[1 CPE] LIVE Hack: Unmasking AI’s Dark Side

  Presented by Wayne Johnson, CEO • Stellar & iT1 Source

In this eye-opening presentation, we will delve into the darker applications of artificial intelligence, specifically focusing on its potential to craft malicious code and generate deceptive voice replicas. As AI continues to evolve, its capabilities extend beyond beneficial innovations, posing significant ethical and security challenges. This session aims to shed light on how AI can be manipulated to perform nefarious tasks, such as writing harmful software or impersonating voices with high accuracy. Through live demonstrations and critical discussions, we aim to equip the audience with a comprehensive understanding of these risks and foster a dialogue on developing robust countermeasures and ethical guidelines to prevent misuse of AI technologies. Join us as we explore the shadowy corners of AI applications, understanding their implications and preparing for a secure technological future.

[1 CPE] Disaster Preparedness and Data Protection Strategies for Business Continuous Availability

  Presented by Matthew Kern, Sales Engineer • Arcserve

As natural disasters like hurricanes, wildfires, and severe winter events become more frequent and intense, businesses face increasing economic and operational challenges. High-profile disasters, including the Camp Fire in 2018, which incurred a staggering $16.5 billion in damages, and Hurricane Maria’s profound impact on Puerto Rico, estimated at $139 billion for full recovery, underscore the escalating financial stakes.

This presentation will explore effective strategies to bolster business resilience in the face of natural catastrophes.

Key elements of the session will include:

  • Critical insights from Arcserve’s annual global research study on disaster preparedness.
  • A comprehensive Disaster Preparedness Checklist tailored for companies.
  • Practical tools designed to safeguard business operations and data resilience.

We will delve into the details of a 5-step disaster and ransomware recovery plan template, as well as the 3-2-1-1 backup strategy, which ensures robust data recovery through multiple backup copies stored both locally and offsite. By implementing these strategies, businesses can minimize financial losses, reduce operational downtime, and achieve a rapid recovery, thereby ensuring continuity even during catastrophic events. This session aims to arm business leaders with the essential tools and knowledge to safeguard their enterprises amidst an increasingly unpredictable global landscape.

[1 CPE] AI in Cybersecurity: Navigating the Double-Edged Sword

  Presented by Johan Bloomhart, Principal Sales Engineer • WatchGuard & BlackPoint IT

The rise of Artificial Intelligence (AI) has introduced both transformative opportunities and unprecedented risks to the cybersecurity landscape. While AI is a powerful tool for automating threat detection and enhancing security protocols, it also presents new avenues for cybercriminals to launch more sophisticated attacks. In AI in Cybersecurity: Navigating the Double-Edged Sword, we’ll explore AI’s dual impact—empowering both defenders and attackers—and discuss how to harness AI responsibly to protect against emerging threats.

This session will cover:

  • An overview of AI’s evolution and its prominence in the modern business world.
  • How malicious actors exploit AI for nefarious purposes, and the vulnerabilities that arise.
  • How cybersecurity professionals use AI to fortify defenses, identify threats, and mitigate risks.
  • Predictions for AI’s long-term influence on the security industry.
  • The latest technological tools and techniques that can mitigate the risks posed by AI.

We’ll also offer guidance on developing an artificial intelligence policy that allows your organization to leverage AI’s productivity benefits while minimizing risks to data security. Participants will walk away with actionable insights into how to implement AI securely in their business, staying ahead of both competitors and cyber threats.

[1 CPE] Are You AI Ready? Securing M365 Copilot

  Presented by Structured

This presentation dives into the transformative potential of Generative AI (GenAI) and Microsoft’s M365 Copilot. We’ll cover the fundamental differences between GenAI and Machine Learning, highlighting GenAI’s ability to create new content and its applications across various industries. We’ll also provide an in-depth look at Microsoft Copilot, showcasing its role in enhancing productivity through intelligent suggestions and automation. Additionally, we’ll introduce a comprehensive Copilot Assessment service designed to evaluate an organization’s readiness for AI integration, focusing on IT infrastructure, security, data governance, and compliance. Emphasis is placed on ensuring secure integration and adherence to global data privacy standards, making it a critical resource for organizations embarking on their AI journey.

[1 CPE] Can You Prevent a Cyberattack?

  Presented by Jeff Polczynski, Director of Solutions Architecture • 11:11 Systems

Sprawling cloud infrastructure, remote and hybrid work, and ever more brazen threat actors have made it nearly infeasible to have an answer for every threat vector encroaching upon your organization. How can you withstand the onslaught of attacks?

Let’s discuss how to build a comprehensive plan for preventing bad actors and malicious insiders from compromising your systems, disrupting your business operations, and harming your company brand.

Jeff T. Polczynski is the Director of Solutions Architecture at 11:11 Systems. Previously, he was a key member of the Network Engineering team, where he helped design and build the network infrastructure for the 11:11 Cloud. Jeff has more than 20 years of experience in data center, networking and security roles across government, financial services, and service provider companies. Outside of work, he loves backpacking and is always on the lookout for the perfect spot to hang his hammock for a night under the stars.

[1 CPE] Challenges and Solutions with Digital Public Services

  Presented by Mark Leech • Director of Technology and Innovation, City of Albuquerque

Local governments continue to face increasing needs for security while meeting expectations to expand digital public services. Strategies must keep up with modern standards for municipalities of greater transparency, growing digital toolsets, and increased mobility for workforce. This session will discuss how these and other solutions shape the digital landscape at the City of Albuquerque.

Mark Leech became the Deputy Director of the Department of Technology and Innovation at the City of Albuquerque in 2019. Before then, he managed the Albuquerque Police Department Technical Services Unit. Between 2008 and 2016, Leech led the City’s efforts in open data, transparency and innovation. As a software developer, he has worked extensively in both public and private sectors.

Director Leech moved from England to New Mexico in 2002 and holds an MSc. in Information Systems Engineering from the University of Wolverhampton, England.

Director Leech continues to support all departments and divisions at City Hall with innovative solutions to keep the City at the forefront of current tech needs, overseeing core city systems, networks, and applications to ensure the operations of City services.

[1 CPE] Cybersecurity Crisis: Generative AI Increasing Threats to Critical Infrastructure

  Presented by Kristen Lucero, Manager, Infosec Cyber Operations and Engineering, PNM Resources • ISACA New Mexico

Cyber threats are on the rise impacting critical infrastructure not only at local and state levels but all across the globe. With the use of generative AI, threat actors are creating sophisticated phishing and social engineering campaigns at record speed. There has been a 30% increase in attacks on critical infrastructure since 2023. According to KnowBe4 that equates to 13 attacks per second.

Critical infrastructure or assets are so crucial to our livelihood that their destruction would have a serious impact from public health to national security. Some of these assets include transportation, supply chain, utilities, and government agencies. All these systems are interconnected starting at the local level. A disruption in one can cause a domino effect on the others.

How are threat actors using generative AI and are organizations developing resilient cybersecurity programs? Are organizations implementing generative AI in their security stack? Developing a strong security culture starts with the basics: training and assessments. Integrating these and other practices into your cybersecurity program will develop a strong security culture to increase resiliency and protection against an evolving threat landscape.

[1 CPE] AI: Friend or Foe? An Open Discussion with Your Colleagues

  Presented by INTERFACE Advisory Council

Artificial Intelligence has made a mark already and its use will only continue to expand. Are we fully prepared to embrace AI in our workplaces? Viewpoints differ on how widely AI should be used at this point. Commonly used applications and software now include AI capabilities as a part of their standard offerings. How is this governed in your company? Do you even have an AI policy drafted?

Join the INTERFACE Advisory Council for an open discussion on all things AI. We will cover the risks associated with using AI –– and the risk of NOT using it. What knowledge do you need right now? Also, we will cover the best uses for AI in IT processes. There will be an open discussion about what is working well in IT shops around New Mexico. Bring your questions as we explore the starting points that every IT department needs to consider for an effective AI policy.

Panelists:

  • Richard Garcia, Associate Director of Infrastructure, PNM Resources
  • Kevan Hobbs, IT Supervisor, PNM Resources
  • Jason Johnson, Deputy State CIO, State of New Mexico
  • Jessica Johnson, Sr Manager, IT Security & Program Operations, Westrock

[1 CPE] IT Leadership: How to Grow to Next Level and Be a Better Leader

  Presented by Phillip Abeyta, CEO of TEC34 and Board Member • New Mexico Technology Council

You stare at multiple screens each day monitoring logs and looking for irregularities in data. Later today, you will spend thirty minutes helping someone access their email and reset a password. Many IT professionals can feel isolated from a company mission as they go through their daily tasks. Especially with remote working, bonding with your team and exhibiting leadership can be a challenge.

Having strong leaders in your organization is a vital element of success. Inspiration can come in many forms, and a strong leader always looks to get the most out of any task. As you consider your own career ambitions, how successful are you at being a leader each day? Join Phillip Abeyta, Chief Executive Officer of TEC 34, for a comprehensive approach to exhibiting leadership in IT. As an expert in the technology that runs your business, people rely on you to display the efficiencies that come from embracing technology and its processes. CIOs and Engineers alike will walk away with several strategies they can use to improve their own leadership approach.

With over 15 years of experience in the IT sector and a passion for empowering businesses, Phil is at the helm of TEC34, guiding it to offer tailored consulting and professional services to help organizations tackle technical challenges head-on.

His leadership extends beyond the boardroom as he serves on community boards, including the New Mexico Tech Council since 2017. He will also start his Core Program with Leadership New Mexico in September, where he will undoubtedly continue to enhance his skills as he will work alongside great leaders across the State of New Mexico. Phil’s educational background in Electronics and Computer Engineering, combined with Business Administration and an ongoing MBA, showcases his dedication to continuous learning and growth.

[1 CPE] The Value of Cybersecurity

  Presented by Randy Macias, Manager of Engineering  • Ardham Technologies, Inc.

Cybersecurity is vital for protecting sensitive data, ensuring business continuity, and maintaining customer trust. By investing in robust measures, organizations can prevent costly breaches and support innovation while safeguarding national security. In today’s digital landscape, effective cybersecurity is essential for stability and growth.