[1 CPE] How True Zero-Trust Accelerates Digital Transformation: Customer Cases

  Presented by WootCloud

As the IoT, WFH, and 5G megatrends make traditional network-centric security inadequate, new tools and processes to truly enable zero-trust best practices are essential to achieve secure digital transformation.

On top of this, teams are being asked to automate, analyze, and secure more with existing tools and manual processes. Users and their devices need intelligent access controls baselined on behavior, assets requested, and roles, whether they are corporate-managed or unmanaged.

We are excited to share how tech-forward organizations in education, healthcare, utilities, and more get 100% device and infrastructure visibility across RF or networks with intelligent analysis and remediation to help save their teams time and money to spend on important projects while achieving true Zero-Trust, all at IoT scale.

[1 CPE] Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, we’ll discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations

[1 CPE] Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak & Aruba, a HPE Company

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, we’ll discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations

[1 CPE] Protecting Your Data From Cyber Attacks

  Presented by Technology Integration Group

Protecting your Data from Cyber Attacks focuses on the current landscape and how internal/external bad actors have taken advantage of COVID-19 to exploit security gaps within numerous industries. Edge and system-level security isn’t enough. Protecting your data from breaches and manipulation should also be top priority. Hear how to identify, prevent, detect, and recover from a cyberattack. Learn about a cyber recovery solution and how its unique off-network architecture will enhance your overall business continuity plan.

[1 CPE] Situational Awareness Into the Dark Web

  Presented by Check Point Software

In our journey through this session, we take you through the evolution, goals, and motivation of the Dark Web. We will share with you what and whom you can find on the platforms as well as the major conflicts individuals face while exploring this web. The session also exposes you to the syndicates and structures running on the platforms. Surprisingly, we see how those groups were among the first to embrace and implement Blockchain technology and created a major global demand for crypto currencies. This is the time to listen, learn, and be exposed to the deepest secrets of the Dark Web.

[1 CPE] Ransomware In Focus: How AI Surgically Contains the Threat

  Presented by Darktrace

In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom or shut down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad-ranging and destructive, with organizations taking days, weeks, or even months to recover.

But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? Join this presentation to learn how Cyber AI is helping thousands of organizations fight back against ransomware. We’ll discuss:

  • The impact of ‘double-extortion’ ransomware and ‘ransomware-as-a-service’
  • Real-world examples of ransomware detected by Cyber AI
  • How self-learning AI responds proportionately to ransomware, thanks to its deep understanding of an organization’s pattern of life

[1 CPE] Cybersecurity, the Path of Most Resistance

  Presented by Dick Wilkinson • Chief Technology Officer, Supreme Court of New Mexico

As computer users continue to expect an increasingly seamless and touchless user experience from their devices, the cybersecurity industry insists on adding more touches and more seams to keep things locked up. This disconnect from users’ expectations to how we implement security controls leads to a variety of problems. It will take the entire industry shifting course to recognize the user’s demands to overcome this disconnect.

Dick Wilkinson is the Chief Technology Officer on staff with the Supreme Court of New Mexico and the Co-founder and CTO of Proof Labs inc. He is a retired Army Warrant Officer with 20 years of experience in the intelligence and cybersecurity field. He has led diverse technical missions ranging from satellite operations and combat field digital forensics to enterprise cybersecurity and cyber research for the Secretary of Defense.

[1 CPE] Global Supply Chain Cybersecurity

  Presented by New Mexico Tech Council

In today’s complex business environment, supply chains have become equally complex. For many organizations, those supply chains deliver both goods and services where software is a critical component.

The New Mexico Technology Council’s Cybersecurity Peer Group is proud to present on Global Supply Chain Security Concerns with Mark Fidel of RiskSense, Dr. Tyler Lovelly of the Air Force Research Laboratory at Kirtland Air Force Base, and Geoff Wilkerson of Seagate Technology. Join us to learn about the Cybersecurity concerns right now, and what is being done to mitigate these risks. The panel of New Mexico experts will touch on challenges from both the private and public sector.


Bios:

Mark Fidel is currently a co-founder RiskSense and manages all State, Local, and Educational Markets in New Mexico and the United States. He has a J.D. in Law, graduating from the University of Denver – Sturm College of Law. He earned his Executive MBA from the University of New Mexico and his bachelor’s degree in Finance from New Mexico State University.

Dr. Tyler M. Lovelly works within the Space Electronics Technology program at the Air Force Research Laboratory at Kirtland Air Force Base, New Mexico. His previous experience includes working with United Space Alliance supporting the NASA Space Shuttle program, serving as a research group leader at the NSF Center for Space, High-Performance, and Resilient Computing, and participating in the AFRL Space Scholars program. He holds a Ph.D. in Electrical and Computer Engineering from the University of Florida.

Geoff Wilkerson is a member of the Product Security Office at Seagate Technology, where his primary focus is security compliance and managing product certifications. Geoff’s background is in project management, information security, and supply chain security. A member of the OTTF for several years, Geoff was one of the earliest advocates for Seagate to champion the use of the O-TTPS as a product lifecycle standard. Geoff lives in Oklahoma City with his wife and three children.

[1 CPE] Your Office and Workspace Reimagined

  Presented by INTERFACE Advisory Council

Remote working during the pandemic proved to be beneficial for some companies and employees. Even as we are returning to the office, many will want to work remotely on a permanent basis. We are seeing an evolution of the definition of an office. There will certainly still be offices for all organizations where employees perform their work as normal. Now that remote working has shown to be an added value, IT departments need to lead this change in structure.

Join the INTERFACE Advisory Council for a look at what lies ahead. How are you adjusting your security procedures? What have you learned over the last year with employees working remotely? We will discuss how IT departments should be involved in decision-making and execution of policies. Also, this changing model of a traditional office could impact the job pool. Opportunities for IT professionals to find employment from out-of-market companies will only increase.


Panelists:

John Brandt • Director of IT, Santa Fe Opera
Luis Brown • Chief Information Security Officer, Central New Mexico Community College
Bill Halverson • Sr. Technology Advisor, CNM, Ingenuity
Darshana Kanabar • Deputy CIO, NM Taxation and Revenue Dept

[1 CPE] CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).