[1 CPE] From Liability to Asset: Securing Unstructured Data at Scale in the Era of AI

  Presented by Rubrik

Unstructured data is the lifeblood of the modern organization, yet its sheer volume often outpaces the strategies meant to protect it. As this data becomes the fuel for future AI initiatives and business intelligence, the “old way” of managing NAS has become a primary point of failure.

In this session, we’ll dive into how Rubrik NAS Cloud Direct (NCD) redefines the protection of PB-scale file systems. We will explore a modern architectural approach that provides the speed, visibility, and cloud-native flexibility required to turn massive data sets into resilient assets. Whether you are preparing for an AI-driven future or simply struggling with the growth of your current footprint, this session will provide a blueprint for total unstructured data control.

[1 CPE] The Speed of Trust: Why Your AI Strategy is Only as Fast as Your Security Architecture

  Presented by Chris Staley, SASE Specialist • Palo Alto Networks

In the race for AI dominance, many businesses are hitting the brakes because their security can’t keep up. They’re stuck in the “Fragmentation Tax”—managing 60+ tools that don’t talk to each other while trying to govern a world of prompt injections and “Shadow AI.” Chris Staley, SASE Specialist at Palo Alto, will present on how organizations need to think about these challenges. Many organizations are caught between the need to reduce tool sprawl and contending with the hidden costs of adopting incomplete platforms.

[1 CPE] Cybersecurity and Compliance For 2026

  Presented by Structured

This session examines how organizations can align cybersecurity, privacy, and compliance programs with the realities of 2026. The presentation reviews current threat trends, executive accountability requirements, and the expanding impact of artificial intelligence on risk management. It then connects federal, state, and industry obligations, including NIST CSF 2.0, HIPAA, CJIS, PCI DSS 4.0, CMMC, and emerging privacy laws to practical security program design. Attendees will leave with a clear framework for building a complete security program that integrates governance, segmentation, risk management, Zero Trust principles, and penetration testing to reduce risk and support regulatory readiness.

[1 CPE] 6 Hard Lessons from Zero Trust Deployments: What the Field is Actually Seeing

  Presented by John Spiegel, Security CTO and HPE Distinguished Technologist • HPE Networking

Zero Trust has quickly moved from security concept to board-level mandate. Yet the reality inside most organizations is far messier than the architecture diagrams suggest.

Based on several hundred interviews with IT and security practitioners as well as the analyst community, this session explores what actually happens when organizations attempt to implement Zero Trust. The findings are sobering: roughly 60–70% of Zero Trust initiatives stall before reaching maturity, and fewer than 20% achieve a fully realized Zero Trust architecture.

Rather than focusing on theory or vendor frameworks, this session examines six hard lessons from the field, highlighting both the successes and the failures organizations encounter along the way. Topics include why many Zero Trust initiatives stall, where organizations underestimate complexity, the architectural decisions that matter most, and what successful deployments do differently.

This presentation is not a product pitch. Instead, it’s a candid discussion of the hard realities of Zero Trust deployment, grounded in the experiences of practitioners across hundreds of organizations. Attendees will leave with practical insights into what works, what fails, and how to move a Zero Trust initiative from concept to operational reality.

[1 CPE] Inside the 2026 Threat Detection Report: A First Look at this Year’s Report

  Presented by Red Canary

Join us for a deep dive into our 2026 Threat Detection Report. We’ll reveal how identity threats have skyrocketed to account for more than half of all detected threats. We will discuss how adversaries are weaponizing the “human element” through “paste-and-run” tactics and discover why the browser has become the ultimate frontline for both defenders and attackers alike. You’ll leave with better knowledge of the top threats and techniques, along with our recommendations on how to handle them.

[1 CPE] Beyond Backups: Building a Cloud Disaster Recovery Strategy that Works

  Presented by Seth Eliot, Principal Resilience Architect • Arpio

You’ve backed up your data. You’ve secured your application code and infrastructure as code. You’ve documented runbooks. But when Google accidentally deleted a customer’s entire cloud environment for a week, or when Change Healthcare’s partners refused connectivity for 90 days after a breach, backups alone weren’t enough. The real objective is to recover quickly and completely—data, infrastructure, networking, configuration, and security principles—all together.

In this talk, you’ll learn the requirements for fast, reliable recovery, including cross-region and cross-account isolation, complete workload recovery, and testability. We’ll walk through the design decisions you need to make and how you can implement them using cloud native tools. All while applying best practices to reduce toil and test your DR strategy safely and frequently.

[1 CPE] 2026 Cyber Crime Trends and Improving Security with Operation Winter Shield

  Presented by FBI Portland Cyber Task Force

Hijacked networks, cryptocurrency heists, and corporate espionage are but a few examples of the spiraling cyber threat. Every year, our adversaries become savvier and increasingly callous – attacking power grids, shutting down hospitals, and stoking geopolitical tensions. State-sponsored cyber actors wield every element of their national power to target the United States and its critical infrastructure. Skilled cybercriminals exploit new and longstanding vulnerabilities to steal our money and hold our data for ransom.

Combating these threats is the primary mission of the FBI’s cyber program. As the lead federal agency for investigating cyberattacks and intrusions, we engage with victims and work to unmask those committing malicious cyber activities, wherever they are.

Join us for a session from an FBI Special Agent to learn how you can improve your security approach.

[1 CPE] The Great VM Escape: Live Migration Demo from VMware to AHV

  Presented by Nutanix

Join us for a live, end-to-end demonstration of migrating virtual machines from VMware to Nutanix AHV—no fluff, just real results. We’ll showcase the power of Nutanix Move to seamlessly convert and migrate VMs from Microsoft Hyper-V, ESXi, and even cloud environments to AHV with minimal disruption. If you’re evaluating modernization strategies or planning a hypervisor transition, this session delivers practical insights you can apply immediately.

[1 CPE] Data Resilience in the Age of Attack: Protect What Matters

  Presented by Landra Pierce, Product Strategy Technologist • Veeam

Cyberattacks are no longer a distant threat; they are a reality every IT team must be prepared for. When an attack occurs, your data becomes both the primary target and the key to recovery. Many organizations still rely on backup strategies that are designed for hardware failures or accidental deletions, rather than today’s threats, like ransomware, insider risk, and automated attacks. This disconnect creates vulnerabilities, especially when backups become an overlooked entry point in your security strategy. In this session, we will address these challenges to help you better protect your organization.

This session is ideal for IT professionals who want greater confidence in safeguarding their data and peace of mind. We will examine the most common oversights that leave organizations, including those in government, education, healthcare, and other sectors, exposed to cyberthreats. You’ll discover how teams are advancing beyond basic backup to adopt a cyber-ready approach, including topics like immutability, threat awareness, rapid recovery, and intelligent automation.

Our focus will be practical and grounded in real-world scenarios, and what truly works when pressure is high and time is limited. Because when every minute counts and trust is at stake, data resilience means more than surviving an attack. It’s about protecting what matters most and emerging even stronger.

[1 CPE] Driving Successful AI Adoption in 2026

  Presented by Hunter Helfgott, Data & AI Consultant & Abram Erickson, Data & AI Solutions Architect • Cerium Networks

In this session, we’ll cover the critical steps organizations can take to adopt AI successfully this year, including proven strategies, common pitfalls, and practical frameworks to move from experimentation to enterprise-wide implementation. You’ll leave with actionable guidance to align AI initiatives with business goals, build organizational buy-in, and measure ROI in a way that lasts.

AI adoption is about making AI deliver real business outcomes without creating unnecessary risk, rework, or frustration.

What We’ll Cover

  • The state of AI adoption in 2026: key trends and challenges teams are facing
  • Lessons learned in 2025: what worked, what did not, and what to do differently this year
  • A practical framework for successful AI adoption: from strategy to execution
  • Measuring success: KPIs, governance, and how to prove value over time