[1 CPE] Ransomware – Who, What, Why & How…

  Presented by Check Point

Over the last 12 months, ransomware attacks surged by 93% with a devastating impact on businesses and industries worldwide. In today’s hybrid IT environment, preventing ransomware attacks seems like an impossible feat. But is it?

In this session, we will cover the latest ransomware trends and how you can protect your organization from falling victim to sophisticated ransomware attacks.

[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve

IDC advises that a 3-2-1-1 strategy is the new best practice for effectively protecting customers against ransomware. The last 1 is the important piece of the puzzle, where a copy is also stored on immutable storage. The growing risk of compromise to your customers’ data – specifically via ransomware DEMANDS the most up to date and complete solutions arsenal.

[1 CPE] Thinking Upstream: Avoid the Fallout of the next Log4Shell

  Presented by Tidelift

News of a zero-day vulnerability in the popular open-source project Log4j broke in December, leading many organizations scrambling to figure out the impact on their applications. Nearly every organization developing applications was impacted, and the fallout was so broad that the FTC issued guidance.

Log4Shell comes on the heels of the U.S. White House cybersecurity executive order 14028, an attempt by the United States government to use its purchasing power to create positive changes to the way cybersecurity is addressed around the world.

Recent high-profile breaches like Log4Shell, the Colonial Pipeline ransomware attack, or the SolarWinds software supply chain attack have shown that our cybersecurity defenses are woefully inadequate. This executive order forces a higher standard of cybersecurity for any organization selling software to the federal government, which in turn makes it the de facto global standard for all software in the future.

Tidelift CEO and co-founder Donald Fischer shares his perspective on how the Log4Shell vulnerability and the cybersecurity executive order impact software supply chain security. He’ll brief attendees on the key issues addressed by the executive order, including software bill of materials (SBOM), supply chain security, and provenance requirements. He’ll outline the gaps that most organizations will need to close to stay in compliance. And he’ll share a proactive approach to addressing open-source software supply chain health and security upstream.

If you want to ensure your organization is fully prepared for the coming changes, you won’t want to miss this session.

[1 CPE] Leveraging Assessment Findings to Harden Your Security Perimeter

  Presented by Fortinet

Are you regularly evaluating your network security?

Performing assessments is a tried-and-true method for improving your security posture, but they can be a daunting task for network security staff who are often short on manpower, expertise, and/or time. Regardless, the benefits of running assessments almost always outweigh any potential drawbacks. Having a security assessment in hand will increase your security situational awareness and significantly impact your organization’s risk preparedness and mitigation.

Join us as we discuss the importance of periodically validating your existing security controls and provide learnings and best practices from our experts.

[1 CPE] Zero-Trust Architectures

  Presented by Rubrik

Organizations have invested heavily in IT security, attempting to fortify their perimeter, network, endpoint, and application protections. Despite these investments, hackers are successfully penetrating these defenses and targeting enterprise data, including backup data. Ransomware is starting to specifically target online backups by encrypting or deleting them. If your organization was the target of an attack today, how do you know what data was impacted and where? Manually sifting through millions of files and comparing each snapshot consumes FTE time and prolongs recovery exponentially. Mass restores of the entire environment could mean high data loss and weeks’ worth of work down the drain. In this session, we will discuss how to protect your last line of defense, the backups. We will walk through the anatomy of a recovery, the best practices, and advanced tools to ensure you will not have to pay a ransom, and how to quickly recover your data to continue business operations.

[1 CPE] How to Advance Strategic Business Goals with IoT

  Presented by Aruba, a HPE Company

Whether it’s the allure of the concept of the Internet of Things (IoT), a fear of being viewed as a laggard, or internal pressure to do something new, many companies rush head-first into IoT projects without clearly defined objectives or value propositions. The result is a high rate of failure and subsequent disillusionment about the real value of IoT. If your company’s strategic goals require human productivity monitoring, human productivity organizational redesign, augmented reality, energy monitoring, and/or building security, Aruba’s ESP can expedite time-to-insight and time-to-value. The solutions can securely handle all manner of IoT devices and integrate them with enterprise business applications and processes. Join us to learn how you can reduce IoT deployment time to a fraction of what a custom-developed solution would require.

[1 CPE] Chain Reaction: CISA Task Force & the Cyber Supply Chain

  Presented by Chad Kliewer • Information Security Officer, Pioneer Telephone Cooperative

We’ve all heard of “supply chain” by now. How do we go about actually doing something about it? Chad Kliewer will introduce the CISA Task Force that has been digging into supply chain issues for several years and share some resources – even some specifically designed for small and medium businesses – to adopt sound cyber supply chain practices.

Chad Kliewer is the Information Security Officer overseeing the cybersecurity and privacy programs for Pioneer Telephone Cooperative in Kingfisher, OK. He has over 20 years of experience in Information Technology and Security from PC Tech to CIO, including PCI, HIPAA, and SOX compliance. During his career, Chad has worked in healthcare, banking, and telecommunications, and has been outsourced, insourced, and resourced working with companies from 50 employees to more than 50,000 employees giving insight to companies large, small, and between. He holds a master’s degree in Cybersecurity and Information Assurance from Western Governors University, is currently serving on the board for InfraGard Oklahoma, and maintains the CISSP and several other certifications.

[1 CPE] The Insider Threat You Don’t See Coming

  Presented by INTERFACE Advisory Council

IT leaders spend countless hours focusing on security awareness training and safeguarding systems. End-users of all types have been thoroughly educated on what not to do and taught how to identify threats. Now with so many employees working remotely, this has only added to the challenges of good cyber hygiene.

In recent months, we have seen the “great resignation” as employees are quitting jobs at record numbers. Some of this is through job dissatisfaction while some are leaving to spend more time with family. The question to ask now is, have IT departments armed employees to be a new insider threat? Could a disgruntled employee now intentionally allow a threat to get through your systems? How can you tell malicious intent by an end-user vs. an innocent mistake?

Join the INTERFACE Advisory Council for a discussion about this threat. These challenges are nothing new but have quickly become more complex and common.

Panelists:

  • Aaron Baillio • Chief Information Security Officer, University of Oklahoma
  • Jonathan Kimmitt • Chief Information Security Officer, University of Tulsa
  • Daisha Pennie • Manager, IT Compliance, Oklahoma State University

[1 CPE] Ten Easy Things You Can Do Today to Secure Your Online Presence

  Presented by Pedro Serrano • Chief Information Security Officer, Grand River Dam Authority

In this presentation, Pedro Serrano will take a quick look at the most important security issues that every company should be educating its users on.

  1. You are the Target
    • Why you are the target – it’s all about Money!
    • How much data are you sharing?
  2. Social Media
    • You should check your settings, regularly!
  3. Protect your PC
    • Pedro’s 5 rules for home PC
  4. Passwords Sharing Devices
    • With so many passwords, let’s learn how to manage
    • Best password managers available today
  5. Protect your home network with a simple change in your router
    • OpenDNS – free and it works!
  6. Two Factor Authentication
    • Easy ways to implement it (This is now the new normal)
  7. Online purchases – we all do!
    • How to protect yourself – Debit vs. Credit card
  8. Backup your data (Work – Home – Phone)
    • Can you verify that it’s there?
  9. Microphones are always on! – Who is listening?
    • You carry and have them in your home
    • Your car is listening, and I know where you are
  10. Credit Freeze – It’s really easy now!

The main theme of this session could be summarized like this:

The Human element: I can add all the technical controls that I can get my hands on but if my employees (internal users) behave in a matter that is not safe (like clicking on a link that is malicious) the technical controls will not be able to stop an attack. Therefore, you are the first and last line of defense, you can make the difference!

[1 CPE] Leading and Innovating in a Hyperconnected World

  Presented by Mike Mathews • Vice President for Technology and Innovation, Oral Roberts University

The acceleration in technology advancements within a hyperconnected world has forced many IT leaders to re-invent their standard mode of operations. In addition to being a great manager, leader, and coach, the IT leader of the future must be a world-class innovator. Michael Mathews will discuss the trends across the globe which have impacted most businesses while dissecting what it means to be an innovative leader across any organization.

Mike is currently the VP for Technology and Innovation at ORU, where he has served for the past 7 years. Mike has over 24 years of experience as a senior-level IT executive bringing creative solutions that value the end-users of education, technology, and business process management. These solutions have benefited the end-users of higher education, manufacturing, and high technology company products. Mike spent 12-years working at Cray Research where he trained hundreds of supercomputer engineers across major industry sectors.

Mike has held positions as a VP of Innovation, Chief Information Officer, General Manager of CIOs, Chief Strategist for Innovation, Business Development Officer, Trainer, Teacher, and Vice President of Academic Services for leading corporations and higher education. Mike has been a CIO within higher education and corporate training for over 19 years. Mike has spoken in ten different countries during the past five years to educate governments and leaders on educational modalities.

Mike is the author of three books and hundreds of articles on theology, education, and technology that is shifting the worldview for everyone.

Mike was named 2021 Leading Education Technologist by Chief Information Officer Reviews, 2020 Top 20 Business Leaders by Industry Wired, 2019 Top Ten Innovators by Industry ERA, one of America’s Top 30 Education innovators in 2017, and a 2018 CIO 100 Award Winner.