[1 CPE] Zero Trust: From Theory to Reality in Five Steps

  Presented by Guardicore

Let’s be real. True to its name, there is zero trust about the term “zero trust.” It’s been used as marketecture since its inception. Cut through the fog with this presentation with practical insight and steps to take to ensure your organization makes the most out of ZTA.

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

[1 CPE] Do I Need Software Defined WAN (SD-WAN) for My Organization?

  Presented by VPLS

SD-WAN technology is one of the fastest-growing segments in the networking space, providing options for organizations to securely and reliably connect remote locations.

However, not all SD-WAN solutions provide the same features and capabilities. So, how do you select the best SD-WAN solution for your team and organization? Join this presentation as we help you answer this question and learn about:

  • Common issues with traditional WAN architecture
  • How SD-WAN helps to overcome these issues
  • When and where to deploy SD-WAN

[1 CPE] Leveraging Assessment Findings to Harden Your Security Perimeter

  Presented by Fortinet

Are you regularly evaluating your network security?

Performing assessments is a tried-and-true method for improving your security posture, but they can be a daunting task for network security staff who are often short on manpower, expertise, and/or time. Regardless, the benefits of running assessments almost always outweigh any potential drawbacks. Having a security assessment in hand will increase your security situational awareness and significantly impact your organization’s risk preparedness and mitigation.

Join us as we discuss the importance of periodically validating your existing security controls and provide learnings and best practices from our experts.

[1 CPE] Power-Boost Ransomware Incident Response with Ransomware Kill Switch

  Presented by Airgap

Despite significant investments in security each year, cybercriminals are constantly developing new attack vectors to thwart existing security controls. The growth of connected devices, IoT, and an increasingly remote workforce has widened the enterprise attack surface, enabling cybercriminals to find new ways to breach enterprise perimeter defenses.

A new paradigm shift needs to occur in security to deal with the eventual breach and lateral movement of cyber-attacks. Implementing an enterprise zero-trust security model can help to block the lateral movement of cyber attackers and isolate attacks to where they originate, helping to dramatically reduce the enterprise-wide impact of a cyber-attack. Enterprises need to migrate to a Zero-Trust architecture, helping to gain back control and limit the damage done by cyber-attacks that occur each year. In this session, Ritesh Agrawal, CEO and Co-founder of Airgap Networks, will lead a detailed discussion on how to:

  • Maintain a continuous accurate inventory of enterprise assets.
  • Obtain true visibility and insight on how all devices communicate.
  • Generate zero false-positive alerts based on anomalous behavior.
  • Deploy scalable nano-segmentation of devices to stop lateral movement inside your network via devices (Ransomware Kill-Switch).
  • Implement Single-Sign-On and Multi-Factor Authentication(MFA) for legacy/private applications.
  • Achieve modern IAM/IDM authentication with Zero-Trust Isolation.

Through this discussion, Ritesh will build on these topics and emphasize how zero-trust principles can empower enterprises and achieve better control and response to emerging cyber-threats. Zero-Trust is not hype. Join us to find out more!

[1 CPE] Securing the Hybrid Cloud: Visibility Best Practices

  Presented by Gigamon

With the move to cloud and the multitude of approaches, your ability to effectively monitor and secure workloads gets even more difficult. IT complexity, the rate of change, lack of skills, and organizational silos have made confidently managing security and performance nearly impossible. Visibility is critical. Join us for a discussion of the security considerations for on-prem private, public, and hybrid clouds. You’ll learn best practices and see how a little planning and design can go a long way. Achieve a secure and viable hybrid cloud implementation and get a high return on your investment.

[1 CPE] Developing a Vision and Strategy for Security Centric IAM Programs

  Presented by Business Partner Solutions

Learn how to defend new age data breaches through Identity Centric Security. 80% of cyber incidents stem from stolen credentials & privileged accounts. By including Identity Centric Security (ICS), organizations can proactively manage their threat landscape, ensuring better threat intelligence and breach defenses.

Topics discussed will inlcude:

  • What is ICS?
  • How does ICS enable risk-based decision-making?
  • How does ICS strengthen breach defense?
  • Approach to embracing ICS

[1 CPE] Aligning Projects to Organizational Strategic Objectives

  Presented by INTERFACE Advisory Council

As investments in projects decrease in organizations, it is important to ensure that authorized and funded projects are aligned with the strategic objectives of the organization. This became a challenge in the last year as many of those objectives were forced to be modified – and many projects felt the impact of the change.

In this session, Greta Blash, a PMI-certified instructor, will explain how to align a project with an organization’s strategic objectives and the impact of overall changes to the organization.

Greta has extensive experience as an executive and consulting IT professional, both domestically and internationally. Her areas of experience include: program management, project management, agile development, and business analysis; with emphasis in the areas of customer relationship management, business intelligence, continuous improvement, system implementations, and conversions. Greta is a PMI-certified instructor and a certified project manager (PgMP, PMP, PMI-PBA, PMI-PBA, and CDAP) whose extensive experiences enable her to manage multiple high-risk, high-tech projects.