[1 CPE] How to Simplify and Secure Your Network & What You Need to Know About Wi-FI 6e

  Presented by Matt Helm, Sr Systems Engineer  • Extreme Networks

During the presentation, we will discuss how to simplify your network and make it more secure by using the IEEE standard 802.1aq. We explain the standard, and how it is easier to use than traditional networking and much more secure. We will demo its simplicity and what makes it secure.

We will then move into Wifi 6e and how it is changing the way we must look at wireless deployments. We will discuss all the changes that it has brought us and what we must be planning for with the higher speeds that we will be able to achieve.

[1 CPE] How to Stop East/West Attacks in Your Data Center

  Presented by Aruba Networks

70% of all breaches are caused by endpoint security vulnerabilities, followed by lateral movement in the data center. Halt that hacker traffic. Attend this session to learn about a new category of data center switch that combines best-of-breed L2/3 switching with the industry’s first hardware-accelerated programmable processor. This new tool augments your malware and ransomware detection and response capabilities by delivering stateful firewall services inline, at scale, with wire-rate performance and orders of magnitude improvement over traditional data center L2/3 switches. You will learn how to gain visibility and enforce security policy for all East/West flows between workloads to protect the critical assets in your data center.

[1 CPE] Transforming Networks: Harnessing AI and ML for Optimal Performance

  Presented by Pine Cove Consulting & Ruckus

In today’s digitally interconnected world, networks play a critical role in ensuring seamless communication and data transfer. However, network performance and reliability can often be challenging to maintain. Each year, we see an increased number of devices added to our networks along with more use of high-bandwidth applications. IT teams often lack the tools to ensure required network service levels in an environment of ever-increasing user connectivity demands and network complexity. This presentation aims to explore the potential of artificial intelligence (AI) and machine learning (ML) techniques in overcoming these challenges.

The presentation will delve into various strategies and technologies that can help organizations improve their network performance. We will discuss proactive approaches to troubleshoot network issues before they escalate, saving valuable time and resources. By leveraging AI-powered tools and techniques, attendees will learn how to gain quick yet in-depth insights into their network’s health, enabling them to identify and resolve potential bottlenecks efficiently.

This presentation will also emphasize the importance of customized data reports in network management. Attendees will discover how AI and ML tools can process vast amounts of network data, providing valuable information tailored to their specific needs. This capability allows network administrators to make informed decisions and optimize network performance based on relevant metrics and key performance indicators.

Additionally, cloud radio resource management (CRRM) will be explored to address co-channel interference—a common problem in wireless networks. We will shed light on how CRRM leverages AI and ML to intelligently allocate and manage radio resources via algorithms, mitigating interference and enhancing overall network performance. Attendees will gain insights into the benefits of this approach and its potential to revolutionize wireless network operations.

Overall, this presentation aims to empower network administrators and professionals with the knowledge and tools to transform their networks using AI and ML. By embracing these cutting-edge technologies, organizations can enhance network performance, ensure better reliability, and streamline their operations in the ever-evolving landscape of modern networking.

[1 CPE] Supply Chain Attacks: Who’s at Risk and How Can You Stop Them

  Presented by EverFast & High Wire Networks

Supply chain attacks are increasingly in the news as more businesses are impacted by third-party vendors being used to circumvent the businesses’ defenses to propagate ransomware and digital extortion. Most companies today leverage some type of third-party software for business operations. Join us as we discuss the risk of supply chain attacks, recent breaches and how you can defend your enterprise.

  • What is a Supply Chain attack?
  • How do they work – postmortem
  • Who is at risk?
  • What’s the current threat condition?
  • How can you stop supply chain attacks from impacting your business?

[1 CPE] Cybersecurity is a Big Data Problem: How XDR Solves for Risk

  Presented by EverFast & High Wire Networks

Today’s connected business and the digital transformation has led to massive improvement in the customer experience and business agility. The flip side is a massive expansion of your attack surface that is increasingly difficult to get your arms around. Join the discussion on the impact digital transformation has had on business risk and how more businesses are turning to XDR services to reduce risk exposure and improve cyber resilience.

  • Trends in cyber security attacks
  • What has changed in the threat state
  • What is XDR and how does it reduce risk
  • What is driving growth of XDR services among business today
  • Is XDR right for your business, vetting an XDR offering

[1 CPE] Threat Actors “Living off the Land” Techniques and Response Review

  Presented by Rob Bennett, Security Expert • InfraGard Kansas City

The recent advisories from multiple cyber agencies of threat actors utilizing “Living off the Land” techniques present a different challenge in cyber defense for organizations. We will cover techniques covered by Volt Typhoon and other threat actors with organization response on how to verify detected activity, logging that will need to be in place to monitor the activity, and how to respond when your organization has evidence that they may be infiltrated.

Rob Bennett has served in a variety of leadership positions in multiple industries focusing on Security and Business Continuity over 3 decades while also assisting organizations with compliance initiatives and strategic direction. Rob currently resides at the Lake of the Ozarks with his retired racing greyhound Otis.

[1 CPE] Defend Today, Secure Tomorrow

  Presented by John Bryant • Cybersecurity Advisor, CISA

Join John Bryant, CISA Cybersecurity Advisor, for a discussion of the evolution of Ransomware, beginning with the first reported incident to the present. Bryant will provide a high-level overview of one incident followed by a look at the lessons learned. Learn about the Department of Homeland Security’s (DHS) youngest agency, the Cybersecurity and Infrastructure Security Agency (CISA), and resources available at “no cost” to State, Local, Tribal, and Territorial governments and organizations with critical infrastructure.

John Bryant serves as a Cybersecurity Advisor for Region 7 (IA, KS, MO, and NE) for CISA in the Integrated Operations Division. Based in Kansas City, Missouri he supports the Department of Homeland Security’s mission of partnering with industry and government to understand and manage risk, strengthening the security and resilience of the nation’s critical infrastructure. He is the lead in Region 7 for DHS/CISA’s K12 cybersecurity working group. Mr. Bryant provides Cybersecurity resource briefings, Cybersecurity assessments, and Incident Response planning to the nation’s sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities.

Bryant holds a Master of Business Administration with an emphasis in Organizational Development and a Bachelor of Science in Computer Information Technology from Upper Iowa University. He is a member of (ISC)2 and is a Certified Information System Security Professional (CISSP) in good standing for the past 10 years.

[1 CPE] Panel Discussion: Risk… What Risk?

  Presented by INTERFACE Advisory Council

Every day more stories are circulating about cyber-attacks and breaches causing significant harm to organizations. As an IT leader, you know there is constant risk to your network, data, and ultimately the checkbook. Even when certain risks are known, communicating this effectively to C-suite decision-makers is a significant challenge. Is your company reacting too much and not planning properly? Are you hitting roadblocks in attempting to quantify risk?

Join the INTERFACE Kansas City Advisory Council for an open conversation about Risk Management. Local IT leaders will share some insight on strengthening relationships with the decision-makers that ultimately control your organization’s budget. Bring your specific questions to get some advice about the challenges you have. The panel conversation will look to help you navigate the waters of managing risk in your company while providing some alternatives to the approaches you may have taken already.

Panelists

  • Britney Kennedy, Business Information Security Officer, Cardinal Health
  • Jason Kentner, Chief Information Security Officer, KCAS Bioanalytical & Biomarker Services

[1 CPE] 2023: The Year AI Went Mainstream

  Presented by Randy Lariar, Practice Director, Big Data & Analytics • Optiv

AI is accelerating the risk of fraud, but it can also be used to prevent and detect fraud. Companies need to be aware of both the risks and the benefits of AI and develop an offensive and defensive strategy to protect themselves from fraud. During the talk, we’ll touch on:

  • The recent history and latest developments in Generative AI, Large Language Models, ChatGPT, GPT-4, Google Bard, and more
  • How AI is increasing Risk already
  • How AI introduces new kinds of Risk
  • How AI can help solve some of the problems AI creates
  • Approaches for building an offensive & defensive Data and AI strategy

[1 CPE] KC Tech Specs

  Presented by KC Tech Council

Since 2017, the KC Tech Council has released KC Tech Specs, a report capturing data and analysis around Kansas City’s tech industry. The report is designed to give the tech community, businesses, educators, lawmakers, civic leaders, and students a consolidated, data-driven resource to find information about our region’s tech landscape. Data sources are cited on every page and feature a compilation of relevant statistics from KC Tech Council’s partners such as CompTIA and JobsEQ.

Tech enterprises rely on data to inform and drive business decisions every day. As the voice of Kansas City’s tech industry, we are proud to elevate the data within KC Tech Specs to help us collectively find the opportunities to leverage our strengths, improve our deficiencies and grow together as a tech hub of the future.

Bio: Erin Christensen serves as the Chief Operating Officer of the KC Tech Council, a membership-based association serving as the regional advocate for Kansas City’s tech industry. Prior to her appointment to COO in May 2022, Erin lead workforce initiatives for the Tech Council which included the implementation of a leading tech apprenticeship program. Her role currently focuses on member and sponsor engagement, supporting workforce development, and member program development. Before joining the Tech Council in October 2020, Erin had a long tenure working in higher education with a recent focus on corporate engagement.

She currently serves on the BSIT Advisory Board for The University of Kansas Edwards Campus and on the Industry Executive Council for the North Kansas City School District. Erin is in her second year of the Greater Kansas City Chamber’s Centurions Leadership Program. Receiving both her bachelor’s and master’s degrees from Northwest Missouri State University, Erin is originally from Rolla, MO but landed in Kansas City in 2014. She currently resides in Lees Summit, MO with her husband and daughter.