[1 CPE] Building Your Network: Role Models, Mentors, Coaches, and Sponsors

  Presented by Terri-Anne Wallen • Chief Risk Officer, CSG

In this presentation on building your network, we will provide an overview of the individuals you should connect with to support, develop, coach, and sponsor you. You will learn the unique differences between each of these roles and hear about real-life examples of the power that each can provide. Participants will then have the ability to identify these people in their own network. Further, the discussion will highlight the interconnection with imposter syndrome and illustrate how imposter syndrome exists for every single human. Terri-Anne and Andy will share their experiences to guide participants in understanding how they can approach individuals to be a mentor, coach, or sponsor and realize that asking is a form of flattery!

Terri-Anne Wallen:

Terri-Anne “TA” Wallen leads CSG’s Enterprise Risk Management organization with responsibility for Risk, Compliance, and Internal Audit. In her role as Chief Risk Officer, she provides support and guidance to the business to achieve accelerated growth through risk assessment, analysis, and various audits. She joined CSG in 2005 and established CSG’s Internal Audit and Risk Management functions. In her role, she increased capabilities and implemented efficiencies to meet dynamic business risks and the evolving needs of customers, built a strong, functioning team, and monitors risk mitigation across CSG’s global, growing business. Before CSG, TA spent time with Protiviti performing Internal Audit outsourcing projects, assisting in establishing the Internal Audit function for both eBay and PayPal, and is a KPMG alumnus. She has 25+ years of experience in building and maintaining Internal Audit and 15+ years of experience in Risk Management program development and facilitation. TA graduated from the University of Nebraska – Omaha with a Bachelor of Science in Business Administration – Accounting. She obtained her CPA certification and is a member of the IIA. TA serves as an Executive Sponsor in CSG’s first employee resource group, Women Engaged in Leadership, Education and Development (WE LEaD).

Andy Hinton:

Andy Hinton focuses on building relationships and providing value through independent and objective feedback on managing uncertainty; striving to turn risk into opportunity. In his current role at CSG, Andy leads a team of IT audit professionals through risk assessment, technology audits, and consulting.

Prior to CSG, Andy held audit roles at Bank of the West, TD Ameritrade, and Deloitte, where he performed IT, financial, and operational audits. With over 15 years of audit and information security experience, Andy has established himself as a trusted advisor to management. Andy holds Bachelor of Science in Business Administration and Master of Professional Accountancy degrees from the University of Nebraska – Lincoln and maintains several audit and security certifications. Andy has taught cybersecurity at Bellevue University, volunteers for the local ISACA chapter, and is a member of the Supervisory Committee at Centris Federal Credit Union.

[1 CPE] The Office of Tomorrow May Be Here Already

  Presented by INTERFACE Advisory Council

Since the start of the pandemic, your workflow and office structure have shifted tremendously. The way any firm operates now has adapted to the change in remote workers. We have seen return-to-office plans constantly changed, pushed backed, or completely scrapped. Has your company returned employees to the office? Are those plans on hold?

Join the INTERFACE Advisory Council for an open discussion about these items and more. Will your company have a large amount of staff permanently working remotely? Do you need more shared space workstations for employees? We will discuss some tips for preparing your IT staff for all the possible scenarios that will come your way.

Panelists

  • Rick Haugerud, Assistant Vice President, Information Technology Services, University of Nebraska
  • Matt Morton, Board Member, NebraskaCERT
  • Andrew Munger, Vice Chairman, Verterent
  • Jim Navin, Chief Information Officer, The Gavilon Group, LLC
  • Amber Roberts, Sr IT Support Analyst, The Gavilon Group, LLC

[1 CPE] Organizational Risk Management: Measuring Privacy Risk

  Presented by Lisa McKee, Senior Manager Security and Privacy, Protiviti

Organizations globally are obligated under legal, regulatory, and industry standards to manage risk. There are many facets to risk that organizations must manage, such as financial, security, and privacy risks. Organizations are currently able to prioritize security risk by conducting qualitative and quantitative security risk assessments based on the threat, likelihood, and impact on an organization’s ability to continue business operations. However, privacy risk assessments currently lack a clear calculation for identifying and prioritizing privacy risk.

Key Points to be covered:

  • Understand the different risk domains, specifically, what is privacy risk
  • Learn methods to identify privacy risks and minimize privacy harms to individuals
  • Develop techniques for conducting a privacy risk assessment
  • Identify approaches to include privacy in organizational risk management programs

[1 CPE] Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks

  Presented by Cybereason

It’s no secret that Ransomware presents an increasing danger to organizations–there has been a 105% increase in ransomware attacks since the beginning of COVID-19 alone, with 73% of those attacks being effective. Is your organization invested in the right defenses so that it does not fall victim to these costly and dangerous attacks?

If you’re concerned about ransomware, whether it’s beating today’s advancing attacks, stopping data exfiltration, or preventing the latest trend of “double extortion,” this session is for you. Join Cybereason’s Kraig Faulkner as he discusses the challenges faced by today’s ransomware attacks and how to stay on top of these types of threats.

[1 CPE] Ransomware Resilience: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Large organizations are still being forced to pay ransoms due to ransomware attacks. Disruptions to services and supply chains are putting ransomware victims in the news under a negative spotlight. Join recovery and resilience experts from Zerto to discuss best practices to minimize downtime and avoid paying ransoms by being prepared. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • What steps you can take to reduce the likelihood of attacks on your system
  • How to best choose a recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recovery quickly
  • How a company hit twice by ransomware improved recovery time from weeks to minutes by planning ahead

[1 CPE] Ransomware: Who, What, Why & How…

  Presented by Check Point Software

Over the last 12 months, ransomware attacks surged by 93% with a devastating impact on businesses and industries worldwide. In today’s hybrid IT environment, preventing ransomware attacks seems like an impossible feat. But is it?

In this session, we will cover the latest ransomware trends and how you can protect your organization from falling victim to sophisticated ransomware attacks.

[1 CPE] Ransomware In Focus: How AI Surgically Contains the Threat

  Presented by Darktrace

In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom or shut down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad-ranging and destructive, with organizations taking days, weeks, or even months to recover.

But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? Join this presentation to learn how Cyber AI is helping thousands of organizations fight back against ransomware. We’ll discuss:

  • The impact of ‘double-extortion’ ransomware and ‘ransomware-as-a-service’
  • Real-world examples of ransomware detected by Cyber AI
  • How self-learning AI responds proportionately to ransomware, thanks to its deep understanding of an organization’s pattern of life

[1 CPE] Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak & Aruba, a HPE Company

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, Aruba and Silver Peak will discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations

[1 CPE] SASE: The Power of Convergence

  Presented by Palo Alto Networks

Fueled by digital transformation and a massive shift to work-from-home, traditional enterprise networking and security infrastructures have been stretched to the breaking point. Legacy on-premises point-product approaches of yesteryear simply don’t make sense anymore. It’s time for a new model with the Secure Access Service Edge, or SASE (pronounced “sassy”).

SASE is quickly becoming the predominant network and security architecture that underpins our post-COVID world. SASE is the convergence of network services like SD-WAN, and security services like FWaaS, SWG, CASB, and ZTNA, into a single, cloud-delivered service model.

Join this presentation to learn:

  • Why networking and security must converge in the cloud
  • The key use cases driving SASE adoption
  • Real-world case studies of customers who have adopted SASE

[1 CPE] How to Advance Strategic Business Goals with IoT

  Presented by Aruba, a HPE Company

Whether it’s the allure of the concept of the Internet of Things (IoT), a fear of being viewed as a laggard, or internal pressure to do something new, many companies rush head-first into IoT projects without clearly defined objectives or value propositions. The result is a high rate of failure and subsequent disillusionment about the real value of IoT. If your company’s strategic goals require human productivity monitoring, human productivity organizational redesign, augmented reality, energy monitoring, and/or building security, Aruba’s ESP can expedite time-to-insight and time-to-value. The solutions can securely handle all manner of IoT devices and integrate them with enterprise business applications and processes. Join us to learn how you can reduce IoT deployment time to a fraction of what a custom-developed solution would require.