[1 CPE] Seeing Your Attack Surface Through the Eyes of an Adversary

  Presented by Kraig Faulkner, Channel Systems Engineer – Cortex • Palo Alto Networks

Modern attack surfaces are dynamic. Without clear visibility that is constantly updated, it is all too easy to have persistent exposures and unmanaged assets. Security practitioners can only be as good as the data they have, so having a strong foundation of continuous discovery and monitoring ensures you can keep up with modern, dynamic attack surfaces to find, prioritize, and mitigate exposures as they arise.

[1 CPE] How to Stop East/West Attacks in Your Data Center

  Presented by Aruba Networks

70% of all breaches are caused by endpoint security vulnerabilities, followed by lateral movement in the data center. Halt that hacker traffic. Attend this session to learn about a new category of data center switch that combines best-of-breed L2/3 switching with the industry’s first hardware-accelerated programmable processor. This new tool augments your malware and ransomware detection and response capabilities by delivering stateful firewall services inline, at scale, with wire-rate performance and orders of magnitude improvement over traditional data center L2/3 switches. You will learn how to gain visibility and enforce security policy for all East/West flows between workloads to protect the critical assets in your data center.

[1 CPE] Why is Critical Data Being Compromised?

  Presented by Thales Group

Securing critical data and information was where this industry started a long time ago, but it became more challenging with the rapid growth of enterprise data in an interconnected world. The pandemic forced organizations to support a remote workforce and expose critical systems that were once only accessible from inside the company’s network. We’ve increased the attack surface and the number of vulnerabilities which has led to more data breaches. With the technology advancements in access management, data discovery and encryption we can once again shift the focus to securing our data and information. In this presentation, we will discuss a unified data-centric security approach and strategy to protecting your most critical data and information.

[1 CPE] Cybersecurity and Compliance For Winter 2023/2024

  Presented by Rob Wayt, Director of Governance, Risk & Compliance • Structured Communication Systems

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI and security best practices. This discussion will focus on security solutions to these challenges, including penetration testing and zero trust implementations.

[1 CPE] Backup ≠ Cyber Recovery

  Presented by Matthew Sheehan, Enterprise Sales Engineer • Rubrik

Legacy backups are vulnerable to attacks, can’t help you find threats, and force you to do wholesale restores that drag out recovery times. Rubrik Zero Labs found that only 5% of organizations were able to return to business continuity or normal operations within one hour of discovering a CyberAttack. A modern cyber recovery solution is critical for Security and IT teams to be cyber-resilient. Learn how you can make your data indestructible.

[1 CPE] Email Archiving and Security Compliance

  Presented by BlackPoint IT Services

In today’s data-driven world, email has become an indispensable tool for communication and collaboration. However, the sheer volume and sensitivity of email data pose significant challenges for organizations seeking to ensure data integrity, maintain compliance, and safeguard against cyber threats. In this presentation, we will delve into the intricacies of email archiving and security compliance, providing you with a comprehensive understanding of the essential principles and practical strategies for effective email management.

[1 CPE] Modernizing Your DR Strategy

  Presented by Scott Hetrick, Pre-Sales SE Manager NAM • Quest Software

Creating a DR plan is a must. Understanding where to begin and where you want to be can offer challenges. We must start at the beginning which entails bringing in all stakeholders and understanding the Data. Many times, it’s obvious that there are power failures, server failures, DB failures etc. However, we must understand the value of the data in each department. During this presentation, we’ll focus on how to create a DR plan with the Data being centric. By looking at things from this perspective you’ll better understand the value of the data which will allow you to create a DR plan that incorporates immutability and storage.

[1 CPE] Data Backup Best Practice for SMEs

  Presented by Jane Garrity, Director Channels, North America • Macrium Software

Data is one of the most valuable resources in the world, so doesn’t it make sense to keep such an important asset safe? In the same way that businesses insure physical assets and employees, backup protects data. As life is unpredictable and people can make mistakes, whether a natural disaster, hardware failure, or an employee accidentally infecting your network with a nasty virus, having current backups gives you peace of mind. In this session, we will review the proactive approach to data loss.

We will provide a broad yet critical overview of data protection, which will require us to discuss how data is imperative to business operations. We’ll cover the everyday risks to your business’s data, the consequences of data loss, and the significance of developing a data backup plan. We approach topics like understanding your business needs, analyzing the data backup types and methods, and knowing how to equip your teams for data backup and recovery best practices. As a trustworthy and reliable leader in backup software protection, Macrium Software is delighted and compelled to explore backup that can scale to meet the needs of your business.