[1 CPE] Securing Work Where It Happens with Prisma Access Browser

  Presented by Yossi Rosenboim, Manager, Solution Engineering • Palo Alto Networks & Structured

As work increasingly moves to the cloud, traditional network perimeters dissolve, and the browser becomes the new frontline for productivity and risk. This presentation explores how Prisma Access Browser is redefining security by shifting focus from network-based controls to the user’s primary workspace: the Browser. We’ll dive into how this solution uniquely protects users and data at the browser level. Join us to understand how a secure, zero-trust approach to browser activity can streamline compliance, enhance user experience, and fortify your security posture without compromising productivity. This session includes a live demo.

Yossi Rosenboim is a seasoned cybersecurity professional with over 20 years of experience. As a leader of the PNW solution consulting team at Palo Alto Networks, he specializes in guiding organizations through the evolving landscape of cyber security.

[1 CPE] CIO: Chief Insanity Officer – Thriving in the Role Without Losing Your Mind

  Presented by Megan Clarke • Chief Information Officer, King County WA

Over the past few decades, technological advances have progressed at a level we couldn’t have predicted. Cloud storage, Internet of Things, Bring Your Own Device, remote working, and now Artificial Intelligence have altered the landscape of what it means to be a Chief Information Officer. The resiliency needed to succeed as a CIO can compromise your time rapidly. We are all attempting to balance work and life, this is no different for IT leaders of all types.

Given the demands of cybersecurity and high productivity, today’s CIO must exhibit strong leadership, good decision-making, and a keen financial awareness. Building an IT staff can help you achieve all these objectives, provided you have the right mix of skills, experience, ambition, and diversity. Join Megan Clarke, CIO for King County, Washington, for a discussion about today’s modern-day CIO. Success looks different today, and the definition will only continue to evolve. Megan will share tips about using mental strength and determination as key tools to meet expectations.

Megan K. Clarke, Chief Information Officer (CIO) for King County WA, is a highly experienced, successful, and well-regarded business leader and CIO. She comes to King County from the City of Burbank, where she served as the Assistant Chief Information Officer. Megan brings 19 years of experience in the CIO field and has also previously been in the role of CIO with Stanford University, University of Southern California, The Academy of Motion Picture Arts and Sciences (The Oscars), and The National Academy of Recording Arts & Sciences (The GRAMMYs).

[1 CPE] People or Machines? An Open Panel Discussion on Building a Balanced IT Team

  Presented by INTERFACE Advisory Council

You may be a small IT shop with limited resources. Using AI applications could help you tremendously but can have drawbacks. What is the correct balance of human workforce and AI supplementation? Every situation is unique and what works for one company, may not work for others. For larger IT shops, the challenges of retaining your top talent and training your staff properly create their own set of challenges. At the end of the day, how you manage your assets to get the job done remains a key responsibility of all IT leaders.

Join the INTERFACE Advisory Council for an open discussion about retaining your workforce, training the next generation of IT leaders, and using AI when appropriate. The difficulty you have in keeping your business operational while secure will never get easier. IT professionals need all the help they can get. Join this panel discussion to hear from your peers about how you can accomplish this tough task.

Moderator: Tony North, Sr Manager, IT Services, King County, Washington

Panelists:

  • Tad Doviak, Master of Cybersecurity and Leadership
  • Sreedhar Pamidiparthi, Director, Technical Architecture, Archway Software
  • Michael Secright, Chief Information Officer, HFS University of Washington
  • Harald Upegui, Director, Information Security, HealthPoint

[1 CPE] Incident Response: A Peek Behind the Curtain & the Solution

  Presented by Ron Pelletier, Founder and Chief Customer Officer • Pondurance, with iT1 Source

Join Ron Pelletier, Pondurance’s Co-Founder as he shares insights from the in-house Incident Response Team on current causes & trends, shortfalls on current IR Teams, and the solutions available. Learn about how Ransomware has evolved, how it’s analyzed, and what measures should be taken by security programs to keep themselves secure.

Ron has more than twenty-five years of client advisory experience in security and enterprise risk management. His expertise is centered within the enterprise risk assessment, business continuity, and governance areas. He has also provided HIPAA, HITECH, ISO 27002, and PCI DSS advisory services to large and mid-sized organizations. Ron is certified in multiple disciplines relating to information and asset protection, including Certified Information Systems Security Professional (CISSP), Certified Information Systems Security Manager (CISM), Certified Business Continuity Professional (CBCP), Certified Information Systems Auditor (CISA), Certified Computer Forensics Examiner (CCFE), and Certified Ethical Hacker (CEH).

[1 CPE] AI in Cybersecurity: Navigating the Double-Edged Sword

  Presented by Johan Bloomhart, Principal Sales Engineer • WatchGuard & BlackPoint IT

The rise of Artificial Intelligence (AI) has introduced both transformative opportunities and unprecedented risks to the cybersecurity landscape. While AI is a powerful tool for automating threat detection and enhancing security protocols, it also presents new avenues for cybercriminals to launch more sophisticated attacks. In AI in Cybersecurity: Navigating the Double-Edged Sword, we’ll explore AI’s dual impact—empowering both defenders and attackers—and discuss how to harness AI responsibly to protect against emerging threats.

This session will cover:

  • An overview of AI’s evolution and its prominence in the modern business world.
  • How malicious actors exploit AI for nefarious purposes, and the vulnerabilities that arise.
  • How cybersecurity professionals use AI to fortify defenses, identify threats, and mitigate risks.
  • Predictions for AI’s long-term influence on the security industry.
  • The latest technological tools and techniques that can mitigate the risks posed by AI.

We’ll also offer guidance on developing an artificial intelligence policy that allows your organization to leverage AI’s productivity benefits while minimizing risks to data security. Participants will walk away with actionable insights into how to implement AI securely in their business, staying ahead of both competitors and cyber threats.

[1 CPE] The Future of AI-Enabled Data Platforms

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Removing the infrastructure silos and administration complexity around your application’s data gives you the flexibility to consume solutions and deliver total data freedom. Join us as we showcase the future of data storage as a single hybrid cloud platform for applications. Allowing you to consume the data services you need, where and when you need it! Offering a single data plane and control plane across block, file, object, and mainframe, with one common experience for administration, analytics, and automation.

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Liran Chen, Vice President, Sales Engineering & Technical Services • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

[1 CPE] Cyber Threats: Facts, Frauds, and Fallout

  Presented by Robert L. Kardell, Esq. • INTERFACE Advisory Council

This session will explore the current trends of cyber threats, crypto frauds, including the trading platforms, and the international aspects of the cryptocurrency exchanges. We will also review how the platforms are being used to commit fraud as well as the investigative steps necessary to identify the ultimate recipients of the trades and transfers. Finally, we will discuss the investigation and litigation steps necessary to protect consumers from cyber threats and cryptocurrency scams and the discovery and recovery processes.

Robert L. Kardell (Bob) is an attorney whose practice focuses on cyber-breach incident response, legal and technology-based risk management solutions, technology and cyber-defense policy and protections, intrusion remediation, and fraud prevention and investigation. Bob has more than 22 years of experience working for the Federal Bureau of Investigation as a Special Agent and Supervisory Special Agent, as well as a Program Coordinator for Public Corruption, Complex Financial Crime, Healthcare Fraud, and Domestic Terrorism.

[1 CPE] Recovery Revolution: How to Stay Ahead of the Unexpected

  Presented by IP Pathways

This presentation will explore cutting-edge approaches, best practices, and innovative technologies that can strengthen your disaster recovery preparedness. Learn how to stay ahead of emerging risks and revolutionize your recovery plan for long-term resilience. Executives and IT leaders must understand not only why DR is important, but how the architecture behind it ensures rapid recovery, data integrity, and minimal disruption in the event of a disaster.

[1 CPE] Don’t Build a Fire Department

  Presented by Andrew Schori, Enterprise Account Executive • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24×7 monitoring across your collective attack surfaces.