[1 CPE] Sky Lakes Case Study: Real-life Ransomware Recovery

  Presented by Cohesity

Backup is often the last line of defense against ransomware attacks, which have exponentially increased over the last year. Hear how Sky Lakes Medical Center chose a joint solution from strategic partners Cisco and Cohesity for a modern, efficient data management system to replace an aging backup solution while beating an unexpected ransomware attack. During this session, we’ll give you a brief overview of Cohesity for context and then roll into a 40-minute interview with the Sky Lakes Medical Center Team.

[1 CPE] Payment Card Industry Compliance: How to Become and Stay Compliant

  Presented by Structured

This presentation will discuss the difficulties of becoming and staying compliant with Payment Card Industry (PCI) requirements. Although currently in version 3.2.1, the updated Data Security Standard (DSS) 4.0 is coming soon and there are numerous changes and enhancements that must be complied with. Whether you are just beginning with PCI for your organization or have many years of experience, there are many challenges, both old and new that can create roadblocks to compliance. With emerging technologies such as zero-trust architecture ready for implementation, find out how to best use these controls for your organizational goals. This presentation will cover the requirements, trouble areas to be aware of, and how you can utilize specific technology in your compliance effort.

[1 CPE] Fast and Furious Attacks: Using AI to Surgically Respond

  Presented by Darktrace

Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Brianna Leddy, Director of Analysis, to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Explore today’s threats and challenges and learn how advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough. Includes real-world threat finds, case studies and attack scenarios.

[1 CPE] Know your Leadership Compass: A Roadmap to Lead with Passion and Purpose

  Presented by Jimmy Godard • SVP, Program Manager, Bank of America

Business leaders, managers, and directors may be brilliant leaders in one situation and not have the same results in another. Management gurus agree: Anyone can lead, but not everyone can be a successful leader. The previously embraced command-and-control techniques are increasingly ineffective. Today’s business environment demands leaders to be alert, agile, enterprising, and skilled in the art of diplomacy. As a leader, it’s imperative to articulate who you are, what you stand for, and why you’re excited to lead your team.

Are these areas you feel you need to develop? Do you have a compass to guide you on your journey leading your teams through challenging times, staying flexible in dealing with them, and responding to them in ways that address their needs and interests? “Developing your Leadership Compass” is a highly-interactive, reflective process that sets a path to transformational leadership.

Jimmy J Godard is an entrepreneur, philanthropist, and one of the best at organizational IT changes. For more than 22 years, he has led global changes with diverse teams, helped non-profit organizations, coached IT leaders at leading with passion and purpose and reaching their full potential.

Jimmy’s leadership journey and professional experience over the last two decades in the worlds of information technology and business are incredible. He made his debut in the financial industry as a peak-time teller. He ascended to a Senior program, change, and service delivery manager. He implements global technology changes that have an impact on people, process, and technology.

He has a unique perspective both on the business and technology sides. He holds a Master’s Degree in Computer Information Systems, a Master’s Degree in Business Administration (MBA), is a certified goal success coach, and is currently pursuing a Doctorate of Management in Organizational Leadership with a specialization in Information Systems and Technology. He is an instigator of process improvement and innovation with an unwavering determination to bring about results. He implements global technology integration efforts for Infrastructure, End User Computing, Mergers, Acquisitions, and Divestitures.

Jimmy is very involved in philanthropist activities in the Portland and SW Washington communities. He is an active coach of soccer (2-3 teams). He also performs service projects yearly around the globe including and not limited to the countries of Haiti, Cambodia, Uganda, and Nigeria.

Today, Jimmy is a sought-after international speaker, goal success coach, project manager, program manager, and IT adviser. Jimmy is an excellent choice for businesses, nonprofits, leaders, project teams, business analysis, and boards looking for coaching and consulting on project, program, and change management.

[1 CPE] Ransomware – Who, What, Why & How…

  Presented by Check Point

Over the last 12 months, ransomware attacks surged by 93% with a devastating impact on businesses and industries worldwide. In today’s hybrid IT environment, preventing ransomware attacks seems like an impossible feat. But is it?

In this session, we will cover the latest ransomware trends and how you can protect your organization from falling victim to sophisticated ransomware attacks.

[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve

IDC advises that a 3-2-1-1 strategy is the new best practice for effectively protecting customers against ransomware. The last 1 is the important piece of the puzzle, where a copy is also stored on immutable storage. The growing risk of compromise to your customers’ data – specifically via ransomware DEMANDS the most up to date and complete solutions arsenal.

[1 CPE] Thinking Upstream: Avoid the Fallout of the next Log4Shell

  Presented by Tidelift

News of a zero-day vulnerability in the popular open-source project Log4j broke in December, leading many organizations scrambling to figure out the impact on their applications. Nearly every organization developing applications was impacted, and the fallout was so broad that the FTC issued guidance.

Log4Shell comes on the heels of the U.S. White House cybersecurity executive order 14028, an attempt by the United States government to use its purchasing power to create positive changes to the way cybersecurity is addressed around the world.

Recent high-profile breaches like Log4Shell, the Colonial Pipeline ransomware attack, or the SolarWinds software supply chain attack have shown that our cybersecurity defenses are woefully inadequate. This executive order forces a higher standard of cybersecurity for any organization selling software to the federal government, which in turn makes it the de facto global standard for all software in the future.

Tidelift CEO and co-founder Donald Fischer shares his perspective on how the Log4Shell vulnerability and the cybersecurity executive order impact software supply chain security. He’ll brief attendees on the key issues addressed by the executive order, including software bill of materials (SBOM), supply chain security, and provenance requirements. He’ll outline the gaps that most organizations will need to close to stay in compliance. And he’ll share a proactive approach to addressing open-source software supply chain health and security upstream.

If you want to ensure your organization is fully prepared for the coming changes, you won’t want to miss this session.

[1 CPE] Leveraging Assessment Findings to Harden Your Security Perimeter

  Presented by Fortinet

Are you regularly evaluating your network security?

Performing assessments is a tried-and-true method for improving your security posture, but they can be a daunting task for network security staff who are often short on manpower, expertise, and/or time. Regardless, the benefits of running assessments almost always outweigh any potential drawbacks. Having a security assessment in hand will increase your security situational awareness and significantly impact your organization’s risk preparedness and mitigation.

Join us as we discuss the importance of periodically validating your existing security controls and provide learnings and best practices from our experts.

[1 CPE] Zero-Trust Architectures

  Presented by Rubrik

Organizations have invested heavily in IT security, attempting to fortify their perimeter, network, endpoint, and application protections. Despite these investments, hackers are successfully penetrating these defenses and targeting enterprise data, including backup data. Ransomware is starting to specifically target online backups by encrypting or deleting them. If your organization was the target of an attack today, how do you know what data was impacted and where? Manually sifting through millions of files and comparing each snapshot consumes FTE time and prolongs recovery exponentially. Mass restores of the entire environment could mean high data loss and weeks’ worth of work down the drain. In this session, we will discuss how to protect your last line of defense, the backups. We will walk through the anatomy of a recovery, the best practices, and advanced tools to ensure you will not have to pay a ransom, and how to quickly recover your data to continue business operations.

[1 CPE] How to Advance Strategic Business Goals with IoT

  Presented by Aruba, a HPE Company

Whether it’s the allure of the concept of the Internet of Things (IoT), a fear of being viewed as a laggard, or internal pressure to do something new, many companies rush head-first into IoT projects without clearly defined objectives or value propositions. The result is a high rate of failure and subsequent disillusionment about the real value of IoT. If your company’s strategic goals require human productivity monitoring, human productivity organizational redesign, augmented reality, energy monitoring, and/or building security, Aruba’s ESP can expedite time-to-insight and time-to-value. The solutions can securely handle all manner of IoT devices and integrate them with enterprise business applications and processes. Join us to learn how you can reduce IoT deployment time to a fraction of what a custom-developed solution would require.