[1 CPE] Thinking Upstream: Avoid the Fallout of the next Log4Shell

  Presented by Tidelift

News of a zero-day vulnerability in the popular open-source project Log4j broke in December, leading many organizations scrambling to figure out the impact on their applications. Nearly every organization developing applications was impacted, and the fallout was so broad that the FTC issued guidance.

Log4Shell comes on the heels of the U.S. White House cybersecurity executive order 14028, an attempt by the United States government to use its purchasing power to create positive changes to the way cybersecurity is addressed around the world.

Recent high-profile breaches like Log4Shell, the Colonial Pipeline ransomware attack, or the SolarWinds software supply chain attack have shown that our cybersecurity defenses are woefully inadequate. This executive order forces a higher standard of cybersecurity for any organization selling software to the federal government, which in turn makes it the de facto global standard for all software in the future.

Tidelift CEO and co-founder Donald Fischer shares his perspective on how the Log4Shell vulnerability and the cybersecurity executive order impact software supply chain security. He’ll brief attendees on the key issues addressed by the executive order, including software bill of materials (SBOM), supply chain security, and provenance requirements. He’ll outline the gaps that most organizations will need to close to stay in compliance. And he’ll share a proactive approach to addressing open-source software supply chain health and security upstream.

If you want to ensure your organization is fully prepared for the coming changes, you won’t want to miss this session.

[1 CPE] Leveraging Assessment Findings to Harden Your Security Perimeter

  Presented by Fortinet

Are you regularly evaluating your network security?

Performing assessments is a tried-and-true method for improving your security posture, but they can be a daunting task for network security staff who are often short on manpower, expertise, and/or time. Regardless, the benefits of running assessments almost always outweigh any potential drawbacks. Having a security assessment in hand will increase your security situational awareness and significantly impact your organization’s risk preparedness and mitigation.

Join us as we discuss the importance of periodically validating your existing security controls and provide learnings and best practices from our experts.

[1 CPE] Ransomware – Who, What, Why & How…

  Presented by Check Point

Over the last 12 months, ransomware attacks surged by 93% with a devastating impact on businesses and industries worldwide. In today’s hybrid IT environment, preventing ransomware attacks seems like an impossible feat. But is it?

In this session, we will cover the latest ransomware trends and how you can protect your organization from falling victim to sophisticated ransomware attacks.

[1 CPE] Fast and Furious Attacks: Using AI to Surgically Respond

  Presented by Darktrace

Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Brianna Leddy, Director of Analysis, to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Explore today’s threats and challenges and learn how advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough. Includes real-world threat finds, case studies and attack scenarios.

[1 CPE] Delivering the Zero Trust Enterprise

  Presented by Palo Alto Networks

Digital transformation is accelerating due to major shifts like the expansion of the hybrid workforce and the continued migration of applications and data to the cloud. Network security teams now have the opportunity to adopt a modern Zero Trust approach that fits this transformation.

But how do you make Zero Trust principles actionable across users, applications, and infrastructure? How can you put them into practice, set priorities, and effectively rebuild security for new environments? Join this session to learn about the three pillars of Zero Trust: users, applications, and infrastructure, and how you can develop a holistic and consistent approach to Zero Trust that can be made actionable across all three of these key domains. We will review various use cases across the organization and how we can support you with our unique blend of the highest level of capabilities, an integrated platform, and extensive in-house expertise around Zero Trust.

[1 CPE] 3 Common Mistakes to Avoid When Designing Your Security Program

  Presented by Fireminds

Every organization has different requirements based on business functions, systems, geography, and resources. However, we’ve observed several key mistakes that are leaving companies and their customers at risk. In this session, we’ll share the pitfalls that we see time and time again and discuss how to avoid them.

Key takeaways include:

  • Understanding the difference between compliance and security
  • Recognizing the untapped potential of your current technology stack
  • How to shift security towards business enablement

After this session, participants should expect to leave with actionable next steps to prevent these mistakes in their organizations.

[1 CPE] Payment Card Industry Compliance: How to Become and Stay Compliant

  Presented by Structured

This presentation will discuss the difficulties of becoming and staying compliant with Payment Card Industry (PCI) requirements. The updated Data Security Standard (DSS) 4.0 has been released, and there are numerous changes and enhancements that must be complied with. Whether you are just beginning with PCI for your organization or have many years of experience, there are many challenges, both old and new that can create roadblocks to compliance. With emerging technologies such as zero-trust architecture ready for implementation, find out how to best use these controls for your organizational goals. This presentation will cover the requirements, trouble areas to be aware of, and how you can utilize specific technology in your compliance effort.

[1 CPE] Leveraging Assessment Findings to Harden Your Security Perimeter

  Presented by Fortinet

Are you regularly evaluating your network security?

Performing assessments is a tried-and-true method for improving your security posture, but they can be a daunting task for network security staff who are often short on manpower, expertise, and/or time. Regardless, the benefits of running assessments almost always outweigh any potential drawbacks. Having a security assessment in hand will increase your security situational awareness and significantly impact your organization’s risk preparedness and mitigation.

Join us as we discuss the importance of periodically validating your existing security controls and provide learnings and best practices from our experts.

[1 CPE] Taking Ownership of Security and Optimization in the Digital Age

  Presented by Jim Bates • Founder, President & CEO of Business Improvement Group

We as IT practitioners, service providers, manufacturers, managers, executives, and business owners are tasked with leading change––change due to intentional and unintentional events including the internet of things (IoT), digital transformation, intelligent automation, machine learning, robotics, and yes, pesky pandemics that have changed the way we work. These changes introduce new vulnerabilities that expose our data to motivated threat agents. Information security or cybersecurity is everyone’s job. Jim Bates will send out a call to action with some tips on how to get buy-in and lead in this age of digital chaos. We need more than just transformation. We need secure, scalable, and sustainable optimization.

Jim Bates is the Founder, President & CEO of Business Improvement Group, Inc. (BIG) and an Adjunct Professor in several schools at the University of Alaska Anchorage, including the MSPM program. Jim was elected as President-elect to the Project Management Institute Alaska Chapter (PMIAK) for 2018 and as an Executive Adviser for the nationwide Center for Technology. In addition to his many professional certifications, Jim holds master certificates in Business Analysis, Lean Six Sigma, and Project Management from Villanova University.

Jim is an experienced executive and consultant who is passionate about leading business transformation and offering innovative, high-value solutions to everyday business challenges. He has a proven ability to successfully analyze an organization’s critical business requirements, identify deficiencies and potential opportunities, and align and integrate technology.

He strives to help companies develop innovative and cost-effective solutions for enhancing competitiveness, increasing revenues, and improving customer service offerings. Jim is also an engaging, experienced public speaker and instructor. He frequently offers courses in Six Sigma, ITSM/ITIL, HIPAA compliance, leadership training, project management, and more.

[1 CPE] Building a Disaster Recovery Program

  Presented by AT&T

Disaster recovery is a critical component for any organization and can significantly reduce the damage and cost associated with information security breaches. Leveraging industry best practices and common frameworks, this presentation will cover core components of constructing, evaluating, and maintaining a disaster recovery program. We will include discussions on policies, processes, technical solutions, and more. Attending the presentation will provide small- to medium-sized businesses and local governments with the foundation needed to create and implement an effective recovery program.