[1 CPE] Protecting Your Data from Ransomware Where it Lives: Your Last Line of Defense

  Presented by Hitachi Vantara

If an attack happens and it makes it all the way to your data, then they have already broken through all of your walls. Where your data lives IS your last line of defense, which is why the Armed Forces that protects the USA trusts Hitachi to protect them. Prevention is great and all but without that last line of defense, you’re a sitting duck. Attend this session to learn how Hitachi serves as your last line of defense against ransomware attacks.

[1 CPE] Why Smart Cities Are Safer Cities Thanks to Real-Time Data and AI

  Presented by iT1 Source & Wireless Guardian

Intelligent technology helps public safety organizations gain a holistic understanding of their cities, deepen public confidence and strengthen community connections. This session will explain the relationship the using Real-Time Data and Artificial Intelligence to create safer, more resilient communities. As part of the discussion, the presenter will explain the following:

  • Data and AI are helpful in real-time response
  • Data and AI are also reshaping long-term public safety processes
  • How smart safety technologies aid in environmental monitoring, emergency management and other situations
  • How smart technology pulls in signals from an array of sources across cities

The presenter will also stress public safety isn’t a top-down hierarchy. It’s actually a collective effort that prioritizes the needs of the community and depends on strong relationships. By realizing the future of public safety, smart city technology transforms the ability to serve local communities.

[1 CPE] Security and Resiliency for Your Most Critical Data

  Presented by Cohesity

Join this session for a walk-through of a real-world ransomware attack and the necessary steps to recover. We will cover a cyber insurance form to show how it aligns with our “Protect, Detect, Recover” point of view, and we will speak to the specific capabilities associated with each point.

[1 CPE] Securing a Distributed Network with ZTNA, SASE, & a Cybersecurity Mesh Platform

  Presented by Fortinet

Securing connected resources and the different pieces of a distributed network can be challenging. Join this session to explore the advantages of using SASE and a ZTNA architecture to provide secure, application-based access over the traditional VPN access most enterprises use today. We’ll also examine how employing Gartner’s Cybersecurity Mesh Architecture can simplify Network and Security operations.

[1 CPE] How to Get the Security Budget You Deserve

  Presented by CYE

Because of the current economic downturn, security leaders are being forced to stretch their budgets further, even as devastating cyberattacks continue to proliferate. Given these challenges, how can CISOs convince their board members to support a robust and effective cybersecurity budget?

In this session moderated by Bryan Hurd, Reuven Aronashvili and Ira Winkler will highlight the best ways to stretch your security budget, including which investments will provide the most bang for your buck. Perhaps most importantly, however, Reuven and Ira will also touch on how CISOs like you can present your security recommendations and successfully receive the budget you deserve.

[1 CPE] Understanding APIs and API Security Testing

  Presented by Synack

According to Gartner’s July 2022 analysis of the application security space, over 80% of today’s web traffic is API traffic. As of 2022, API abuses will move from an infrequent to the most-frequent attack vector, resulting in data breaches for enterprise web applications. Hence, it is imperative that security organizations have a firm understanding of APIs and API security testing approaches.

This presentation covers:

  • Definition of an API and How APIs Work
  • Types of API Testing
  • Headless API Offensive Penetration Testing
  • API and OWASP

[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve

Data is expected to grow to 200 ZB by the end of 2025. More data to manage, more data to protect. IDC recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new “1” is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies of it allow for a resilient recovery plan. Your cyber security plan is incomplete without a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us as we share best practices to help keep your data protected and secure with multiple layers of defenses. We will share our perspective on how organizations can simplify the approach of incorporating guidance from NIST’s Cybersecurity Framework into their own environments.

Presented by Steve Kleis, Principle Sales Engineer

Over the past 20 years, I’ve been fortunate to know many business owners and be part of their IT management strategy. As a trusted advisor I worked to understand their business needs and design solutions that were fast and reliable. I have extensive experience with data backup, disaster recovery (DRaaS), business continuity, cloud storage, ransomware, and Network Attached Storage (NAS).

Currently, I am a sales engineer for Arcserve/Storagecraft supporting the North Central territory. As a member of a sales team, we work to help our customers protect what’s priceless, their data.

[1 CPE] How AI Can Think Like an Attacker

  Presented by Darktrace

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen and to recover if compromised. In this session, we’ll unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

[1 CPE] Top 10 Myths and Misconceptions About Ransomware

  Presented by Bitdefender

2021 was “the year of ransomware.” But so were 2017, 2018, 2019, and 2020 – and so far, 2022 is not very different. Ransomware is no longer a problem discussed only in the cybersecurity and tech communities – it is now a regular topic in mainstream media headlines and executive board meetings.

So why is ransomware such a menace, and why can we not seem to get rid of it? One of the reasons is that we seem to miss the continued evolution of ransomware. We keep preparing for the last war. Ransomware in 2022 is very different than ransomware in 2017, yet we still treat it the same way.

Roy Correa, Enterprise Field Engineer will help you to learn more about:

  • Ransomware evolution and what we need to un-learn to effectively combat it
  • The most common myths, misunderstandings, and misconceptions about ransomware and the threat actors behind it
  • The most effective tips to become more cyber resilient and prevent security incidents from turning into catastrophic breaches