[1 CPE] Do You Feel the Need… the Need for Speed? Top Five SQL Server Query Tuning Tips

  Presented by Quest Software

Query tuning is key to peak performance in SQL Server databases. However, lots of developers and DBAs constantly struggle to pinpoint the root cause of performance issues and spend way too much time trying to fix them. In this presentation, Quest will share their tried-and-true best practices for tuning SQL statements and other issues by utilizing Wait Time Analysis, reviewing execution plans, and using SQL diagramming techniques. In addition, we’ll present several case studies to demonstrate these best practices.

Regardless of the complexity of your database or your skill level, this systematic approach will lead you down the correct tuning path with no guessing, saving countless hours of tuning queries and optimizing the performance of your SQL Server databases.

[1 CPE] How Zero-Trust Enables the Future of “Work from Anywhere” Secure Access

  Presented by Cisco & Duo Security

The perimeter-focused security model of decades past is no longer adequate for securing the modern enterprise. Now, organizations must secure a mobile workforce using a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks — and this trend only accelerated during 2020’s global shift to remote work. Fortunately, a modern access strategy built on zero-trust fundamentals can defend today’s workforce while paving the way to a passwordless future. Attend this session to learn how the zero-trust access model works, reduce your reliance on passwords and risk of password-based attacks, and how to start planning and staging your zero-trust evolution today.

[1 CPE] Do We Need Our Own SOC?

  Presented by VPLS

Within a company, a SOC (Security Operations Center) is the focal point of the company’s security operations and network defense, commonly responsible for real-time monitoring, incident response, and proactive prevention of incidences. Many organizations may feel they are already doing these activities without a SOC. But SOCs vary in maturity levels and capabilities—so does your company really need one?

In this presentation, John Headley, Senior Security Engineer at VPLS, reviews the many components of a SOC to ultimately help you answer the question: “do we need our own SOC?” Join this presentation to learn:

  • The importance of cybersecurity operations within an organization, including how a typical cybersecurity operations team is organized into a SOC
  • What capabilities a SOC can provide to an organization
  • What tools the SOC uses
  • How to quantitatively self-assess if your organization should build a SOC or outsource this responsibility to a managed security services provider

[1 CPE] How Salt Lake County Gained Visibility and Control of Distributed Endpoints

  Presented by Tanium

When the COVID-19 pandemic forced much of the world to stay at home overnight, state, and local government leaders swiftly pivoted their workforces remote so they could continue to deliver critical citizen services. But this rapid shift opened new cybersecurity vulnerabilities. Suddenly, attack surfaces expanded, and endpoints became widely distributed, leading to an increase in cyber threats.

Learn how Salt Lake County’s Information Technology Division:

  • Patched in a new distributed workforce
  • Managed their remote endpoints with increased critical vulnerabilities
  • Tracked their IT assets and continue to mature their Endpoint Management

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

[1 CPE] Modern Applications and Creative Attackers: Application Security in Flux

  Presented by Imperva

The rise of ransom DDoS attacks is just one indication that application security attacks are more complex and targeted than ever. Attacks are now targeting business logic via APIs and microservices, leveraging malicious bots to steal your customers’ accounts. Application security that only protects against the OWASP top 10 attacks delivers insufficient protection in today’s threat landscape. Join our CTO, Kunal Anand, as he explores these challenges and offers insight into what you can be doing today to help protect your tomorrow.

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

[1 CPE] Situational Awareness Into the Dark Web

  Presented by Check Point Software

In our journey through this session, we take you through the evolution, goals, and motivation of the Dark Web. We will share with you what and whom you can find on the platforms as well as the major conflicts individuals face while exploring this web. The session also exposes you to the syndicates and structures running on the platforms. Surprisingly, we see how those groups were among the first to embrace and implement Blockchain technology and created a major global demand for crypto currencies. This is the time to listen, learn, and be exposed to the deepest secrets of the Dark Web.

[1 CPE] The Case for Automation: Why Every Business Needs It

  Presented by Aruba, a HPE Company

As networks evolved from delivering basic connectivity (wired and wireless) to more sophisticated needs, enterprise security has moved from a strong, wall methodology to untrusted connections for every user. Join us to learn how network automation can reduce the burden on IT staff to keep up with the latest networking requirements while safely connecting workers, customers, and citizens to critical services.

[1 CPE] The Top 10 List: Ransomware Preparation

  Presented by Tonaquint Data Center

Carl Wilkins, Director of Cloud Operations for Tonaquint Data Centers provides a Top 10 list of things you can do to mitigate the risk of Ransomware affecting you. Topics will include how to protect your data, how to protect your systems and infrastructure, and situations to be aware of that might indicate the presence of Ransomware in your environment.