[1 CPE] Real-Time Threat Mitigation with AI-Driven SASE: A Practical Approach

  Presented by Joe Fontes, Sales Engineer, PNW • Cato Networks

This discussion highlights the current threat landscape associated with current AI tools and how those same foundational technologies can be used to automate threat responses. We will delve into an understanding of current adversaries, an overview of existing defenses, and strategies on extending current defense postures.

[1 CPE] AI in the Eyes of the Threat Actors vs. the Cyber Defense Line

  Presented by Kelly Brazil, Sr Director, Security Architects • Juniper Networks

In today’s cybersecurity world, AI is making fast moves to improve the defense line, but adversaries are also using AI to build attacks faster and be more precise in entering the victim. Social Engineering, targeted phishing attacks where the text is generated by GenAI engines – make it even simpler to get in.

To overcome what is offered as Attacks as a Service, the Security barrier needs fully meshed security policies, in-line Malware detection powered by AI, and effective ways to identify and mitigate Zero Day Attacks. The goal is to defend an Enterprise faster than the adversaries are moving and mitigate potential breaches by real-time/in-line defense.

Kelly Brazil runs the global Security Specialist Architects team at HPE Juniper Networks. Kelly has 25+ years of experience in cybersecurity and has previously held technical leadership roles at Palo Alto Networks, Fortinet, and various successful security startups. He has traveled the globe as a public speaker evangelizing the latest trends in cybersecurity. Kelly is also active in the Open-Source Software (OSS) community and has developed DevOps automation tools in use by developers, systems administrators, and security practitioners around the world.

[1 CPE] Wi-Fi 7 Unleashed: Powering the Next Generation of Connectivity

  Presented by Josh Jaster, SMB Sales Engineering Manager • HPE Aruba Networking

Wi-Fi 7 is just the beginning. The HPE Aruba Networking 700 Series Access Points go beyond the standard with higher capacity, denser IoT support, advanced wired security with MACsec, software-configurable radios, and more. Powered by AOS-10 and Aruba Central, every Wi-Fi 7 model adds AI-driven optimization, sustainability automation, and deep client insights. The result is a unified platform that transforms next-gen wireless into the foundation for real-time business, IoT innovation, and future-ready connectivity. Join us to discover how the 700 Series goes beyond Wi-Fi 7 to deliver the performance, intelligence, and security your network demands.

[1 CPE] Modernizing the SOC: Transforming your Security Operations

  Presented by JR Silverthorne, Partner Solutions Consultant, West • Palo Alto Networks

So many industry players want to speak to and about tool consolidation and a platformization play in the cybersecurity space. We want to examine the classical SOC model and turn it on its head and reveal how a suite of capabilities enable root cause analysis, risk context, correlation, and automation across an open platform that accepts the widest and largest variety of data sources from the endpoint to the data center to the cloud. Our approach –– Xtended Security Intelligence Automation Management.

If your interest is in achieving the lowest MTTR and MTTD, if you want to detect security incidents and remediate faster, then your path forward has to unify workflows, utilize embedded intelligence, and provide automated responses. Let us show you how Palo Alto with 20,000 employees operates their SOC with just 15 people.

[1 CPE] AI Agents & Automation: How They’re Changing the Way We Work

  Presented by Hunter Helfgott, AI Solutions Consultant • Cerium Networks

AI-powered agents are generating a lot of buzz. But what do they actually do?

In this session, you will see how organizations are starting to use AI-powered agents to solve business challenges and create new opportunities. We’ll cover advanced tools like custom GPTs, Copilot Studio, and Azure AI Foundry and see how they can be leveraged to drive AI innovation and streamline workflows. This session offers a deep dive into automation’s role in simplifying complex processes, enhancing customer experiences, and improving productivity.

[1 CPE] From Frameworks to Firewalls: A Practical Guide to AI Security

  Presented by Collin Miller • Director, Cloud Security, Structured

As organizations accelerate AI adoption, the security landscape is evolving just as quickly. This presentation explores the foundations of AI security, starting with an overview of emerging AI-specific threats and the importance of structured defense approaches. We will examine leading frameworks—MITRE ATLAS and the NIST AI Risk Management Framework—and how they guide organizations in identifying, assessing, and mitigating AI risks.

We will then focus on Microsoft 365 Copilot, outlining its security architecture and built-in protections, followed by a technical case study on the Echo Leak vulnerability, demonstrating real-world exploitation risks. s a bonus, we will also take a look at the recent SalesDrift vulnerability, and the growing attack surface around LLM chatbot integration and supply chain risks.

Finally, we will provide an overview of Structured’s AI security service offerings. Attendees will gain both strategic insights and practical approaches to securing AI systems, preparing them to meet the challenges of an AI-powered future.

Collin Miller has over two decades of experience in networking and IT security — installing and supporting various types of security software and hardware. He has demonstrated skills in project management, evaluating new security technologies, testing, troubleshooting, and developing procedures and policies for new systems and technology. His past areas of focus include Mobile Device Management and Security, Data Loss Prevention, Zero Trust Network Access, Next-Generation Firewall, and Security Event and Information Management. His current area of focus is Cloud Security

[1 CPE] Threat Detection: Intelligence Insights from the Front Lines

  Presented by David Pier, Sr Sales Engineer • Zscaler

In 2024, Red Canary detected nearly 93,000 threats—an increase of more than a third from the previous year—driven by expanded visibility into cloud and identity infrastructure. For the seventh year, our Threat Detection Report analyzes the most prevalent cyber threats, evolving attack techniques, and the incidents we help customers resolve.

This session will highlight key trends, including email threats, infostealers, and LLM hijacking in the cloud, while breaking down the top 10 MITRE ATT&CK® techniques and most prevalent threats in customer environments. Attendees will gain actionable insights into detection, testing, and prevention strategies to enhance their security posture against today’s evolving threats.

[1 CPE] How to Spend Wisely on Your IT Needs in Spokane: An Interactive Panel Discussion

  Presented by INTERFACE Advisory Council

Your budget has shrunk, and vendor costs have risen. Sound familiar?

So many IT leaders in Spokane are dealing with the challenges of vendor acquisitions that produce huge cost increases. At times it can seem there is no way to achieve everything expected with the budget allotted. How does anyone succeed in this environment?

Spokane isn’t home to the largest corporations in the country, and your IT budget reflects that. In this panel discussion, the Spoane Advisory Council will share their tricks to maximizing the impact of the money you have to spend. Please join us for an open discussion that will include your questions. We will share experiences in working with vendors, stretching a dollar, and finding alternatives to huge price increases from the vendor community.

Moderator: Adam Pyle, Information Systems Security Manager, Pyrotek, Inc.

Panelists:

  • Laurel Caldwell, Director, IT Services, Latah County, ID
  • Ben Calvert, Chief Information Officer, Vista Title & Escrow
  • Kai Dailey, Executive Director, Ragland Institute
  • Naci Seyhanli, IT Security Analyst, Spokane Regional Health District

[1 CPE] Bridging Zero Trust and SASE: A Unified Approach to Modern Cybersecurity

  Presented by Fortinet

This will be a panel discussion on how organizations can effectively bridge Zero Trust and SASE to create a unified, adaptive cybersecurity architecture that meets the demands of today’s hybrid workforce and threat landscape.

Key Takeaways:

  • Understand the core principles of Zero Trust and SASE, and how they complement each other.
  • Learn practical strategies for implementing a unified approach without adding complexity or disrupting operations.
  • Gain insights into real-world use cases and lessons learned from organizations successfully integrating these frameworks.

Speakers:

  • Joel Robnett, Director of Sales, Tech Heads, Inc.
  • Steve Sims, Owner, Cruxial Technology Group
  • Michael Lippman, Regional Channel SE US, Fortinet
  • Eric Foster, Systems Engineer, Fortinet

[1 CPE] How to Make AI a Reality in Your Organization

  Presented by Marni Carmichael, Vice President, Marketing • ImageSource

AI adoption is accelerating, yet many organizations struggle to transition AI projects from proof-of-concept to production. The AI Empowerment Blueprint is a structured framework that helps businesses overcome common AI adoption barriers, align AI initiatives with business goals, and implement a governance strategy that ensures ethical and effective AI deployment.

This session will guide attendees through a six-step methodology for AI success, covering key phases such as AI exploration, business value alignment, governance frameworks, and implementation best practices. Learn how to identify AI opportunities, mitigate risks, and build a scalable AI strategy that delivers real business value.

Whether you’re an executive, technologist, or entrepreneur, this presentation will equip you with actionable insights and a proven roadmap to maximize AI’s impact within your organization.