[1 CPE] How Zero-Trust Enables the Future of “Work from Anywhere” Secure Access

  Presented by Cisco & Duo Security

The perimeter-focused security model of decades past is no longer adequate for securing the modern enterprise. Now, organizations must secure a mobile workforce using a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks — and this trend only accelerated during 2020’s global shift to remote work. Fortunately, a modern access strategy built on zero-trust fundamentals can defend today’s workforce while paving the way to a passwordless future. Attend this session to learn how the zero-trust access model works, reduce your reliance on passwords and risk of password-based attacks, and how to start planning and staging your zero-trust evolution today.

[1 CPE] Unified Endpoint Management

  Presented by Quest Software

This presentation highlights the reasons and need for Unified Endpoint Management in your business strategy. This presentation’s sole purpose is to educate C-level and system administrators of the need for UEM as well as what aspects are important. One of the problems with endpoint management today is the proliferation of endpoints. During this global health crisis especially, we are seeing a large work-from-home movement in businesses all over the world. In order to combat this issue, you must have an endpoint management strategy that works not only on the network but off of it as well.

[1 CPE] CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

[1 CPE] Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, we’ll discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations

[1 CPE] Privacy is Coming and It’s Going to Change Everything!

  Presented by Howard Loos • Chief Information Privacy Officer, Brigham Young University

Security is the most important concern for your data, right? This is true, however, the focus on data privacy has become much more relevant over the last couple of years. Join Howard Loos, for a high-level overview of the current US privacy landscape and how current laws protect specific types of Personally Identifiable Information (PII). Howard will discuss how GDPR and other growing “general” privacy laws will change how information is viewed by the business and managed by IT.

You will get a summary of the nine guiding principles to help comply with the new privacy environment. This presentation will be a good starting point for all IT professionals to get a better handle on the changing Data Privacy landscape.

Howard Loos, CRM, IGP, CIPP/US has more than 25 years of experience in the governance of information, focusing on Data Privacy and Records & Information Management. During most of those years, Howard worked as a consultant, working in the Financial, Manufacturing, Oil & Gas, and Technology industries, as well as Education and Federal Government. His specialties include reducing an organization’s information related risk, strategy & program development, organizational governance, requirements gathering, and vendor selection.

Howard attended the University of North Dakota, where he received his bachelor’s degree, majoring in both Business Administration and Records and Information Management. He later received an MBA from the same university.

Howard is a Certified Records Manager, Information Governance Professional, Certified Information Privacy Professional, and Certified Change Practitioner. He currently works at Brigham Young University as the Chief Information Privacy Officer & Director of Information Management.

[1 CPE] Security vs. Compliance: Turning InfoSec Success into Audit Wins

  Presented by Tripwire

Security and compliance teams both strive to design, establish, and enforce controls to protect an organization. But even with shared goals in place, security and compliance teams often manage business risk in relative isolation. So how can these teams set aside tension and work better together to create a winning alliance?

In this session, we explore the key differences between security and compliance initiatives. It’s crucial to understand that being fully compliant doesn’t necessarily mean an organization is fundamentally secure. We’ll cover how the two initiatives complement each other when it comes to minimizing risk and how both teams can collaborate to create efficiencies. Attendees will learn how to leverage compliance policies to set the foundation to a robust information security program, while providing true visibility and coverage, consolidating toolsets, and reducing costs. Lastly, we’ll discuss how to ensure that a successful security program can help organizations prepare for an upcoming audit to ultimately achieve and maintain continuous compliance.

[1 CPE] Architecting for the Agentless

  Presented by Gigamon

Today’s networks are swarming with IoT, OT, and virtual devices of every size and shape. As they have proliferated, and the security attack surface has likewise increased, the market has responded with a wide variety of technologies to help understand, manage, and secure just what is on your network. This is the rise of the technologies classified as “agentless” and there is a good chance you will be looking, now or in the future, at a project that comprises such technologies. While much of what is fundamentally required to enable these technologies is not new, organizations struggle with trying to implement these on an “ad hoc” basis, with little thought to future considerations or scale.

This presentation will take about a more strategic approach to handling these implementations, what a visibility fabric is, and how today’s organizations can architect their environments for their future needs.

[1 CPE] Your Office and Workspace Reimagined

  Presented by INTERFACE Advisory Council

Remote working during the pandemic has proved to be beneficial for some companies and employees. Even as we forecast a return to the office soon, many will want to work remotely on a permanent basis.

We are seeing an evolution of the definition of an office. There will certainly still be offices for all organizations where employees perform their work as normal. Now that remote working has shown to be an added value, IT departments need to lead this change in structure.

Join the INTERFACE- Advisory Council for a look at what lies ahead. How are you adjusting your security procedures? What have you learned over the last year with employees working remotely? We will discuss how IT departments should be involved in the decision-making and execution of policies. Also, this changing model of a traditional office could have effects on the job pool. Opportunities for IT professionals to find employment from out of market companies will only increase.

Panelists:

  • Ryan Taylor • Vice President, Information Technology, Paramount Acceptance
  • Danny Yeo • Information Technology Director, Brigham Young University
  • Corona Ngatuvai • Chief Technology Architect, State of Utah
  • Nyle Stoddard • Manager, Information Security, RR Donnelley

[1 CPE] 2021 State of Malware

  Presented by Malwarebytes

Over the past year, the tools and tactics of cybercrime and cybersecurity adapted against a backdrop of enormous changes to our lives and businesses.

Join us to learn how cybercrime evolved in 2020 and identify ways to safeguard your organization against what’s out there.

We’ll explore:

  • Top threats for businesses and consumers
  • Emerging cybercrime trends and tactics
  • Solutions you can employ to thwart future attacks

[1 CPE] Incredible Ways to Hack Email & How to Stop the Bad Guys

  Presented by KnowBe4

Email is still a top attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join us as we explore some of the ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. We will also share a special treat – a (pre-recorded) hacking demo by Kevin Mitnick.

You will learn:

  • How silent malware launches, remote password hash capture, and how rogue rules work.
  • Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective.
  • Details behind clickjacking and web beacons.
  • Actionable steps on how to defend against them all.

If all you were worried about were phishing attempts, think again!