[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve

IDC advises that a 3-2-1-1 strategy is the new best practice for effectively protecting customers against ransomware. The last 1 is the important piece of the puzzle, where a copy is also stored on immutable storage. The growing risk of compromise to your customers’ data – specifically via ransomware DEMANDS the most up to date and complete solutions arsenal.

[1 CPE] Ransomware Protection Redefined: Protect, Alert, and Recover

  Presented by Veeam

Ransomware is malicious software that infects a computer and restricts access to crucial user data until a ransom is paid to unlock it. Ransomware is designed to spread through your network, exploiting technical and human vulnerabilities and leading to a significant impact on your business. Ransomware attacks were up 93% in 2021 and are no longer a question of if but when. Costs have skyrocketed to nearly two million dollars (US) per incident and have a global economic impact of over 20 billion dollars (US).

Join this session to learn how to ensure your backups are immutable, that you’ll be alerted of any possible ransomware attacks in your virtual environment, and that you’re able to recover those workloads free of any malware.

[1 CPE] Leveraging Assessment Findings to Harden Your Security Perimeter

  Presented by Fortinet

Are you regularly evaluating your network security?

Performing assessments is a tried-and-true method for improving your security posture, but they can be a daunting task for network security staff who are often short on manpower, expertise, and/or time. Regardless, the benefits of running assessments almost always outweigh any potential drawbacks. Having a security assessment in hand will increase your security situational awareness and significantly impact your organization’s risk preparedness and mitigation.

Join us as we discuss the importance of periodically validating your existing security controls and provide learnings and best practices from our experts.

[1 CPE] Ransomware: Why Does This Keep Happening?

  Presented by Arctic Wolf

Join Coy Thorp, Systems Engineer for Arctic Wolf, as he discusses the history and evolution of ransomware and why it has become so difficult to detect and mitigate. The basic premise is this: organizations spend more today than ever before to address cybersecurity risk, yet breaches are on the rise and there is no end in sight. What can your company do to prepare itself for the attack that is imminently on the horizon?

[1 CPE] Reinforce Your Operations Through Network Modernization

  Presented by Spectrum Enterprise

With the rise in remote workforce models, protecting your network is imperative. In this session, you’ll discover how to achieve resiliency, redundancy, and diversity through a wholly-owned national network. How can you secure required upgrade certifications and meet compliance requirements when you need a tailored and customized solution with the option of a fully managed or co-managed network? Join us to learn more about how to reinforce your operations through network modernization to successfully overcome the impacts and challenges that we have collectively faced in the last two years.

[1 CPE] Taking Control of Enterprise IoT Security

  Presented by Hillary Baron • Director of Research, Analytics, Cloud Security Alliance

Organizations rely on IoT devices to improve productivity, manage operations more efficiently, boost business opportunities, etc. To perform these functions IoT devices collect large amounts of sensitive data on the organizations, necessitating secure implementations of the entire IoT ecosystem. In this presentation, Hillary Baron, Director of Research – Analytics at CSA will cover:

  • The history and current state of IoT security
  • Leveraging and tailoring CSA’s IoT Controls Matrix
  • Future areas of research to improve IoT security

Hillary Baron is a Director of Research, Analytics for Cloud Security Alliance – a non-profit dedicated to defining and raising awareness about cloud security best practices. As a part of her role, she manages research projects on topics like blockchain/DLT, quantum-safe security, and the Internet of Things. Hillary also leads the ad-hoc survey research, including creating questionnaires, analyzing data, and reporting the findings. Formerly as a program manager, she spearheaded the creation of CSA’s webinar program, CSACloudBytes, and developed it into an award-winning series. Hillary earned a CCSK v4 and a Master’s of Science at the University of Wisconsin – Stout.

[1 CPE] Breaking Down the 5 Most Disruptive Vulnerability Types

  Presented by Arctic Wolf

A vulnerability is a weakness in your infrastructure, networks, or applications that can potentially expose you to threats, such as data theft, denial-of-service attacks, or ransomware attacks. Join us as we discuss what makes vulnerabilities truly dangerous and take a deep dive into five types of vulnerabilities that risk management programs should focus on to most effectively eliminate risks.

We will cover:

  • The five riskiest types of vulnerabilities
  • Why they are dangerous and how bad actors exploit them
  • The key to identifying and protecting against them

[1 CPE] Endpoint Systems Management: Time to Rethink

  Presented by Quest Software

See the recent changes to the endpoint environment and how these affect your infrastructure. Learn how these changes affect your network design and what this means for your daily business. Learn more about the new technologies available for managing your endpoints and see some tips and guidelines to be prepared for what’s next.

[1 CPE] How to Successfully Manage Technology Challenges for a Remote Workforce

  Presented by INTERFACE Advisory Council

Your workforce will be dispersed permanently following the pandemic. Companies will no longer have their staff under one roof. Employees are working remotely in your city and throughout the country. This certainly has brought many challenges for IT departments everywhere. This is however the new business reality and adjustments have been made over the last year and a half to deal with the permanent remote workforce.

What are the best programs for basic monitoring of work? Can a VPN be trusted to securely handle your security needs? Is there really any difference between Zoom and Teams? Join the INTERFACE Advisory Council for a discussion about these questions and more. These challenges are nothing new but have quickly become more complex and common. Also, we will address the mix of workers coming back into your office and how that affects physical workspace changes.

Panelists:

Michael Agtunong • Manager, Information Technology, Gather Federal Credit Union
Jeromy Giacosa • Vice President, Information Services, Exagen
Matthew Linzer • Manager, Information Technology, University of California Office of The President

[1 CPE] 5 CISOs and a Whole Lot of Thought Leadership

  Presented by EVOTEK

Today’s environment demands attention on several fronts. This is especially the case as it relates to information security. Companies, no matter their size, are dealing with the same issue – how to survive and thrive in a digitally dangerous climate. EVOTEK’s executive advisory team addresses this question daily via their unprecedented roster of thought-provoking CISOs. Grab a front-row seat and join them in this session as they share years of experience and colorful insights in and around information security.