[1 CPE] 2021 State of Malware

  Presented by Malwarebytes

Over the past year, the tools and tactics of cybercrime and cybersecurity adapted against a backdrop of enormous changes to our lives and businesses.

Join us to learn how cybercrime evolved in 2020 and identify ways to safeguard your organization against what’s out there.

We’ll explore:

  • Top threats for businesses and consumers
  • Emerging cybercrime trends and tactics
  • Solutions you can employ to thwart future attacks

[1 CPE] Cybersecurity Resilience Through Public-Private Partnerships

  Presented by Josh Stemp • Cybersecurity Advisor, CISA

What do I do? Is this beyond my scope of expertise? Where can I get guidance?

These are questions that Cybersecurity professionals ask themselves every day. You may spend your days thinking you are alone; you are not. Join Joshua Stemp to learn how public-private partnerships can strengthen an organization’s cybersecurity posture. He will outline what the Cybersecurity and Infrastructure Security Agency (CISA) is doing to secure the nation from the never- ending barrage of cyber threats.

[1 CPE] CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

[1 CPE] The Evolution of Physical Security

  Presented by Pine Cove Consulting & Verkada

Physical security is evolving. Security cameras can now store footage locally without NVRs or DVRs. Advanced filtering allows you to quickly find the footage you are looking for. Sharing access to live camera feeds can now be done simply via a link or SMS. Managing system health and providing using permissions is easier than ever. Access control can now integrate seamlessly into your security camera system to provide an added layer of security with real-time visibility.

Join Verkada and its preferred partner, Pine Cove Consulting, for a deep dive into the evolution of physical security systems and the transition to cloud-based physical security.

[1 CPE] What Got Us Here, Won’t Get Us to Where We’re Going…

  Presented by Aruba, a HPE Company

Over the past couple of decades, we’ve relied on a certain predictable and repeatable model of expectations from our infrastructure that has delivered. However, the demands of Digital Transformation, the pace of change, the capabilities within our teams — and of course the pandemic — have created business pressures that traditional ways of building and security infrastructure just can’t keep pace with.

The time is now to reflect, reset, and embrace a different way that will increase agility and flexibility as well as enhance performance and security. Lose the baggage of the past, travel light, and let’s chart a course for the journey ahead.

[1 CPE] The Office Rethought: Considerations on the Modern Work Environment

  Presented by Mark Fitzgerald • Executive Director of Customer Care, Boise State University

The events of the past year have accelerated conversations between the business and employees about what it means to be flexible. Whether it be schedule, location, amenities, or technologies, employees are seeking what they want and when and where they want it. This has led to a host of issues for technologists to consider, create process and policy around, as well as support.

Industries all over will have a remote workforce for the foreseeable future. Technology has led this transition and will continue to do so. IT professionals need to have a voice in these policy decisions. Spending needs to be reprioritized to accommodate these changes. Come and gather to discuss and share some of the challenges in supporting a hybrid work environment.

Mark Fitzgerald has a passion for education and has been working in higher education for over twenty-five years. He has presented at dozens of conferences as well as having had the opportunity to be an international keynote speaker. Mark is the Executive Director of Customer Care at Boise State University and is also an adjunct professor in the College of Business and Economics. He has presented all over the world at HDI conferences, local chapter meetings, and HDI Higher Education Forum meetings. He has chaired organizations such as the Higher Education Forum and the HDI Desktop Support Advisory Board.

[1 CPE] Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak & Aruba, a HPE Company

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, Aruba and Silver Peak will discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations

[1 CPE] Are You Prepared? A Discussion on Backups and Security

  Presented by INTERFACE Advisory Council

Since the start of the pandemic, your workflow and office structure have shifted tremendously. The way any firm operates now has adapted to the change in remote workers. While many moves have been made to allow workers to remain efficient, have you kept up with the new security threats? Having a good DR plan is always paramount. Have you tested your plan since the pandemic began?

Join the INTERFACE Advisory Council for an open discussion about these items and more. How does your BC/DR plan need to evolve now? Will your company have a large amount of staff permanently working remotely? We will discuss what controls you need to change, managing secure access, and handling a rise in security threats.

Panelists:
Peter Jurhs • Executive Director, Operations, Nampa School District
Tory Jamison • Executive Director, Cloud Services & Infrastructure, Boise State University
Jerry Hindberg • Assoc Director, Network & Cybersecurity, Lewis-Clark State College
John Stiffler • Director, Corporate IT, Boise Cascade Company

[1 CPE] Best Practices for Dealing with the Increasing Costs of a Cyber Event

  Presented by Bradlee Frazer Esquire • Partner, Hawley Troxell

Lawyers and insurance agents are busier than ever dealing with cyber events, hacks, and data breaches! Why are such attacks increasing despite all the systemic countermeasures, consultants, and classes? What are some best practices to think defensively and prepare financially and legally for such an event?


BIO:

Bradlee Frazer is a partner with Hawley Troxell where he chairs the firm’s Internet and Intellectual Property Practice Group. In addition to emphasizing and focusing on all facets of Internet law, Intellectual Property law, and Information Technology law, he also helps clients with related transactional work and litigation.

Brad is a published novelist and has written extensively for national legal publications and law blogs. He is a frequent speaker on internet, intellectual property, and computer law topics and is a regular guest lecturer at Boise State University on those subjects.

A Boise native, Brad began his legal career in 1989 as an intellectual property attorney and commercial litigator at a Boise-based law firm. In 1997 he accepted an in-house position as Senior Intellectual Property Counsel with Fortune 1000 company, Micron Electronics, Inc., and remained there through the company’s merger with Interland, Inc. (now Web.com), then the nation’s largest Web hosting company. He eventually became Deputy General Counsel for Micron Electronics, Inc., and Interland, Inc. From June 2003 to February 2006, Mr. Frazer served as Deputy General Counsel to MPC Computers, LLC, in Nampa, Idaho.

[1 CPE] Leveraging Assessment Findings to Harden Your Security Perimeter

  Presented by Fortinet

Are you regularly evaluating your network security?

Performing assessments is a tried-and-true method for improving your security posture, but they can be a daunting task for network security staff who are often short on manpower, expertise, and/or time. Regardless, the benefits of running assessments almost always outweigh any potential drawbacks. Having a security assessment in hand will increase your security situational awareness and significantly impact your organization’s risk preparedness and mitigation.

Join us as we discuss the importance of periodically validating your existing security controls and provide learnings and best practices from our experts.