[1 CPE] What is “Universal Zero Trust Network Access” for IT and OT Environment?

  Presented by Airgap

Hybrid workforce is forcing IT to manage two sets of access products for remote work and for in-office work. This inefficiency leads to higher costs, operational complexity of managing duplicate policies, and different experience for on-prem and remote workers. Why must IT organizations deal with VLANs, ACLs, port, 802.1x, NACs and their configurations for when your employees are on-premises versus when the employees are working from remote locations?

In this session, you’ll learn the key principles of Universal Zero Trust Network Access and how a unified stack across hybrid workforce can reduce operational complexities, improve user experience, and reduce downtime for IT and OT organizations.

[1 CPE] Asset Visibility is Foundational to Effective Attack Surface Management

  Presented by Armis

Organizational assets are everywhere, across any network, and with diversified asset types like IT, IoT, OT & IoMT. Today’s organizations struggle to manage this extended attack surface, leaving unseen gaps in risk posture. So why is it that in 2022 organizations still fail to instantly and accurately answer basic questions of what they have, never mind understanding risks and threats across the heavily expanded footprint? Is it the manual effort to find and understand the asset landscape or that existing tools are only focused on a particular asset types like IT? Join Armis for this informative session where we’ll explore what the expanded attack looks like and how to address the increased threat that most organizations face.

[1 CPE] Pure SOC Fury: The Cybersecurity Book of Bad Decisions

  Presented by Arctic Wolf

Join this presentation for insights taken from the frontlines of security operations. The session will draw on experiences and observations from real-world incidents and interesting SOC data points and trends. There are four broad bad decisions that we see being played out, time and again, across cybersecurity and from which everyone can and should learn. Arctic Wolf will show how a focus on Security Operations aligned with outcomes that matter to you will position you to start your journey toward ending your cyber risk.

[1 CPE] Why Smart Cities Are Safer Cities Thanks to Real-Time Data and AI

  Presented by iT1 Source & Wireless Guardian

Intelligent technology helps public safety organizations gain a holistic understanding of their cities, deepen public confidence and strengthen community connections. This session will explain the relationship the using Real-Time Data and Artificial Intelligence to create safer, more resilient communities. As part of the discussion, the presenter will explain the following:

  • Data and AI are helpful in real-time response
  • Data and AI are also reshaping long-term public safety processes
  • How smart safety technologies aid in environmental monitoring, emergency management and other situations
  • How smart technology pulls in signals from an array of sources across cities

The presenter will also stress public safety isn’t a top-down hierarchy. It’s actually a collective effort that prioritizes the needs of the community and depends on strong relationships. By realizing the future of public safety, smart city technology transforms the ability to serve local communities.

[1 CPE] Zero-Trust Architectures

  Presented by Rubrik

Organizations have invested heavily in IT security, attempting to fortify their perimeter, network, endpoint, and application protections. Despite these investments, hackers are successfully penetrating these defenses and targeting enterprise data, including backup data. Ransomware is starting to specifically target online backups by encrypting or deleting them. If your organization was the target of an attack today, how do you know what data was impacted and where? Manually sifting through millions of files and comparing each snapshot consumes FTE time and prolongs recovery exponentially. Mass restores of the entire environment could mean high data loss and weeks’ worth of work down the drain. In this session, we will discuss how to protect your last line of defense, the backups. We will walk through the anatomy of a recovery, the best practices, and advanced tools to ensure you will not have to pay a ransom, and how to quickly recover your data to continue business operations.

[1 CPE] Disrupting the Means to Prevent the End: A Guide to Detecting Ransomware

  Presented by Red Canary

Ransomware has been a dominant cybersecurity threat for the better part of the last decade. However, it doesn’t walk alone. It’s almost always the eventual payload delivered by earlier-stage malicious software or activity. Luckily, if you can detect the threats that deliver the ransomware, you can stop the ransomware before it arrives.

In this talk, we’ll extensively reference Red Canary’s 2022 Threat Detection Report, examining the malware and other malicious tools that adversaries often use to deliver ransomware. While the specific trojans and strains of ransomware may change from one attack to the next, adversary tactics, techniques, and procedures are often similar across campaigns and threats. By developing robust detection coverage for the techniques adversaries abuse most often, rather than focusing on individual threats, security teams can achieve defense-in-depth against the many threats that leverage those techniques and the broader trends that dominate the infosec landscape.

Want to learn more about the prevalent adversary techniques and threats that can lead to a ransomware infection? Attendees will leave with:

  • A better understanding of the threats and tools that commonly precede a ransomware infection
  • Guidance on relevant collection and data sources that offer visibility into the threats and techniques that adversaries use to deliver ransomware
  • Actionable information on how security teams can develop the capacity to detect, prevent, and mitigate ransomware and other threats
  • Strategies for testing their ability to observe and detect common threats with free and easy-to-use tools like Atomic Red Team

[1 CPE] Mental Malware: Social Platforms and the Dawn of the Disinformation Age

  Presented by Michael Manrod • Chief Information Security Officer, Grand Canyon Education

In recent years, we have seen our world reshaped dramatically as technology has worked its way deeper into our daily lives. As mobility and social platforms reshape how we interact, the speed of information has accelerated, all while the overall trustworthiness of information has deteriorated. In this talk, we will examine human processing flaws that can be exploited via disinformation campaigns (Mental Malware), along with ways such campaigns may be interrupted.

Mike Manrod presently serves as the Chief Information Security Officer for Grand Canyon Education, responsible for leading the security team and formulating the vision and strategy for protecting students, staff, and information assets across the enterprise. Previous experiences include serving as a threat prevention engineer for Check Point and working as a consultant and analyst for other organizations.

Mike is also a co-author/contributor for the joint book project Understanding New Security Threats published by Routledge in 2019, along with multiple articles and whitepapers. When he’s not working, he spends time playing video games with his kids or doing projects around the farm.

[1 CPE] Challenge the Threat of Ransomware: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Ransomware attacks continue to rise in volume, severity, and costs to businesses attacked while cyber criminals continue inventing new and unexpected methods to spread malware and encrypt critical data. As attacks continue to specialize, no organization is immune to ransomware. So how do you avoid being forced to pay a ransom, disruptions to services and supply chains, and damage to your brand in the news? Join recovery and data protection experts from Zerto to discuss best practices for when – not if – ransomware strikes. Be prepared to minimize downtime, data loss, and mitigate the risks of ransomware. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • Steps you can take to reduce the likelihood of attacks on your system
  • How to choose a best-in-class recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recover quickly
  • Real example of a company hit twice by ransomware and how they improved recovery time from weeks to minutes by planning ahead

[1 CPE] Communication Breakdown

  Presented by INTERFACE Advisory Council

How difficult is it to communicate? This may sound like a rhetorical question, but it does pose challenges. IT departments are frequently in the middle of executing a business plan while the communication falls to others. Technology professionals are now responsible for facilitating improved communication between C-Suite, End-users, and the public.

Please join the INTERFACE Phoenix Advisory Council for a discussion on the challenges of the current communication landscape in your company. Firms of all types and sizes struggle with ensuring that all interested parties have the needed information to perform their jobs. IT departments must lead the way in evolving modern, efficient communication regarding policy, security, procedures, and other operating aspects of the business. Bring your questions for this open conversation with area leaders who will share their experiences and insights.

  • Lester Godsey, Chief Information Security Officer, Maricopa County
  • John Kullman, Sr Manager, Network, Yuma County
  • Patrick O’Keefe, Head of Global Cyber Security and Risk Management, Circle K
  • Lynne Pizzini, Director, Security Governance, Assurance, and Design, CIT Bank