[1 CPE] Building a Response Strategy to Advanced Threats

  Presented by ExtraHop Networks

The SolarWinds SUNBURST attack was a rude awakening for many security teams, and it won’t be the last time Security leaders face tough questions about how an adversary evaded defenses and stayed hidden. With threats persisting inside the network for months, security teams need a new plan. In this session, CISO Jeff Costlow discusses strategies, including revising existing mental models and incident response processes, to build resilience in the fight against advanced threats.

[1 CPE] Cybersecurity Maturity Model Certification: Considerations for Compliance

  Presented by Matanuska Telephone Association

Everything You Need to Know About CMMC:

In 2007, Chinese hackers successfully targeted a Department of Defense (DoD) subcontractor leading to the creation of a powerful fighter jet. During this cyberattack, the Chinese stole enough data to make their J-20 stealth fighter jet a real threat to the USA. The reality of this attack is that it wasn’t just a one-off event—over $600 billion is lost globally due to cyber theft every year. With that in mind, the DoD knew something needed to change.

Changes to cybersecurity compliance are coming. Before the introduction of the cybersecurity maturity model certification (CMMC), any self-attesting defense contractors could say that they were compliant with specific cybersecurity guidelines—without having to prove it. This not only left room for contractors to become complacent but diminished all compliant defense contractors’ credibility. In short, contractors who were reckless with sensitive information weren’t held accountable—until now.

With the rollout of the CMMC, contracting with the DoD is more specialized than ever—especially if you’re dealing with controlled unclassified information (CUI). But these new guidelines also mean the space will become more lucrative. It’s estimated that 129,810 businesses will likely pursue CMMC certification in the first 5 years.

CMMC boils down to 3 major points:

  1. It’s mandatory. All CMMC requirements will explicitly address what level your company needs to be at to send or receive any future federal agency RFIs and RFPs.
  2. It’s verifiable. Proof of certification will be accessible electronically.
  3. It’s a long-term investment. Many organizations see between 12-18 months of continual effort to complete their compliance projects fully.

Presented by Rob Thurston, Chief Technology Officer at Ampersand, Alaska’s leading technology services provider, attendees will learn about compliance requirements, sustainability, and risks for DoD contractors.

[1 CPE] 2021 State of Malware

  Presented by Malwarebytes

Over the past year, the tools and tactics of cybercrime and cybersecurity adapted against a backdrop of enormous changes to our lives and businesses.

Join us to learn how cybercrime evolved in 2020 and identify ways to safeguard your organization against what’s out there.

We’ll explore:

  • Top threats for businesses and consumers
  • Emerging cybercrime trends and tactics
  • Solutions you can employ to thwart future attacks

[1 CPE] Cybersecurity Resilience Through Public-Private Partnerships

  Presented by Josh Stemp • Cybersecurity Advisor, CISA

What do I do? Is this beyond my scope of expertise? Where can I get guidance?

These are questions that Cybersecurity professionals ask themselves every day. You may spend your days thinking you are alone; you are not. Join Joshua Stemp to learn how public-private partnerships can strengthen an organization’s cybersecurity posture. He will outline what the Cybersecurity and Infrastructure Security Agency (CISA) is doing to secure the nation from the never- ending barrage of cyber threats.

[1 CPE] CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

[1 CPE] The Evolution of Physical Security

  Presented by Pine Cove Consulting & Verkada

Physical security is evolving. Security cameras can now store footage locally without NVRs or DVRs. Advanced filtering allows you to quickly find the footage you are looking for. Sharing access to live camera feeds can now be done simply via a link or SMS. Managing system health and providing using permissions is easier than ever. Access control can now integrate seamlessly into your security camera system to provide an added layer of security with real-time visibility.

Join Verkada and its preferred partner, Pine Cove Consulting, for a deep dive into the evolution of physical security systems and the transition to cloud-based physical security.

[1 CPE] What Got Us Here, Won’t Get Us to Where We’re Going…

  Presented by Aruba, a HPE Company

Over the past couple of decades, we’ve relied on a certain predictable and repeatable model of expectations from our infrastructure that has delivered. However, the demands of Digital Transformation, the pace of change, the capabilities within our teams — and of course the pandemic — have created business pressures that traditional ways of building and security infrastructure just can’t keep pace with.

The time is now to reflect, reset, and embrace a different way that will increase agility and flexibility as well as enhance performance and security. Lose the baggage of the past, travel light, and let’s chart a course for the journey ahead.

[1 CPE] The Office Rethought: Considerations on the Modern Work Environment

  Presented by Mark Fitzgerald • Executive Director of Customer Care, Boise State University

The events of the past year have accelerated conversations between the business and employees about what it means to be flexible. Whether it be schedule, location, amenities, or technologies, employees are seeking what they want and when and where they want it. This has led to a host of issues for technologists to consider, create process and policy around, as well as support.

Industries all over will have a remote workforce for the foreseeable future. Technology has led this transition and will continue to do so. IT professionals need to have a voice in these policy decisions. Spending needs to be reprioritized to accommodate these changes. Come and gather to discuss and share some of the challenges in supporting a hybrid work environment.

Mark Fitzgerald has a passion for education and has been working in higher education for over twenty-five years. He has presented at dozens of conferences as well as having had the opportunity to be an international keynote speaker. Mark is the Executive Director of Customer Care at Boise State University and is also an adjunct professor in the College of Business and Economics. He has presented all over the world at HDI conferences, local chapter meetings, and HDI Higher Education Forum meetings. He has chaired organizations such as the Higher Education Forum and the HDI Desktop Support Advisory Board.

[1 CPE] Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak & Aruba, a HPE Company

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, Aruba and Silver Peak will discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations

[1 CPE] Are You Prepared? A Discussion on Backups and Security

  Presented by INTERFACE Advisory Council

Since the start of the pandemic, your workflow and office structure have shifted tremendously. The way any firm operates now has adapted to the change in remote workers. While many moves have been made to allow workers to remain efficient, have you kept up with the new security threats? Having a good DR plan is always paramount. Have you tested your plan since the pandemic began?

Join the INTERFACE Advisory Council for an open discussion about these items and more. How does your BC/DR plan need to evolve now? Will your company have a large amount of staff permanently working remotely? We will discuss what controls you need to change, managing secure access, and handling a rise in security threats.

Panelists:
Peter Jurhs • Executive Director, Operations, Nampa School District
Tory Jamison • Executive Director, Cloud Services & Infrastructure, Boise State University
Jerry Hindberg • Assoc Director, Network & Cybersecurity, Lewis-Clark State College
John Stiffler • Director, Corporate IT, Boise Cascade Company