[1 CPE] Work-Life Effectiveness: The Impacts on Employees & Employers

  Presented by Alaska Communications

In this presentation, you will learn the basics of work-life effectiveness and understand how it impacts the company’s bottom line. There are seven key elements of work-life effectiveness. We will explore these elements, which include ideas on how to bring them to your organization. We will also address work-life and wellness issues caused by the COVID-19 pandemic.

[1 CPE] Stay Ahead: Prep and Protect Your Enterprise for a Post-Pandemic World

  Presented by Check Point Software

Organizations worldwide transformed their ways of working with the onset of the COVID-19 pandemic. Now, we’re all forced to face new uncertainties as we transition to a post-pandemic world. Meanwhile, threat actors and cybercriminals are evolving their tactics to take advantage of these hazy times and the pandemic’s disruption as seen by recent surges in attacks across all industry sectors. This new phase of the modern workforce threatens more disruptive change and unpredictability. Join us to better understand what organizations such as yours should be focusing on to avoid being the next victim and stay a step ahead of the world’s leading cybercriminals.

[1 CPE] Remote Working – Here to Stay?

  Presented by INTERFACE Advisory Council

Remote working during the pandemic has proved to be beneficial for some companies and employees. Even as we forecast a return to the office soon, many will want to work remotely on a permanent basis.

Join the INTERFACE- Advisory Council for a look at what lies ahead with remote working. How are you adjusting your security procedures? Do you know if your end-users will return to the office? Also, we will address long term items when it comes to in person working for different industries. How much of a shift in business will we see? We will discuss how IT departments be involved in decision making and execution of policies.


Panelists:

Ulf Asplund • Manager of Technical Services, Alaska Court System
Paul Hinsberg • Sr Enterprise Architect, Alaska USA Federal Credit Union
Mark Merchant • Chief Information Security Officer, Municipality of Anchorage

[1 CPE] Cybersecurity & the Resilient Organization

  Presented by Verizon

Aside from cyber-crime, business leaders have plenty to worry about, from transforming how they serve customers during a pandemic to evaluating the impact that new technologies will have on their industry and the competitive landscape. Verizon’s research shows that because they face so many daily challenges, some business leaders de-prioritize cybersecurity and simply hope for the best. But cybersecurity doesn’t have to be an overwhelmingly complex, time-consuming, or expensive task: implementing some basic “cyber-hygiene” into your organization and knowing about the most relevant threats can reduce the risk of a cyberattack. Verizon Security Evangelist David Grady will draw on data from Verizon’s world-class research – including the annual Data Breach Investigations Report – and share some tips on how to get started.

[1 CPE] The Case for Automation: Why Every Business Needs It

  Presented by Aruba, a HPE Company

As networks evolved from delivering basic connectivity (wired and wireless) to more sophisticated needs, enterprise security has moved from a strong, wall methodology to untrusted connections for every user. Join us to learn how network automation can reduce the burden on IT staff to keep up with the latest networking requirements while safely connecting workers, customers, and citizens to critical services.

[1 CPE] 2021 State of Malware

  Presented by Malwarebytes

Over the past year, the tools and tactics of cybercrime and cybersecurity adapted against a backdrop of enormous changes to our lives and businesses.

Join us to learn how cybercrime evolved in 2020 and identify ways to safeguard your organization against what’s out there.

We’ll explore:

  • Top threats for businesses and consumers
  • Emerging cybercrime trends and tactics
  • Solutions you can employ to thwart future attacks

Fostering Inclusion in a Remote Work Environment

  Presented by PDX WIT

Underrepresented groups are disproportionately affected by this pandemic and its economic fallout. The requirement to work from home brings its own set of challenges. Employees depend on their immediate managers for support in these unique circumstances, but everyone can play a role. This presentation will explore how everyone on the team (particularly those in leadership roles) can continue to foster an inclusive work environment for their distributed teams.

Presenter:
Molly Lebowitz • Management Consultant at Propeller and PDX Women in Tech Representative

Real-Time Defender Velocity: Code on Code Warfare

  Presented by SentinelOne

Organizations spend more money on cyber security tools every year, yet the number of breaches and the cost of these breaches continues to increase. A new approach is needed that relies on autonomous analysis that can respond at machine speed. By embracing automation, AI, and big data analytics, organizations can better prevent threats, find, and detect what is missed, provide contextual linking for forensic and threat hunting ¬– and even more importantly – self-heal and fully recover when necessary.

Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, we’ll discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations

The Anatomy of the SolarWinds Attack

  Presented by CyberArk

In early December 2020, a supply chain attack was discovered which “trojanized” SolarWinds Orion business software updates in order to distribute malware. The campaign successfully infected 18,000 organizations – including several government agencies and high-value companies around the world.

Attacks of this magnitude and sophistication have a vast and rippling impact. Whether you have been directly affected or not – we are witnessing a new level of attack sophistication that demands a closer understanding.

In this session we’ll cover:

  • The rise of the digital supply chain attack
  • An attacker’s perspective on Orion
  • An end-to-end review of the attack flow
  • How the attackers managed to trojanize SolarWinds code
  • What the attackers did during months of seeming inactivity
  • A review of the Golden SAML technique
  • The big picture – what ‘Solorigate’ means for attackers and defenders