  Presented by Novacoast

Asking for a budget and justifying spending in cybersecurity departments can be a difficult task due to limited data and high uncertainty of future events. This talk will dive into quantitative risk analysis as it relates to cybersecurity: how to model uncertain events and understand financial risk. Attendees will see a first-hand demonstration of how quantitative modeling can be used to communicate risk and understand ROI. Attendees will walk away with the tools needed to present cyber risk as a dollar amount that can be easily understood by other business decision-makers at their company.

[1 CPE] Panel Discussion: The More Things Change…

  Presented by INTERFACE Advisory Council

For the last two years, there has been no shortage of change in how IT departments are organized. The structure in your shop likely looks nothing like it did in 2019. With the permanence of remote work, how have you evolved? Has your company kept up with the new landscape?

Please join the INTERFACE Kansas City Advisory Council for a discussion on the current landscape of leadership in the IT industry. We’ll discuss retaining employees, hiring workers remotely, dealing with the “great resignation,” and other topics of relevance to your IT career. Finally, the panel will address the challenge of keeping local Kansas City IT talent from exploring remote opportunities with out-of-state companies. Bring your questions for this open conversation with area leaders who will share their experiences and insights.

  • Britney Kennedy, Business Information Security Officer, Cardinal Health
  • Michael Nixon, Director, Information Security, Stormont Vail Health
  • Altaf Uddin, Director, Information Systems, University of Kansas School of Pharmacy
  • Adam Wasserman, Director, Information Technology, Paris Brothers

[1 CPE] Digital Transformation is Built on a Foundation of APIs – But are Your APIs Secure?

  Presented by 42Crunch

APIs are the core building block of every enterprise’s digital strategy, yet they are also the number one attack surface for hackers. Traditional security and management approaches are failing every day as the scale and reach of API attacks increase. The time is now right for enterprises to consider a new end-to-end continuous approach to protecting their APIs. In this talk, you will learn how Global 2500 enterprises are embracing a positive security model combining shift-left and shield-right methodologies to protect their APIs throughout the API lifecycle.

[1 CPE] The Future of Object Storage: Where Do We Go from Here?

  Presented by Hitachi Vantara

While object storage has surged in popularity as an alternative to NAS due to the technological limitations of NAS, customers are now pushing the limits of object storage as well. Where do we take the technology from here to remain relevant and continue to address the needs of modern AI and ML workloads? We will look at the roots of object storage and what needs to happen to the technology to continue forward with today’s modern workloads. Using flash technology and highly parallelized workloads, we will take an in-depth look at some of the directions we expect the unstructured data storage landscape to take. Do we see a world of all flash storage leading the pack or will we continue to utilize hybrid technologies to optimize the economics of storage? Join us for an in-depth look at the current landscape of unstructured data storage and where we go from here to address modern data workloads.

[1 CPE] The State of the Cyber Insurance Market: How to Plan for Uncertain Future

  Presented by Arctic Wolf

Organizations have come to rely on cyber insurance to mitigate the impact of increasingly sophisticated, disruptive, and widespread cyber-attacks. As a result, insurers are issuing more policies, and the amounts of protection available are increasing. In 2020, the global insurance community saw the first cyber insurance program that exceeded $1 billion in coverage.

Join this session to hear why:

  • Insurers are rethinking cyber coverage and claims in the wake of increasingly aggressive cyber-attacks.
  • Businesses are likely to see their cyber insurance premiums increase, or even see some cyber security coverage dropped entirely.
  • Leaders should consider risks and mitigation strategies as they assess their readiness and liability when it comes to breaches or attacks.

[1 CPE] The Future of Observability

  Presented by Cribl

Digital transformations, cloud migrations, and persistent security threats turned observability from a niche concern to an essential capability in today’s organizations. We’re still in the early days of observability maturity, but early stumbles point to where observability must go in the future. This talk discusses where observability is today and the three critical areas necessary for observability to deliver on its promises throughout the enterprise.

[1 CPE] The Good, the Bad, and the Ugly of Vetting Applications

  Presented by Eric Walters • Chief Information Security Officer, Burns & McDonnell

What level of access are applications requesting and then receiving directly from your employees? Is the security team aware? Has the risk been quantified? Who is looking at the application Terms and Conditions or the End User License Agreement? Is the access overly permissive? What happens if the application vendor is hacked? Can the attacker access your data? Is the vendor liable?

Eric Walters, CISO and Director of IT Operations at Burns & McDonnell, will discuss these and many more perils and pitfalls of vetting applications and plugins.

Eric Walters is a seasoned information technology leader with over 25 years of security experience. He is capable of translating IT details into executive-level business decisions. Eric believes good compliance does not mean good security, nor does good security mean good risk management. Passionate for employee development. His experience includes healthcare compliance, software development, information security program management, cyber security managed services, global transition operations, infrastructure cloud operations, enterprise architecture, and document management, and is a retired Marine Officer.

[1 CPE] Chasing Cloud Security Maturity Amid Constant Headwinds of Change

  Presented by Check Point

Covid and the push to accelerated ‘remote first’ strategies have forced organizations to leverage on-demand cloud infrastructure, often without the proper design, architecture, and security strategy in place to scale safely. In addition, infrastructure as a service providers are innovating very quickly and building high-value services for us to leverage in our application architectures. Lastly, we are challenged more than ever by a lack of mature cloud skillsets available to hire. These factors add up decisions with resources, identities, and access that put our most sensitive secrets at risk. As new and innovative cloud capabilities are introduced, so too are security innovations, both in technology and process.

Grant Asplund, Growth Technologies Evangelist, will discuss the evolution of Cloud security including headwinds, issues, challenges, and concerns companies can expect to be confronted with as they pursue reaching security maturity in the Cloud.