[1 CPE] Protecting Your Data from Ransomware Where it Lives: Your Last Line of Defense

  Presented by HItachi Vantara

If an attack happens and it makes it all the way to your data, then they have already broken through all of your walls. Where your data lives IS your last line of defense, which is why the Armed Forces that protects the USA trusts Hitachi to protect them. Prevention is great and all but without that last line of defense, you’re a sitting duck. Attend this session to learn how Hitachi serves as your last line of defense against ransomware attacks.

[1 CPE] Your Career Path Is Unique to YOU!!

  Presented by Jerry Rapp • Chief Information Officer, Town Pump, Inc.

When I was first exposed to technology, I immediately knew it was my passion. My career focus has always been to be qualified to be a CIO. This goal allowed me to focus on the career growth that I had the most control over. It was never about the title for me, it was about gaining knowledge and providing value day in and day out. I would like to provide you with a view of my unique path: the key interactions; the advice I received – some good, some not so much; many relocations; new job positions; and some good old-fashioned luck. Now that I have been a CIO for seven years, what have I learned? Was it everything I wanted it to be? I encourage you to come to the keynote session to find out.

Jerry Rapp is a 38-year technology veteran and the current CIO of Town Pump Inc. in his hometown of Butte, MT. Jerry started his technical career in the Air Force back in the day when there were no laptops or cell phones, just mainframes. After the Air Force, Jerry attended Montana Technology University in Butte majoring in Information Systems. The majority of Jerry’s career was spent with Fidelity Investments, the largest retirement plan provider in the U.S. After twenty years, five relocations all over the US, and a variety of different roles; he circled back to Butte seven years ago to take on the role of CIO at Town Pump. In his spare time, Jerry is an avid golfer and runner.

[1 CPE] Migrating to a Multi-Cloud Environment: A Non-idealistic Approach

  Presented by Cerium Networks

Multi-Cloud. A new buzzword? Or a path of digital transformation on which many have unknowingly already embarked?

During this session, we will explore the definition of “Multi-Cloud”, the maturity level of various providers – including your private cloud(s), and the competencies required to manage mission-critical applications in these cloud(s). We will review multiple migration and consumption models as well as business outcomes. The move to Multi-Cloud deployment is a strategy generally explored for greater efficiency, greater flexibility, and reduced complexity. However, these deployments often include increased compliance and security requirements, potentially additional cost, and certainly a new skill set which may not exist within your organization. We will explore these topics and more in our discussion on migrating a data center to a Multi-Cloud environment.

[1 CPE] Let Policy Guide Your Team

  Presented by CompuNet

This discussion will cover a set of policies that will address the necessary functions to implement a standard Information Security Management System (ISMS) which aligns with the National Institute of Standards and Technology (NIST) Framework for Cybersecurity and provides for compliance with most statutory requirements.

[1 CPE] Challenge the Threat of Ransomware: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Ransomware attacks continue to rise in volume, severity, and costs to businesses attacked while cyber criminals continue inventing new and unexpected methods to spread malware and encrypt critical data. As attacks continue to specialize, no organization is immune to ransomware. So how do you avoid being forced to pay a ransom, disruptions to services and supply chains, and damage to your brand in the news? Join recovery and data protection experts from Zerto to discuss best practices for when – not if – ransomware strikes. Be prepared to minimize downtime, data loss, and mitigate the risks of ransomware. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • Steps you can take to reduce the likelihood of attacks on your system
  • How to choose a best-in-class recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recover quickly
  • Real example of a company hit twice by ransomware and how they improved recovery time from weeks to minutes by planning ahead

[1 CPE] How AI Powered Solutions Improve End User Network Experience

  Presented by Structured & Aruba Networks

User Experience Insights: Organizations of all sizes are increasingly focused on improving line-of-business and end-user experience. Managing distributed or remote locations adds complexity and can quickly consume resources. Continuous growth of mobility, IoT and cloud apps highlights the importance of operating your network with the most complete view possible. This session will introduce new tools to help engineers, managers and CTOs understand the experience that people are having on their network. Join us to learn how User Experience Sensors can be deployed in minutes, have a low entry cost and work on any vendor’s network.

[1 CPE] Practice Good Cyber Hygiene: Adopt a Framework to Protect Your Enterprise

  Presented by CompuNet

A cybersecurity framework helps businesses develop a structured approach to securing their systems. This session will focus on the practical implementation of security measures; how to prioritize and get the maximum benefit from your resources. The discussion will be framed around the Center for Internet Security’s Critical Controls, although several frameworks will be briefly discussed. The focus will be on protecting against ransomware while still taking a holistic approach. The discussion will be directed from the management or IT governance direction rather than from an engineering or systems approach.

[1 CPE] Is DDoS a Crime?

  Presented by Radware

2022 has a serious “DDoS is a not a crime” vibe. A little over two months ago, performing Distributed Denial-of-Service (DDoS) attacks was not without consequences. Today, because of recent escalations in conflict, a more significant percentage of the general public believes that DDoS attacks are not a crime if they are morally aligned and part of a socially acceptable operation. But is this true? ….and what led to this current perception?

[1 CPE] Disrupting the Means to Prevent the End: A Guide to Detecting Ransomware

  Presented by Red Canary

Ransomware has been a dominant cybersecurity threat for the better part of the last decade. However, it doesn’t walk alone. It’s almost always the eventual payload delivered by earlier-stage malicious software or activity. Luckily, if you can detect the threats that deliver the ransomware, you can stop the ransomware before it arrives.

In this talk, we’ll extensively reference Red Canary’s 2022 Threat Detection Report, examining the malware and other malicious tools that adversaries often use to deliver ransomware. While the specific trojans and strains of ransomware may change from one attack to the next, adversary tactics, techniques, and procedures are often similar across campaigns and threats. By developing robust detection coverage for the techniques adversaries abuse most often, rather than focusing on individual threats, security teams can achieve defense-in-depth against the many threats that leverage those techniques and the broader trends that dominate the infosec landscape.

Want to learn more about the prevalent adversary techniques and threats that can lead to a ransomware infection? Attendees will leave with:

  • A better understanding of the threats and tools that commonly precede a ransomware infection
  • Guidance on relevant collection and data sources that offer visibility into the threats and techniques that adversaries use to deliver ransomware
  • Actionable information on how security teams can develop the capacity to detect, prevent, and mitigate ransomware and other threats
  • Strategies for testing their ability to observe and detect common threats with free and easy-to-use tools like Atomic Red Team

[1 CPE] 2022 Threat Review

  Presented by Malwarebytes

The Malwarebytes 2022 Threat Review is an annual report on the latest threats, attack trends, and privacy breaches impacting individuals, organizations, and national security. Researchers detail threat intelligence across operating systems and examine how privacy has shifted and the ways that cybercriminals and crimes are evolving. With a stronger understanding of the threat landscape, organizations and individuals can make more informed security and cyber-protection decisions.