[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Liran Chen, Vice President, Sales Engineering & Technical Services • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

[1 CPE] The Future of AI-Enabled Data Platforms

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Removing the infrastructure silos and administration complexity around your application’s data gives you the flexibility to consume solutions and deliver total data freedom. Join us as we showcase the future of data storage as a single hybrid cloud platform for applications. Allowing you to consume the data services you need, where and when you need it! Offering a single data plane and control plane across block, file, object, and mainframe, with one common experience for administration, analytics, and automation.

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

[1 CPE] A Complete Security Blueprint

  Presented by Brad Nigh, Consulting Strategist • FRSecure

By analyzing your existing program, work completed, and using our categorization—foundational, developing, and mature—you should be able to place yourself and get an idea of what’s next for your security program.

Brad Nigh is a passionate information security expert with 25+ years of overall IT experience, including 15+ years of IT management and leadership experience working in 24/7 environments that required top-tier technical skills, and efficient project management. In addition, he has years of experience working in highly regulated industries that are required to comply with PCI-DSS, HIPAA, HITECH, Sarbanes-Oxley, OCC, and various state regulatory requirements. At FRSecure he leads the Consulting Services practice serving businesses of all sizes, in all industries by cooperatively solving the complex issues surrounding information security.

[1 CPE] A Pragmatic Approach to Implementing a Cloud Service Operating Model

  Presented by Pure Storage & Structured

For almost 10 years now, future-focused datacenter teams have been trying to evolve to a more cloud-like operating model. Some of us have succeeded, some of us have failed. During this fun-filled, example-heavy session, Solutions Architect Tristan Todd will share patterns of failure, patterns of success, some practical examples, and recipes for success on how organizations have succeeded in realizing success in adapting to a cloud ops model. This will be a fun, interactive, high-energy session that you won’t want to miss!

[1 CPE] AI-Driven Networking

  Presented by Juniper Networks & Structured

Every connection counts. Nearly every vital experience in modern-day life requires a strong network connection. At Juniper, we believe that connectivity is not the same as experiencing a great connection. When you shift from simply measuring connectivity to focusing on the experience of the end-to-end connection – everything changes. Join us to learn how Juniper is revolutionizing networking with an experience-first approach driven by the industry’s only AI-Native Platform.

[1 CPE] Cybersecurity and Compliance For 2024

  Presented by Rob Wayt, Director of Governance, Risk, and Compliance • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI and security best practices. This discussion will focus on security solutions to these challenges, including penetration testing and zero trust implementations. Rob Wayt, Director of Governance, Risk, and Compliance at Structured will be the presenter.

[1 CPE] Rise of Generative AI-Driven Attacks

  Presented by Shan Zhou, Director of Sales Engineering • Vectra AI& Structured

The rise of AI has fundamentally changed what we see, what we know, and what we do. We will delve into the negative and positive impact AI plays in information security with specific examples of the resources, platforms, and methodologies used by adversaries and defenders.

[1 CPE] Maximize Your Investment in Technology

  Presented by Dave Carlson, President • Summit Technology

Our company is consistently growing by 40% per year. We are doing this not by adding any additional people, but by maximizing the capabilities of the technology we are already paying for. In this session, we’ll show you the tools and techniques that we are using as well as some demos on how to do the same in your organization.

[1 CPE] Zero Trust Microsegmentation: It’s Easier Than You Think

  Presented by Craig Lockhart, Sr Systems Engineer • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

With over 25 years of experience in the cybersecurity industry, Craig is a seasoned expert in implementing innovative security solutions, specializing in security edge, multi-factor authentication (MFA), remote access, decryption, and Secure Access Service Edge(SASE) technologies. Craig leverages his experience to focus on finding optimum solutions to ensure technology supports business goals. His expertise has been instrumental in deploying robust security infrastructures for numerous large organizations across the western regions.