[CANCELED] AI: How to Balance Innovation with Accountability

  Presented by Andreas Bohman, VP, Information Technology; CIO • University of Washington


This session will not take place as planned, and we appreciate your flexibility. Please enjoy one of our Advisor-led Roundtables.

AI is advancing faster than most governance models can keep up. Large organizations face a growing gap between innovation and control, between those who adopt responsibly and those who fall behind. Drawing on lessons from leading AI at the University of Washington, this session explores how to balance innovation with accountability by turning governance into infrastructure rather than oversight. Attendees will learn how to build trust, manage risk, and design systems that accelerate progress while maintaining transparency and control.

[1 CPE] Taking A Data-First Approach to Cyber Risk Management

  Presented by Austin Starowicz, Director, Solutions Consulting • Mastercard Cybersecurity

Cyber Risk Management has evolved. Every new vulnerability or regulation adds further pressures on already stretched teams to predict and manage the weakest links within your internal IT infrastructure. Piling on to today’s cyber risk landscape is the ever-expanding digital supply chain, and the need to onboard, assess, and monitor third parties, fourth parties, and Nth parties.

But does it really have to be that way?

Join this session from Mastercard Cybersecurity for an exclusive presentation on how a proactive “data-first” approach to cyber risk management can help you:

  • Improve monitoring for critical vulnerabilities to determine which ones really matter
  • Identify, Prioritize and Assess affected third parties in real-time
  • Leverage objective risk data into the decision-making processes
  • Streamline workflows and scale your operations

[1 CPE] Insider Session: From Retired to Replaced – Preparing for Microsoft’s Wave of Changes

  Presented by iT1 Source

In this insider session, we’ll break down Microsoft’s biggest licensing and product changes so you can prepare, stay compliant, and avoid unnecessary costs. From shifting discounts to looming end-of-support deadlines, we’ll cover what every business needs to know.

Key Takeaways:

  • How Microsoft’s recent announcement will impact EA & MPSA pricing.
  • Practical steps for moving from EA to CSP with confidence.
  • Are you still running outdated technology that reached Microsoft’s end of support in October?

[1 CPE] The Foundation of Strong Security: Demystifying CIS Controls 1 & 2 for Enterprise Success

  Presented by Collin Covington, Sales Engineer • Axonius

Tired of the gap between security compliance and applicability? This session explores how to turn CIS Controls 1& 2, Asset Inventory and Secure Configuration, into actionable steps that strengthen your organization’s security foundation. We’ll discuss why these controls are essential for measuring and reducing risk, and how to apply them in ways that drive real outcomes rather than just checking compliance boxes. You will gain practical guidance to improve efficiency, reduce risk, and translate security requirements into meaningful results.

Strategic Solutions Briefings with Sentry Computing

  Presented by Sentry Computing

The Strategic Solutions Briefings with Sentry Computing offers a dedicated space designed to give you a deeper look at how managed IT services can strengthen security, reduce risk, and improve day-to-day operations. In this non-CPE experience, Sentry’s specialists will share practical guidance, common pitfalls they help clients overcome, and strategies for building a more secure and resilient IT foundation. This is a great opportunity to ask questions and explore solutions that can make a meaningful impact.

Join Sentry Computing and leading technology partners for a rapid-fire series of briefings and a thought-provoking panel exploring the innovations shaping today’s IT landscape. This dynamic 2-hour block delivers fresh insights, practical strategies, and the chance to engage directly with industry experts.

LIGHTNING ROUND

  • 1:00–1:15 PM — Sentry Computing

    Leading IT Forward: Security, AI and Automation in 2026
    Sentry kicks off the block with an energizing look at how AI is reshaping infrastructure, security, and strategic IT planning—offering practical guidance you can apply today.
     

  • 1:15–1:30 PM — Acronis

    From Reactive to Predictive: The Next Phase of Cyber Resilience
    Get the latest insights from Acronis on safeguarding your organization against emerging threats, followed by an open Q&A for real-world answers.
     

  • 1:30–1:45 PM — Egnyte

    Unlocking Next-Gen Capabilities for Your Mission-Critical Content
    Learn how Egnyte is elevating content management and security while adding impactful AI to address industry needs.
     

  • 1:45–2:00 PM — Fortinet

    Securing the Edge: Fortinet’s Innovations You Need to Know
    Fortinet shares updates on next-gen network defense and zero-trust strategies—essential insights for staying ahead of fast-moving security demands.
     

  • 2:00–2:15 PM — Cork Cyber

    Financial Protection as a Service: Minimize Your Out-of-Pocket Loss
    An inside look at how risk intelligence and financial protection as a service can reduce financial exposure and provide a stronger safety net for modern organizations.
     

PANEL DISCUSSION

  • 2:15–2:50 PM — Partner Panel

    The Future of IT: A Candid Conversation with Industry Leaders
    Hear experts from Sentry and its partner ecosystem discuss the biggest trends shaping IT in 2025, with practical takeaways and audience-driven Q&A.

[1 CPE] Rethink Incident Response: From Hourly Guesswork to Guaranteed Outcomes

  Presented by John McLaughlin, Principal Sales Engineer, PNW & Gary Quinn, Sr Sales Engineer, Enterprise US • Arctic Wolf

Traditional incident response often leaves organizations reacting under pressure, navigating uncertain costs, inconsistent coverage, and slow recovery. In this session, we’ll examine strategies for making incident response more predictable and outcome-focused. Participants will explore how structured response models—emphasizing planning, rapid containment, and coordinated recovery—can reduce operational risk, minimize downtime, and support business continuity. Attendees will gain practical insights into aligning incident response practices with organizational goals, enabling IT, risk, and executive teams to make more informed decisions and improve overall cyber resilience.

[1 CPE] Securing AI Without Slowing Innovation: A Blueprint for the Future of Cybersecurity

  Presented by Scarlett Menendez, Solutions Engineer • Trend Micro

AI is transforming the enterprise—bringing new opportunities for efficiency, but also introducing unprecedented risks. From prompt injection and model poisoning to shadow AI and deepfakes, the attack surface is evolving faster than most IT teams can keep up. In this session, we’ll explore Trend Micro’s Security for AI Blueprint, a step-by-step framework for protecting data, models, infrastructure, and users in an AI-driven world. You’ll also see how Trend Micro leverages AI across its own cybersecurity platform, combining decades of research with modern generative AI to deliver proactive protection. Walk away with practical strategies you can apply to safeguard your organization’s AI initiatives—without putting innovation on hold.

[1 CPE] Beyond MFA: Architecting True Identity Resilience for the Modern Enterprise

  Presented by Rubrik

In the interconnected digital landscape, identity is the new perimeter. Yet, organizations frequently struggle to move beyond basic multi-factor authentication (MFA) and effectively solve the fundamental challenge of Identity Resilience—the ability to maintain business continuity and security even when identity systems or accounts are inevitably compromised.

This forward-looking session is tailored for CISOs and security architects ready to transition from traditional identity management to a proactive resilience model. We will dissect the modern identity threat landscape, driven by supply chain risks and large-scale PII exposure, and provide tangible frameworks for securing the enterprise.

[1 CPE] Real-Time Threat Mitigation with AI-Driven SASE: A Practical Approach

  Presented by Cato Networks

In this session, we’ll explore how a converged SASE platform combined with AI and machine learning (ML) enables real-time threat detection and mitigation, transforming network security from a reactive to a proactive model. The focus will be on how AI-driven solutions within the SASE framework can identify, analyze, and neutralize security threats in real-time across distributed environments.

[1 CPE] Don’t Panic: A Blueprint for Securing Your Data in the Age of AI

  Presented by Palo Alto Networks

It’s a fact: AI can unintentionally expose sensitive data. From customer engagement to back-office automation, intelligent systems are being deployed at such a rate that it’s not a matter of “if my data is exposed,” but “when.” In recent conversations with practitioners, it’s clear that security has shifted from an afterthought to a board-level priority. Organizations are standing up AI governance boards, drafting usage policies, and in some cases even blocking applications altogether to prevent potential data leakage.

Effective protection against AI data leakage starts with visibility. Organizations need the ability to inspect both the prompts entering an AI system and the responses coming back, so that sensitive information can be detected and stopped in real time before it leaves the enterprise. In this session, we’ll guide you through a blueprint that can help ensure your AI applications are secure, compliant, and trustworthy.