[1 CPE] Ransomware Resilience: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Large organizations are still being forced to pay ransoms due to ransomware attacks. Disruptions to services and supply chains are putting ransomware victims in the news under a negative spotlight. Join recovery and resilience experts from Zerto to discuss best practices to minimize downtime and avoid paying ransoms by being prepared. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • What steps you can take to reduce the likelihood of attacks on your system
  • How to best choose a recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recovery quickly
  • How a company hit twice by ransomware improved recovery time from weeks to minutes by planning ahead

[1 CPE] Payment Card Industry Compliance: How to Become and Stay Compliant

  Presented by Structured

This presentation will discuss the difficulties of becoming and staying compliant with Payment Card Industry (PCI) requirements. Although currently in version 3.2.1, the updated Data Security Standard (DSS) 4.0 is coming soon and there are numerous changes and enhancements that must be complied with. Whether you are just beginning with PCI for your organization or have many years of experience, there are many challenges, both old and new that can create roadblocks to compliance. With emerging technologies such as zero-trust architecture ready for implementation, find out how to best use these controls for your organizational goals. This presentation will cover the requirements, trouble areas to be aware of, and how you can utilize specific technology in your compliance effort.

[1 CPE] Maelstrom of Security

  Presented by Jerry Petru • President, InfraGard State of Washington Chapter

Join this research-based, high-level session with a twist of humor, on the challenges all businesses face today. This will not be a live demo or hands-on how-to, but rather is designed to arm attendees with information as a takeaway and allow for rumination on what can be done better in their environment.

Hacking activity is at an all-time high as home cloud & Covid-19 remote working has become the standard. Where are you in your cloud journey? Automating in silos will never simplify organizational transformation. Relevant for Key Stakeholders of Business Units, CSOs, CISOs, CEOs, IT management, and support roles in networking and security backgrounds, this discussion will cover bad hygiene and password complexity.

Mr. Petru is a Fellow of the British Computer Society (BCS), The Chartered Institute for IT. He is an innovative, and technically sophisticated professional, offering substantial years of broad-based experience in evaluating large corporate systems as well as in identifying operating systems and software issues between different hardware platforms. Today, Jerry is the President of The Washington State InfraGard Chapter. Mr. Petru also owns an SDVOSB “Veterans for Cybersecurity Framework L.L.C.”.

Powered with a comprehensive background in development and implementation, he has authored more than forty-two different courses and two books based on AIX/UNIX, Security, Linux, Networking, and Virtualization technologies teaching to an audience of thousands around the world for the past twenty-five years. Jerry has spoken at forty-nine International Conferences over the past twenty-one years. He is equipped with a proven track record of success in designing and implementing system security, high availability, disaster recovery, and long-range strategic plans for Fortune 100 Companies. Mr. Petru is armed with stellar qualifications in all facets of project lifecycle development, from initial analysis and conceptual design to implementation, quality review, and enhancement to optimize operational efficiencies that improve business and IT operations.

[1 CPE] The Future of Cyber Education: How to Create a Cybersecurity Culture

  Presented by Heather Stratford • CEO, Drip7

Cybersecurity education has evolved into its own industry category within IT over the past ten years. Ninety percent of data breaches can be traced back to human error. IT teams around the globe are constantly learning about and implementing new safeguards to use technology as the protection for safeguarding personal data and company information. Addressing the “people factor” of cybersecurity is both more complicated and often difficult for IT teams to successfully navigate.

Heather calls Spokane home and is a national thought-leader in the IT Training and Cybersecurity field. She is the founder and CEO of Stronger International and more recently Drip7 — a microlearning platform for cybersecurity education. She has helped a wide range of clients with cyber and compliance education from General Motors, Stanford, SABIC, MultiCare, and Deloitte. Heather regularly gives keynote speeches, writes articles, and is frequently asked to comment on National cybersecurity topics. She has a passion for including more diversity and women in cybersecurity and entrepreneurial start-ups. Heather is a National Tory Burch fellow, graduate of the Goldman Sachs 10,000 Small Businesses Program, received the Women in Business Leadership Award, and is an adjunct professor at Whitworth University in their MBA program. She has 5 children, loves to travel and waterski, and has recently shifted from mountain biking to riding motorcycles.

[1 CPE] Security vs. Compliance: Turning InfoSec Success into Audit Wins

  Presented by Tripwire

Security and compliance teams both strive to design, establish, and enforce controls to protect an organization. But even with shared goals in place, security and compliance teams often manage business risk in relative isolation. So how can these teams set aside tension and work better together to create a winning alliance?

In this session, we explore the key differences between security and compliance initiatives. It’s crucial to understand that being fully compliant doesn’t necessarily mean an organization is fundamentally secure. We’ll cover how the two initiatives complement each other when it comes to minimizing risk and how both teams can collaborate to create efficiencies. Attendees will learn how to leverage compliance policies to set the foundation to a robust information security program, while providing true visibility and coverage, consolidating toolsets, and reducing costs. Lastly, we’ll discuss how to ensure that a successful security program can help organizations prepare for an upcoming audit to ultimately achieve and maintain continuous compliance.

[1 CPE] Security at the Edge of Hybrid Work

  Presented by Citrix Systems

Robust and secured internet connectivity is essential to delivering on the promises of hybrid work. From defining the scope of experience across the workforce to protecting privileged and administrative access, evolved technologies and protective measures are required from the browser to the cloud. This session will help you understand how security at the edge combined with robust application access management and secured browser solutions enable the security outcomes essential to hybrid work.

[1 CPE] The Hybrid Office Environment is Here to Stay

  Presented by INTERFACE Advisory Council

Since the start of the pandemic, your workflow and office structure have shifted tremendously. The way any firm operates now has adapted to the change in remote workers. We have seen return to office plans constantly changed, pushed backed, or completely scrapped. Has your company returned employees to the office? Are those plans on hold?

Join the INTERFACE Advisory Council for an open discussion about these items and more. Will your company have a large amount of staff permanently working remotely? Do you need more shared space workstations for employees? We will discuss some tips for preparing your IT staff for all the possible scenarios that will come your way.

Panelists:

David Guggenbickler, VP, Director of Service Operations, Umpqua Bank
Michael Sloon, Director, ITSD, City of Spokane
Joe Sams, Manager, Information Systems, Teck American Incorporated

[1 CPE] The Anatomy of a Ransomware Attack

  Presented by Red Canary

In this presentation, we walk through the Anatomy of a Ransomware Attack. Bobby Mazzotti will lead the discussion on best practices and strategies you can apply at your organization. In this webinar, security leaders will learn:

  • How to enhance your team’s abilities to identify security incidents
  • The key components of a ransomware attack
  • Effective ways to improve your security program

[1 CPE] Cybersecurity Market Trends and MDR

  Presented by Bitdefender

Mobile workforces were already an increasing trend in business even before we all had to deal with sending our teams home during the pandemic. As many of us work through our return to office plans with hope in our hearts, it is clear that the remote work trend has intensified and will likely continue to do so in the future.

Remote work has challenged traditional security approaches and forced us to think harder about how we can best support the changing nature of work. Thankfully, many of the technology, process, and people changes needed to support remote workers have significant benefits in our overall security posture.

For this session, we’ll talk about trends our security operations center saw in remote work environments and their impact on security operations, discuss theories around how to plan and support these workers, and talk about technology approaches that may help your organization support these workers better while improving your overall security posture.

[1 CPE] Ransomware In Focus: How AI Surgically Contains the Threat

  Presented by Darktrace

In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom or shut down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad-ranging and destructive, with organizations taking days, weeks, or even months to recover.

But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? Join this presentation to learn how Cyber AI is helping thousands of organizations fight back against ransomware. We’ll discuss:

  • The impact of ‘double-extortion’ ransomware and ‘ransomware-as-a-service’
  • Real-world examples of ransomware detected by Cyber AI
  • How self-learning AI responds proportionately to ransomware, thanks to its deep understanding of an organization’s pattern of life