[1 CPE] Cyber Risk Associated with Quantum Computing

  Presented by BJ Deonarain, Global Alliance Cybersecurity Solutions Director • Hitachi Vantara

Quantum computers can break today’s standard encryption algorithms (RSA, ECC) in minutes relative to time using Shor’s/Grover algorithm. “Harvest Now, Decrypt Later” attacks allow adversaries to steal encrypted data now and crack it when quantum computers mature. Quantum systems themselves are vulnerable to new attack vectors, quantum hacking (side-channel, noise-based), quantum malware, and manipulation of qubit stability. Supply chain attacks targeting quantum hardware, proprietary algorithms, and insider threats are rising as nation-states and cybercriminals escalate espionage efforts. Urgent need for quantum-resistant cryptography and robust quantum cybersecurity measures as quantum adoption accelerates.

BJ Deonarain is a globally focused cybersecurity executive responsible for driving cyber security and cyber resiliency strategy at Hitachi Vantara. With a career spanning technical innovation, client solutions, and cross-functional leadership, BJ combines deep technical expertise with a client-centric approach to mitigate risk and elevate organizational security postures.

[1 CPE] Networking Tips and Best Practices for C-Suite to Jr Admin

  Presented by Robert Phelps, Systems Engineer, Customer Engineering • Arista Networks

Modern IT networks are a living entity that requires care and feeding. If the infrastructure, tooling, and staff are neglected or taken for granted, loss of network resiliency, increased tool sprawl, and staff exodus are inevitable. Take one or more of these recommended tips in-house to make your network more resilient, easier to manage, and foster an IT working environment that will keep top talent on board for years to come.

[1 CPE] From Chaos to Control: How Zero-Trust Networks Run Themselves

  Presented by Sukesh Garg, Vice President of Products • Nile

Many organizations still manage and secure their campus and branch networks based on a trust model designed for days past — a fragile web of switches, controllers, and security tools stitched together, never designed to secure IoT, sophisticated malware, and evolving AI threats.

The result is operational chaos, well-known vulnerabilities, and the constant feeling that something is missing. In this session, we’ll outline how leading enterprises are shifting to a Network-as-a-Service (NaaS) with completely re-designed architecture that’s built on top of modern Zero Trust Fabric — where Zero Trust security is delivered on day one. No complexity, add-ons, or legacy vulnerabilities.

With Nile, every user and device is isolated by design, micro-segmentation and granular policies provide enhanced identity-based enforcement — without the cost, complexity, and traditional risk.

Key Takeaways:

  • Traditional network security no longer meets today’s evolving security and compliance demands.
  • Zero-Trust compliance is within reach, without years of integration projects and missed timelines.
  • Reducing incidents and regaining operational control starts with a modern approach that aligns network and security requirements.

[1 CPE] Go Hack Yourself: War Stories from over 170,000 Pentests

  Presented by Tony Taylor, Sr Solutions Architect • Horizon3.ai

Join Tony Taylor, Senior Solutions Architect, for an engaging session on “Offense-Driven Defense.” Tony will challenge conventional risk assessment practices and unveil how focusing on real-world exploitability and impact can revolutionize your security approach. Drawing from insights gathered across more than 170,000 autonomous pentests, he’ll share compelling stories and actionable lessons that show how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and strengthen your defenses against advanced threats. Don’t miss this opportunity to learn from a leading industry practitioner on why it’s time to “go hack yourself” and build resilience in today’s borderless threat environment.

[1 CPE] Exponential Mindfulness: Harness the Power You Already Have!

  Presented by Derek Kruse • Chief Information Officer, Douglas Omaha Technology Commission

Mindfulness is for everyone—yes, even you! Exponential Mindfulness delivers practical tools to finally make mindfulness accessible and useful across all aspects of your personal and professional life. This presentation will introduce you to a universal and easy to implement mindfulness management framework. Now is the time to break through difficult challenges, capitalize on mindful momentum, and build resiliency for compounding improvement.

Derek Kruse has over 25 years of organizational leadership experience. He has held leadership positions in Fortune 500 companies, the nonprofit sector, government, and higher education. Derek is the Chief Information Officer for the Douglas Omaha Technology Commission (DOTComm), which serves the technology needs of the City of Omaha and Douglas County in Nebraska. He is also an Adjunct Assistant Professor at Creighton University in the fields of strategy and entrepreneurship.

He recently launched Exponential Mindfulness to help people harness the power they already have by using simple tools to overcome challenges and build resilience for compounding growth.

He holds a bachelor’s degree from Cornell University, where he played varsity basketball for four years; an MBA from Emory’s Goizueta Business School and a DBA from Creighton’s Heider College of Business. He also holds a certificate in Strategy Execution for Public Leadership from Harvard and a certificate in Mindful Leadership from Spirit Rock.

Derek, his wife Dana, and their two children are native Cornhuskers and live in Bennington, NE.

[1 CPE] Change Leadership Propelling You and Your Business

  Presented by Bradley Pristelski, Central Region CIO, CommonSpirit Health

Propelling change forward in any organization is a difficult leadership challenge. People naturally resist change and view it uncomfortable, difficult work, and time-consuming. The best leaders co-create change amongst their teams and throughout the organization before the problem or opportunity first materializes which creates a high sense of ownership that can’t be overstated. As the saying goes, “Don’t involve me in the landing if you don’t involve me in the takeoff.”

[1 CPE] Beyond the Checkbox: Building Security Beyond Compliance Frameworks

  Presented by Matthew Ziegler, Director of Advisory and Success, MBA, CISSP, CISA  • Novacoast

Too often, organizations see governance and compliance as a means to an end: passing an audit, gaining a certification, or filing a report. Really, these are just the start of the Information Security journey. In this session, we’ll explore how leaders can move beyond “checkbox compliance” by aligning governance with real-world risk, embedding security into culture, and using frameworks like PCI DSS, ISO 27001, NIST CSF 2.0, and CMMC as foundations for continuous improvement rather than static achievements. Drawing from real-world experience leading global SOCs, audits, and board-level risk programs, I’ll share strategies for changing direction from compliance-driven to resilience-focused, and how to communicate these strategies to executives, regulators, and staff.

[1 CPE] New Era of Deception: AI, Deep Fakes, and the Dark Web

  Presented by Morgan Trust, Associate Penetration Tester • FRSecure

Explore how artificial intelligence is fueling a new wave of cyber deception through deep fakes, social engineering, and dark web activity. In this session, Morgan Trust, Associate Penetration Tester at FRSecure, will uncover real-world examples and emerging threats while offering strategies to spot and defend against them. Gain the knowledge you need to navigate this evolving landscape with confidence.

As an Associate Penetration Tester at FRSecure, Morgan brings five years of experience and holds both the eLearnSecurity Junior Penetration Tester and CompTIA Security+ SY0-601 certifications to the table. Morgan is an extremely valuable asset to the team who works directly on the front lines with FRSecure’s clients. In his free time, Morgan enjoys Capture the Flag competitions, weightlifting, cooking/baking, dancing, listening to music at max volume, hiking, thrifting, and spending time with family.

[1 CPE] Beyond Cybersecurity: Assembling Resiliency for the Inevitable Breach

  Presented by BJ Deonarain, Global Alliance Cybersecurity Solutions Director • Hitachi Vantara

The Imperative for Resiliency, 100% cyber security is unachievable; breaches are inevitable, where modern threats demand a shift from reactive defense to proactive resilience. Resilience requires mindset and culture change, not just new technology, while focus can sustain operations and limit damage when security fails.

Assembling the resiliency strategic pillars and actions:

  • Risk Assessment: continuous evaluation of assets and vulnerabilities
  • Incident Response: develop, test, and update comprehensive crisis plans
  • Employee Training: ongoing education to make staff the first line of defense
  • Systems Testing: regular audits, penetration tests, and vulnerability scans
  • Partnerships: collaborate with industry experts for knowledge sharing
  • Culture: embed resiliency throughout the organization at every level

BJ Deonarain is a globally focused cybersecurity executive responsible for driving cyber security and cyber resiliency strategy at Hitachi Vantara. With a career spanning technical innovation, client solutions, and cross-functional leadership, BJ combines deep technical expertise with a client-centric approach to mitigate risk and elevate organizational security postures.

[1 CPE] Has Security Awareness Been Forgotten? An Interactive Panel Discussion

  Presented by INTERFACE Advisory Council

“Just automate that process! The firewall is fine—we’ve got an AI tool watching it.”

Sound familiar? Despite significant investments in cybersecurity and advanced tools, the human element remains one of the greatest vulnerabilities in any organization. This isn’t a new problem—ransomware attacks continue to thrive due to human error.

Insider threats, whether intentional or accidental, are often at the root of security breaches. So, what proactive steps are you taking to mitigate these risks?

Join the INTERFACE Omaha Advisory Council for an engaging discussion on defending against internal threats. Local IT leaders will share their strategies, lessons learned, and practical tips for minimizing human error in cybersecurity. Bring your questions and join the conversation as we explore what’s working, what’s not, and what more needs to be done to protect our networks from within.

Panelists:

  • Rob LaMagna-Reiter, Chief information Security Officer, Woodman Life
  • Dr. Lisa McKee, Assistant Professor Cybersecurity, Bellevue University
  • Memory Trosper, Sr Director, Technology Services, Gothenburg Health
  • Dana Turner, Chief Information Security Officer, Union Bank and Trust