[1 CPE] Automating the Analyst

  Presented by Darktrace

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks are rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms. Join Darktrace as we discuss the Cyber AI Analyst in action.

[1 CPE] Real-Time Defender Velocity: Code on Code Warfare

  Presented by SentinelOne

Organizations spend more money on cyber security tools every year, yet the number of breaches and the cost of these breaches continues to increase. A new approach is needed that relies on autonomous analysis that can respond at machine speed. By embracing automation, AI, and big data analytics, organizations can better prevent threats, find, and detect what is missed, provide contextual linking for forensic and threat hunting ¬– and even more importantly – self-heal and fully recover when necessary.

[1 CPE] CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

[1 CPE] Understanding the Cybersecurity Maturity Model Certification

  Presented by AT&T

This presentation will cover key details of the recently released Cybersecurity Maturity Model Certification (CMMC). This includes details on the CMMC’s creation and enforcement, along with the key requirements of the certification process itself. The presentation will also include definitions to help attendees identify the different types of data covered by the CMMC and how they relate to the maturity levels. Additionally, Zach Curley, Senior GRC Consultant, will provide guidance on how to prepare for pre-assessments and audits. The end of the session will include time for Q&A so attendees can ask questions related to the presentation or related topics.

[1 CPE] Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, we’ll discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations

[1 CPE] The Platform Approach and the Future of Cybersecurity

  Presented by Palo Alto Networks

The cyber threat landscape continues to present challenges to security practitioners. Each passing week brings a new notification of a game-changer event that puts infosec teams on the ropes. The job of infosec teams has grown in its complexity and the need to approach security differently is at the top of mind for leaders in our space. Hear from MK Palmore, Palo Alto Networks’ Field CSO (Americas) and retired FBI Executive, on the growing demand for security that can scale to meet the challenges of the future.

[1 CPE] Digital Transformation: What’s Next in a Post COVID World?

  Presented by Structured & Aruba

While the pandemic shuttered many businesses and wreaked havoc with supply chains, it also massively accelerated investment in digital operations in the cloud and at the intelligent edge. Many decisions were made in haste, arising from the need to just “keep the lights on.” The next iteration of our global pandemic response is to revisit these decisions; correct oversights in security, enterprise connectivity, and endpoint access; and chart a sound course forward. Join us and learn how to confidently navigate what comes next regarding your organization’s ability to deliver secure and satisfying user experiences in all critical capabilities across the enterprise.

[1 CPE] Cybersecurity Maturity Model Certification: How to Continue Working with DoD

  Presented by Structured

Companies working on government contracts in the Defense Information Base are required to protect sensitive information, including Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). These requirements are changing to a more stringent framework, as the self-reporting model with NIST SP 800-171 is being replaced with the Cybersecurity Maturity Model Certification (CMMC). CMMC will require a third-party auditor to provide the certification audit in a formalized and regimented process. Join this presentation to learn more about upcoming requirements from DFARS and the transition to these additional control standards. The presenter will be Rob Wayt, Director of Governance and Compliance from Structured Communication Systems, who is listed on the CMMC Accreditation Body marketplace as a Registered Practitioner.

[1 CPE] Look Before You Leap: How to Survive and Thrive During Your Cloud Migration

  Presented by Computer Task Group

The pandemic has accelerated digital transformation priorities and cloud computing has become a major focus for most IT organizations today. Yet only 37% of mid-market organizations have migrated to the cloud and a mere 17% of their workloads are actually in the cloud.*

With all of the benefits cloud computing offers—modernization, security, efficiency, and cost savings—what’s holding so many organizations back from making the transition?

During this session, Phaedra Divras, CTG’s Director of Infrastructure, Support, and Operations Solutions for North America, and Rick Cruz, CTG’s Director of Application and Information Solutions for North America, will draw on their collective 60 years of industry experience to share lessons learned and practical strategies for successfully migrating to the cloud. You can expect to learn:

  • The big picture behind industry and market dynamics driving the push for cloud computing
  • Typical migration journeys and the advantages and disadvantages of each approach
  • Pitfalls and key considerations for achieving an optimal migration
  • When to be strategic vs. tactical during cloud migration planning

This presentation applies to all IT professionals, whether your organization has already implemented cloud computing or is looking to make the leap.

*Source: https://techaisle.com/blog/390-ww-midmarket-hybrid-cloud-penetration-has-reached-37-percent-and-17-percent-workload

[1 CPE] You Are No Longer Forgotten: The Small Business Security Challenge

  Presented by Chris Roberts • Chief Security Strategist, Cynet

Most of the security industry is chasing “around” 31,000 larger enterprise sized companies for their business. The list is well known, circulated and targets are on the backs of ALL the C-Suite, most of the technical folks and the MSP/VARS that support them. The Security industry circles them like packs of hyena or vultures waiting for one of them to fall, get breached, or for a vendor to be thrown out… pouncing on the fresh kill with glee…

Meanwhile, you’re sitting there getting slaughtered by every adversary known to mankind because you ARE the forgotten, you’re too small for the multi-billion $$ cyber companies whom IF they decide to deal with you will flood you with MSA’s, SOW’s and NDA’s that would take a week’s worth of lawyer time JUST to understand, let alone realize that they’re not accountable for anything, unlikely to want to support you and in all honestly you’ll get a 1-800-YOU-AREN’T-SPECIAL number as your sole source of support.

We’re going to address the current situation, the state of play, and give you some thoughts, suggestions, ideas AND plans. We’ll provide resources on HOW to evaluate, where to look, what to do AND importantly we’ll do it because it’s what we’re doing. We live, breath and deal with this daily. We’ve sat in the meetings when the large cybersecurity companies state, “we’re done dealing with the SMB market” and we’ve got the battle scars from dealing with those subsequent consequences.

Chris is currently serving as a vCISO or advisor for a number of entities and organizations around the globe. His most recent projects are focused within the deception, identity, cryptography, Artificial Intelligence, and services space. Over the years, he’s founded or worked with a number of folks specializing in OSINT/SIGING/HUMINT research, intelligence gathering, cryptography, and deception technologies. These days he’s working on spreading the risk, maturity, collaboration and communication word across the industry. (Likely while coding his EEG driven digital clone that’s monitoring his tea and biscuit consumption!)

Since the late 90’s Chris has been deeply involved with security R&D, consulting, and advisory services in his quest to protect and defend businesses and individuals against various types of attack. Prior to that he jumped out of planes for a living, visiting all sorts of interesting countries and cultures while doing his best to avoid getting shot at too often. (Before that, he managed to get various computers confiscated by a number of European entities.)

He’s considered one of the world’s foremost experts on counter threat intelligence and vulnerability research within the Information Security industry. He’s also getting a name for himself in the transportation arena, basically anything with wings, wheels, tracks, tyres, fins, props or paddles has been the target for research for the last 10-15 years…to interesting effect.

As one of the well-known hackers and researchers, Chris is routinely invited to speak at industry conferences. CNN, The Washington Post, WIRED, Business Insider, USA Today, Forbes, Newsweek, BBC News, Wall Street Journal, and numerous others have covered him in the media.

And worst case, to jog the memory, Chris was the researcher who gained global attention in 2015 for demonstrating the linkage between various aviation systems, both on the ground and while in the air that allowed the exploitation of attacks against flight control system.