[1 CPE] Capture the Flag: A Hands-On Threat-Hunting Workshop

  Presented by Carmie Mach, Cortex Domain Consultant • Palo Alto Networks

Sharpen your incident response and digital forensics skills at INTERFACE Anchorage 2026. Tackle real-world cybersecurity challenges and expand your expertise through a hands-on exercise at the Palo Alto Networks SecOps Capture the Flag competition event. How quickly can you investigate the threat at hand?

Join Carmie Mach of Palo Alto Networks for an interactive Capture the Flag (CTF) workshop designed to sharpen your real-world security skills. Participants will tackle hands-on challenges across areas like network defense, threat detection, and vulnerability analysis in a guided, collaborative environment. Whether you’re new to CTFs or looking to level up, this session offers practical experience you can immediately apply in your day-to-day cybersecurity work.

[1 CPE] Cybersecurity and Compliance For 2026

  Presented by Structured

This session examines how organizations can align cybersecurity, privacy, and compliance programs with the realities of 2026. The presentation reviews current threat trends, executive accountability requirements, and the expanding impact of artificial intelligence on risk management. It then connects federal, state, and industry obligations, including NIST CSF 2.0, HIPAA, CJIS, PCI DSS 4.0, CMMC, and emerging privacy laws to practical security program design. Attendees will leave with a clear framework for building a complete security program that integrates governance, segmentation, risk management, Zero Trust principles, and penetration testing to reduce risk and support regulatory readiness.

[1 CPE] AI-Native Networking: From Reactive IT to Autonomous Operations

  Presented by HPE Networking

Traditional networks were designed for human troubleshooting. As environments scale and expectations rise, reactive operations and manual workflows no longer meet the needs of modern enterprises.

AI-Native Networking represents a fundamental architectural shift — where AI is not layered on top of infrastructure, but built into its foundation. By combining real-time telemetry, cloud-native microservices, and continuously trained models, AI-Native platforms move IT from reactive firefighting to autonomous operations.

The result: measurable improvements in user experience, reduced operational overhead, faster root-cause resolution, and infrastructure that continuously optimizes itself.

This session explores what it truly means to be AI-native, how it differs from legacy “AI-enhanced” approaches, and the business outcomes organizations are achieving by embracing this new model.

[1 CPE] From Liability to Asset: Securing Unstructured Data at Scale in the Era of AI

  Presented by Rubrik

Unstructured data is the lifeblood of the modern organization, yet its sheer volume often outpaces the strategies meant to protect it. As this data becomes the fuel for future AI initiatives and business intelligence, the “old way” of managing NAS has become a primary point of failure.

In this session, we’ll dive into how Rubrik NAS Cloud Direct (NCD) redefines the protection of PB-scale file systems. We will explore a modern architectural approach that provides the speed, visibility, and cloud-native flexibility required to turn massive data sets into resilient assets. Whether you are preparing for an AI-driven future or simply struggling with the growth of your current footprint, this session will provide a blueprint for total unstructured data control.

[1 CPE] The Enterprise Buyer’s Guide to AI Security Platforms

  Presented by Cato Networks

AI adoption is accelerating faster than security and governance, exposing organizations as sensitive data flows through copilots, LLM-powered apps, and agentic systems that legacy tools can’t properly protect. With a surge of AI security vendors entering the market, buying the right platform can be confusing. This presentation helps security leaders evaluate AI security solutions by clarifying the new risks AI creates, explaining the core pillars of AI security, and outlining how to compare platforms, ask the right questions, and avoid common buying mistakes.

[1 CPE] From Assessment to Implementation: Inside a Live CMMC Journey

  Presented by Matt Palguta, Cybersecurity Director • Bering Straits Native Corporation

The Department of War’s CMMC program has lifted off for Stage One. This session will feature updates on the program from a CMMC Lead Assessor who will be wrapping up his own program assessment just before the conference with Bering Straits. Listen in on lessons learned from assessing and guiding other organizations while building a CMMC program. The final rule brought clarity and some new wrinkles. Not all of your OS crypto modules have yet to pass FIPS Validation… Hmm, is that an Enduring Exception or an Operational Plan of Action? What are those? There will be time for questions at the end, and Matt will be available to answer additional questions after the session as well.

Matt Palguta has 20+ years of cybersecurity experience in government contracting and manufacturing. As Cybersecurity Director for Bering Straits Native Corporation, he has built their CMMC compliance program to be certified and support future compliance needs beyond CUI data. Matt’s experience includes building a security operations center for the FAA and managing global cybersecurity operations for Cummins Diesel. He teaches as an adjunct professor of cybersecurity with Ivy Tech. Matt is also the founder and CEO of Alyeska Cybersecurity LLC, a CMMC and industrial control system consultancy.

[1 CPE] Data Resilience in the Age of Attack: Protect What Matters

  Presented by Landra Pierce, Product Strategy Technologist • Veeam

Cyberattacks are no longer a distant threat; they are a reality every IT team must be prepared for. When an attack occurs, your data becomes both the primary target and the key to recovery. Many organizations still rely on backup strategies that are designed for hardware failures or accidental deletions, rather than today’s threats, like ransomware, insider risk, and automated attacks. This disconnect creates vulnerabilities, especially when backups become an overlooked entry point in your security strategy. In this session, we will address these challenges to help you better protect your organization.

This session is ideal for IT professionals who want greater confidence in safeguarding their data and peace of mind. We will examine the most common oversights that leave organizations, including those in government, education, healthcare, and other sectors, exposed to cyberthreats. You’ll discover how teams are advancing beyond basic backup to adopt a cyber-ready approach, including topics like immutability, threat awareness, rapid recovery, and intelligent automation.

Our focus will be practical and grounded in real-world scenarios, and what truly works when pressure is high and time is limited. Because when every minute counts and trust is at stake, data resilience means more than surviving an attack. It’s about protecting what matters most and emerging even stronger.

[1 CPE] Securing AI Adoption: Protecting Data, Applications, and APIs in the Era of Generative AI

  Presented by Steven Gautier, Principal Solutions Architect • Thales

Organizations across every industry are rapidly adopting Generative AI, machine learning, and AI-powered applications to improve efficiency, automate processes, and unlock new insights from their data. However, these technologies also introduce new security challenges.

AI systems rely heavily on enterprise data, APIs, and interconnected applications, creating potential risks such as sensitive data exposure, prompt injection attacks, API abuse, and unauthorized access to AI models.

  • In this session, we will explore the security architecture required to safely deploy AI technologies within modern enterprise environments.
  • Attendees will learn practical strategies for protecting the data that powers AI models, the APIs that deliver AI services, and the applications that integrate AI into business workflows.
  • The session will also cover emerging AI-specific threats, governance considerations, and best practices organizations can use to maintain security, compliance, and trust while accelerating AI adoption.
  • Participants will leave with a clear framework for securely enabling AI innovation across cloud, hybrid, and on-premises environments.

[1 CPE] Proving Cyber Resilience: Measuring Outcomes, Not Effort

  Presented by Tony Taylor, Sales Engineer • Horizon3.ai

Most security programs measure effort — not outcomes. Organizations patch thousands of vulnerabilities, deploy dozens of tools, and run annual tabletop exercises… but when an attacker shows up, none of that matters.

What matters is whether they can prove their defenses actually work.

In this talk, Horizon3.ai shares how leading organizations are using autonomous pentesting to see their environment through the attacker’s eyes — continuously, safely, and at scale. By shifting from assumptions to proof, they’ve learned to:

  • Prioritize what’s exploitable. Focus limited resources on the weaknesses that truly put the business at risk that are known to be abused by threat actors.
  • Quickly fix what matters. Close the loop from find → fix → verify and reduce your exploitable attack surface.
  • Reduce attacker dwell time. Use pentest results to precisely deploy honeyTokens to detect compromise early, and to continuously prove your EDR and SIEM are tuned and working as intended.

Cyber resilience isn’t about being perfect — it’s about getting better over time. And the only perspective that truly matters is the attacker’s.