[1 CPE] Securing the Hybrid Cloud: Visibility Best Practices

  Presented by Gigamon

With the move to cloud and the multitude of approaches, your ability to effectively monitor and secure workloads gets even more difficult. IT complexity, the rate of change, lack of skills, and organizational silos have made confidently managing security and performance nearly impossible. Visibility is critical. Join us for a discussion of the security considerations for on-prem private, public, and hybrid clouds. You’ll learn best practices and see how a little planning and design can go a long way. Achieve a secure and viable hybrid cloud implementation and get a high return on your investment.

[1 CPE] Developing a Vision and Strategy for Security Centric IAM Programs

  Presented by Business Partner Solutions

Learn how to defend new age data breaches through Identity Centric Security. 80% of cyber incidents stem from stolen credentials & privileged accounts. By including Identity Centric Security (ICS), organizations can proactively manage their threat landscape, ensuring better threat intelligence and breach defenses.

Topics discussed will inlcude:

  • What is ICS?
  • How does ICS enable risk-based decision-making?
  • How does ICS strengthen breach defense?
  • Approach to embracing ICS

[1 CPE] Aligning Projects to Organizational Strategic Objectives

  Presented by INTERFACE Advisory Council

As investments in projects decrease in organizations, it is important to ensure that authorized and funded projects are aligned with the strategic objectives of the organization. This became a challenge in the last year as many of those objectives were forced to be modified – and many projects felt the impact of the change.

In this session, Greta Blash, a PMI-certified instructor, will explain how to align a project with an organization’s strategic objectives and the impact of overall changes to the organization.

Greta has extensive experience as an executive and consulting IT professional, both domestically and internationally. Her areas of experience include: program management, project management, agile development, and business analysis; with emphasis in the areas of customer relationship management, business intelligence, continuous improvement, system implementations, and conversions. Greta is a PMI-certified instructor and a certified project manager (PgMP, PMP, PMI-PBA, PMI-PBA, and CDAP) whose extensive experiences enable her to manage multiple high-risk, high-tech projects.

[1 CPE] Do You Feel the Need… the Need for Speed? Top Five SQL Server Query Tuning Tips

  Presented by Quest Software

Query tuning is key to peak performance in SQL Server databases. However, lots of developers and DBAs constantly struggle to pinpoint the root cause of performance issues and spend way too much time trying to fix them. In this presentation, Quest will share their tried-and-true best practices for tuning SQL statements and other issues by utilizing Wait Time Analysis, reviewing execution plans, and using SQL diagramming techniques. In addition, we’ll present several case studies to demonstrate these best practices.

Regardless of the complexity of your database or your skill level, this systematic approach will lead you down the correct tuning path with no guessing, saving countless hours of tuning queries and optimizing the performance of your SQL Server databases.

[1 CPE] How Zero-Trust Enables the Future of “Work from Anywhere” Secure Access

  Presented by Cisco & Duo Security

The perimeter-focused security model of decades past is no longer adequate for securing the modern enterprise. Now, organizations must secure a mobile workforce using a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks — and this trend only accelerated during 2020’s global shift to remote work. Fortunately, a modern access strategy built on zero-trust fundamentals can defend today’s workforce while paving the way to a passwordless future. Attend this session to learn how the zero-trust access model works, reduce your reliance on passwords and risk of password-based attacks, and how to start planning and staging your zero-trust evolution today.

[1 CPE] Do We Need Our Own SOC?

  Presented by VPLS

Within a company, a SOC (Security Operations Center) is the focal point of the company’s security operations and network defense, commonly responsible for real-time monitoring, incident response, and proactive prevention of incidences. Many organizations may feel they are already doing these activities without a SOC. But SOCs vary in maturity levels and capabilities—so does your company really need one?

In this presentation, John Headley, Senior Security Engineer at VPLS, reviews the many components of a SOC to ultimately help you answer the question: “do we need our own SOC?” Join this presentation to learn:

  • The importance of cybersecurity operations within an organization, including how a typical cybersecurity operations team is organized into a SOC
  • What capabilities a SOC can provide to an organization
  • What tools the SOC uses
  • How to quantitatively self-assess if your organization should build a SOC or outsource this responsibility to a managed security services provider

[1 CPE] How Salt Lake County Gained Visibility and Control of Distributed Endpoints

  Presented by Tanium

When the COVID-19 pandemic forced much of the world to stay at home overnight, state, and local government leaders swiftly pivoted their workforces remote so they could continue to deliver critical citizen services. But this rapid shift opened new cybersecurity vulnerabilities. Suddenly, attack surfaces expanded, and endpoints became widely distributed, leading to an increase in cyber threats.

Learn how Salt Lake County’s Information Technology Division:

  • Patched in a new distributed workforce
  • Managed their remote endpoints with increased critical vulnerabilities
  • Tracked their IT assets and continue to mature their Endpoint Management

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.