[1 CPE] Architecting a Data-Centric Approach to Zero Trust

  Presented by Aaron Kremer, Technical Solution Specialist • NetApp

Security has become a key pillar to protect data, data management and mobility is critical for ensuring the data is where it is needed, and with all the complexity everyone is managing, simplicity is key to helping customers accelerate their outcomes.

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Liran Chen, Vice President, Sales Engineering & Technical Services • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

[1 CPE] From Silos to Synergy: The Power of Cybersecurity Platformization

  Presented by Jonathan Becker, Security Engineer • Check Point

Attendees will gain insights into the power of platformized cybersecurity, discovering how it can transform security operations into a more agile, integrated, and proactive defense mechanism.

In today’s rapidly evolving digital landscape, organizations are confronted with a growing and diverse array of cybersecurity threats. This presentation explores the transformative shift toward platform-based cybersecurity solutions, emphasizing how platformization can enhance security posture across the enterprise.

We will begin with a brief history of platformization, tracing its evolution from isolated security tools to integrated, cohesive frameworks. We’ll delve into how platformization unites disparate security tools, systems, and processes, creating a unified approach that improves threat detection, response, and mitigation. By breaking down traditional silos and fostering seamless communication across security layers, platformization enables organizations to respond more swiftly and effectively to emerging threats, reduce operational complexity, and bolster overall resilience.

[1 CPE] Zero Trust Made Simple: Transforming Security Without Complexity

  Presented by Tony Steffe, Sr Systems Engineer, CISSP • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

Tony is a knowledgeable technical professional with 20+ years of experience developing, selling, and integrating technology for enterprise customers. He is effective in sales engineering, Internet security, project management, computer networking, and interpersonal relations. Exceptional at managing the personal and technical challenges that arise from building something new, Tony has successfully built out several high-impact IT projects.

[1 CPE] Unleashing the Power of XDR: Elevating Security for Everyone!

  Presented by Aaron Biancrosso, Regional Account Director, and Jeff Baine, Solutions Architect • Barracuda & BlackPoint

Cyberattacks can reach your organization from any device and attack surface. With limited cybersecurity resources, how do you keep up with the ever-increasing volume of sophisticated, AI-powered attacks? Join this session to learn more about:

  • Transforming Security with XDR Solutions
  • Enhancing Protection within your environment
  • Simplifying the SOC Maturity Model
  • Improved visibility
  • Automated incident response
  • Integration with existing security tools

[1 CPE] Optimizing for Agility: Network and Security Convergence

  Presented by Steve Riley, Field Chief Technology Officer • Netskope

Integrating a complex ecosystem across all security areas can optimize defenses without simplifying adversaries’ challenges. This approach balances robust security with efficiency, crucial for navigating generative AI and tech advancements. Achieving this requires strategic selection and consolidation of platforms to enhance agility, reduce risk, and maintain cost-effectiveness. In this session, you’ll learn:

  • The composition of an effective security architecture
  • Value you can derive from a converged networking and security platform
  • Common consolidation mistakes people make and how to avoid them

[1 CPE] Hyper-V 2025 and Azure Local: A Powerful Partnership

  Presented by Robert Quimbey, Sr Solutions Architect • Pure Storage & Structured

Microsoft Server 2025 and Hyper-V increases scalability, introduces new features like GPU partitioning, enables VM live migration of VMs running GPU workloads on those partitions, hot patching, SMB over QUIC, and more! Learn about Microsoft Integrations that work on-premises and in the cloud! Azure Stack has been rebranded Azure Local. Learn about Pure’s work to integrate and see live demos!

[1 CPE] Harnessing AI for Better Network Experiences

  Presented by Spencer Rolfs, Product Marketing Manager, Wireless • Juniper Networks & Structured

What if your network could anticipate and solve problems before they affect your users? We believe that fast connectivity alone isn’t enough – it’s the quality of the connection that truly matters. Solutions that leverage AI for IT operations (AIOps) will raise the standards of industry norms with an experience-first approach. By seamlessly managing operations across the full stack, you can ensure not just connectivity, but an exceptional network experience. Join us to discover how an AI-native network can significantly reduce networking trouble tickets by up to 90%, lower OpEx by up to 85%, and improve incident resolution times by up to 50%.

Join us as we explore the future of networking by transforming complex challenges into streamlined operations, making networks more responsive, efficient, and user-centric than ever before.

[1 CPE] Proactive Threat Mitigation Through East/West Traffic Isolation

  Presented by Rich Horsely, Channel Sales Engineer • HPE Aruba Networking & Structured

Ransomware and targeted cyber security threats are on the rise. A proactive prevention strategy should use both tried and proven methodologies as well as new and emerging technologies. East West traffic identification and isolation is key in preventing malicious content from spreading, both in the Data Center and at the Campus Edge of the network. We will focus on innovative approaches to address the security compliance, performance, agility, and scalability demands of today’s highly distributed, hybrid, network environments.

[1 CPE] Fortifying the Digital Landscape: Integrating Regulation with Cybersecurity and GRC

  Presented by Rob Wayt, Director, Governance, Risk & Compliance • Structured

In today’s digital landscape, organizations face an increasing challenge to safeguard their information assets amidst evolving cybersecurity threats, regulatory demands, and operational complexities. This presentation explores the critical interplay between cybersecurity, compliance, risk management, and governance in the protection of sensitive data and information assets. Attendees will gain insights into best practices for creating a resilient cybersecurity program that aligns with regulatory requirements and organizational goals, supporting robust governance structures. Key topics include strategies for assessing and utilizing AI, implementing compliance controls, fostering a culture of security, and leveraging governance to ensure accountability and continuous improvement. This session provides a comprehensive approach for leaders and professionals aiming to secure information assets and enhance resilience in the face of emerging cyber threats.