[1 CPE] Have We Reached the End of the “Internet Frontier”?

  Presented by Tonaquint Data Center

Join Tonaquint Network Engineer, Matt Holzwarth, for a discussion on what’s left to conquer in our globally connected world.

Matt Holzwarth has been in the IT field professionally for over 15 years and has extensive experience in Windows Domain environments, Windows Operating Systems (Server and Workstation), MAC OS (Server and Workstation), Linux (Primarily Ubuntu), Routing and Switching (Primarily Cisco, Mikrotik Router OS, and Ubiquiti EdgeMax), vmWare, Wireless WAN and LAN technologies, VPN’s (IPSEC, L2tp, EOIP, Psudowire, and PPTP), VLANs, and much more.

[1 CPE] Enterprise Data: A Curse and a Blessing

  Presented by Sasi Pillay, Ph.D. • Vice President of IT Services & CIO, Washington State University

Many organizations collect data and use it for a variety of purposes. Often the data is gathered, contained, processed, and reported from a single system. It lacks the holistic view of looking at data from an enterprise perspective. Only if data is viewed with an enterprise lens, insights can be gained. This insight allows organizations to make decisions whether to detect, mitigate, and prevent issues, or increase market share, improve customer satisfaction, and deliver other positive outcomes. This talk will focus on addressing how to use data from disparate systems for organizational good and, in higher education, how this typically translates to improved student success and experience.

Dr. Pillay was recently named ORBIE CIO of the Year in the enterprise category for organizations with over $800 million in annual revenue. Pillay was recognized at the 2022 CIO of the Year® ORBIE® Awards in June.​

Dr. Pillay is the recipient of NASA’s Exceptional Service Medal and the Outstanding Leadership Medal. He is also the recipient of the Presidential Rank Award recognizing him as a Meritorious Executive in the U.S. federal government. He was recognized as one of the Federal 100 winners based on his positive impact on NASA and the community. He was also named as one of the top 25 IT leaders in Government citing his technology vision, clout among peers in other agencies, and his ability to show concrete results. The Northeast Ohio Software Association recognized him as the CIO of the Year in 2008.​ ​

[1 CPE] Challenge the Threat of Ransomware: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Ransomware attacks continue to rise in volume, severity, and costs to businesses attacked while cyber criminals continue inventing new and unexpected methods to spread malware and encrypt critical data. As attacks continue to specialize, no organization is immune to ransomware. So how do you avoid being forced to pay a ransom, disruptions to services and supply chains, and damage to your brand in the news? Join recovery and data protection experts from Zerto to discuss best practices for when – not if – ransomware strikes. Be prepared to minimize downtime, data loss, and mitigate the risks of ransomware. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • Steps you can take to reduce the likelihood of attacks on your system
  • How to choose a best-in-class recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recover quickly
  • Real example of a company hit twice by ransomware and how they improved recovery time from weeks to minutes by planning ahead

[1 CPE] Migrating to a Multi-Cloud Environment: A Non-idealistic Approach

  Presented by Cerium Networks

Multi-Cloud. A new buzzword? Or a path of digital transformation on which many have unknowingly already embarked?

During this session, we will explore the definition of “Multi-Cloud”, the maturity level of various providers – including your private cloud(s), and the competencies required to manage mission-critical applications in these cloud(s). We will review multiple migration and consumption models as well as business outcomes. The move to Multi-Cloud deployment is a strategy generally explored for greater efficiency, greater flexibility, and reduced complexity. However, these deployments often include increased compliance and security requirements, potentially additional cost, and certainly a new skill set which may not exist within your organization. We will explore these topics and more in our discussion on migrating a data center to a Multi-Cloud environment.

[1 CPE] Securing a Distributed Network with ZTNA and a Cybersecurity Mesh Platform

  Presented by Fortinet

Securing connected resources and the different pieces of a distributed network can be challenging. Join this session to explore the advantages of using a ZTNA architecture to provide secure, application-based access over the traditional VPN access most enterprises use today. We’ll also examine how employing Gartner’s Cybersecurity Mesh Architecture can simplify Network and Security operations.

[1 CPE] PCI-DSS 4.0: How to Become and Stay Compliant

  Presented by Structured

This presentation will discuss the difficulties of becoming and staying compliant with Payment Card Industry (PCI) requirements. The venerable version 3.2.1 is well on the way to retirement, and the updated Data Security Standard (DSS) 4.0 is loaded with numerous changes and enhancements that must be complied with. Whether you are just beginning with PCI for your organization or have many years of experience, there are many challenges — both old and new — that can create roadblocks to compliance. With emerging technologies such as zero-trust architecture ready for implementation, find out how to best use these controls for your organizational goals. The presentation will cover the requirements, trouble areas to be aware of, and how you can utilize specific technology in your compliance effort.

[1 CPE] Co-Managed IT: The Modern MSP Relationship

  Presented by Exbabylon

A pragmatic conversation about what the modern relationship should look like between internal IT teams and external consultants, MSPs, MSSPs and VARs. As organizations embark on digital transformation journeys that require a cloud forward approach, the skills, competencies, and experience of a strategic partner who can collaborate and build initiatives becomes more apparent and important. Navigating the shifting expectations of IT Leadership as business demands evolve and change from the team that just keeps the network up to their new role as a business influencer through data intelligence, business intelligence, automation, and big data/AI.

[1 CPE] Cloud is a Tool, Not a Destination

  Presented by GCSIT

So, you’re ready to move to the cloud. Where do you start? Moving business functions to the cloud is almost always a good idea, but there is no “one cloud fits all” solution. The cloud offers a great number of benefits to the intelligent and engaged IT decision-maker, but the cloud is a tool to be leveraged and utilized, not a destination to be achieved.

Cloud adoption is a realistic approach to embracing the benefits of cloud computing. Join this session to gain a full breadth understanding of requirements to help you decide when, how, and how much to move to the cloud. Learn how the cloud adoption approach evaluates and encourages the use of Cloud resources when and where they make sense.

[1 CPE] 2022 Threat Review

  Presented by Malwarebytes

The Malwarebytes 2022 Threat Review is an annual report on the latest threats, attack trends, and privacy breaches impacting individuals, organizations, and national security. Researchers detail threat intelligence across operating systems and examine how privacy has shifted and the ways that cybercriminals and crimes are evolving. With a stronger understanding of the threat landscape, organizations and individuals can make more informed security and cyber-protection decisions.

[1 CPE] Cyber Security: A National Threat

  Presented by Arctic Wolf

When searching for vulnerable targets, cyber hackers do not care how big or small your company is. As world events continue to unfold in China and Russia, cyber warfare has become a national threat to American companies.

Join Arctic Wolf’s session to learn how IT leaders can be proactive, rather than reactive to protect their companies from cyber hackers.