[1 CPE] Dealing with Ransomware: The Past, Present, and the Future

  Presented by Erik Graham • Security Incident & Investigations Manager, Marsh & McLennan Companies

Any company or government organization of any size anywhere in the world can become a victim of ransomware at any time. Each attack is moving further up in the headlines, making it a discussion point with many people. But how did we get to this point where so many can become victims overnight to this crime? In this presentation, Erik will cover the beginnings of ransomware, how it has evolved, and what you need to do so you don’t become the next victim and headline. He will also cover what do to and not do when you become a victim and outline the long road to recovery. Because the truth of the matter is, it’s not if you will become a victim, but when. Taking the right actions now can minimize the impact of what can be an extinction-level event for a company.

Erik Graham is a manager on the Security Risk / Incident Management team at Marsh & McLennan; he is responsible for the identification, documentation, and communication of security risks as well as the analysis, eradication, and recovery of cyber incidents that affect Marsh & McLennan’s information assets.

Erik has been working in the computer industry for 25+ years with over 20+ years directly focused on computer security/information assurance. He has worked in a wide variety of both logical and physical security areas related to computer network attack (CNA) and computer network defense (CND). Currently, he is working in multiple areas such as risk identification and management, evaluating emerging technologies, malware analysis, and threat intelligence.

Erik has a Bachelor of Science from the University of Phoenix, a Master of Science in Information Assurance from Norwich University, and holds multiple industry certifications to include CISSP-ISSAP, CISM, CRISC, and CDPSE.

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

[1 CPE] The Rise of Secure Access Service Edge

  Presented by Bitglass

Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms are built for this exact moment.

In this presentation, you will learn:

  • The core components SASE
  • The functionality you need to secure cloud, web, and remote access use cases
  • Architectural considerations for SASE platforms

[1 CPE] Addressing America’s Cyber Dilemma in the Wake of Cyber Disarray

  Presented by Frank J. Grimmelmann • President & CEO for ACTRA

In the wake of the Colonial Pipeline Ransomware Attack, the Solarwinds compromise, and the Microsoft Breach, it’s easy to lose focus on the big picture and how our institutions are responding to the increasingly hostile threat landscape and capable adversaries! This session will briefly highlight significant trends in the threat landscape driving response, explore the team put in place by Washington’s new administration to address the threat, reveal the policy foundation and current execution roadmap, and evaluate the balance between Active Defense and Privacy/Cybersecurity considerations. This session will engage you and leave you with several questions to consider in shaping your own priorities in response to our country’s direction in responding to the ‘clear and apparent cyber danger’ that evidences itself daily.

Mr. Frank J. Grimmelmann serves as President & CEO for the Arizona Cyber Threat Response Alliance (ACTRA), a non-profit entity, that was developed collaboratively with the FBI’s Arizona InfraGard Program and independently launched in 2013 to enable its private/public sector members to enable themselves to respond to the escalating national cybersecurity threat.

Mr. Grimmelmann Co-Chairs Governor Ducey’s AZ Cybersecurity Team (‘ACT’) and is a Founding Member of President Obama’s National ISAO Leadership Group at the University of Texas at San Antonio (UTSA). As ACTRA’s leader, Mr. Grimmelmann was the first private sector representative in the Arizona Counter Terrorism Information Center (ACTIC) on its Executive Board. He has held C-level positions in Finance, healthcare, and government, focusing on cybersecurity in response to 9/11. He holds an MBA in Finance/International Business from UC Berkeley and a BA in Operations with a Business Law minor from the University of South Florida.

[1 CPE] Leveraging Assessment Findings to Harden Your Security Perimeter

  Presented by Fortinet

Are you regularly evaluating your network security?

Performing assessments is a tried-and-true method for improving your security posture, but they can be a daunting task for network security staff who are often short on manpower, expertise, and/or time. Regardless, the benefits of running assessments almost always outweigh any potential drawbacks. Having a security assessment in hand will increase your security situational awareness and significantly impact your organization’s risk preparedness and mitigation.

Join us as we discuss the importance of periodically validating your existing security controls and provide learnings and best practices from our experts.

[1 CPE] Real-Time Defender Velocity: Code on Code Warfare

  Presented by SentinelOne

Organizations spend more money on cyber security tools every year, yet the number of breaches and the cost of these breaches continues to increase. A new approach is needed that relies on autonomous analysis that can respond at machine speed. By embracing automation, AI, and big data analytics, organizations can better prevent threats, find, and detect what is missed, provide contextual linking for forensic and threat hunting ¬– and even more importantly – self-heal and fully recover when necessary.

[1 CPE] Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, we’ll discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations

[1 CPE] How Zero-Trust Enables the Future of “Work from Anywhere” Secure Access

  Presented by Duo Security

The perimeter-focused security model of decades past is no longer adequate for securing the modern enterprise. Now, organizations must secure a mobile workforce using a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks — and this trend only accelerated during 2020’s global shift to remote work. Fortunately, a modern access strategy built on zero-trust fundamentals can defend today’s workforce while paving the way to a passwordless future. Attend this session to learn how the zero-trust access model works, reduce your reliance on passwords and risk of password-based attacks, and how to start planning and staging your zero-trust evolution today.

[1 CPE] Endpoint Systems Management: Time to Rethink

  Presented by Quest

See the recent changes to Endpoint environment and how these affect your infrastructure. Learn how these changes affect your network design and what this means for your daily business. Learn more about the new technologies available for managing your endpoints and see some tips and guidelines to be prepared for what’s next.