[1 CPE] LIVE Hack: Unmasking AI’s Dark Side

  Presented by Wayne Johnson, CEO • Stellar

In this eye-opening presentation, we will delve into the darker applications of artificial intelligence, specifically focusing on its potential to craft malicious code and generate deceptive voice replicas. As AI continues to evolve, its capabilities extend beyond beneficial innovations, posing significant ethical and security challenges. This session aims to shed light on how AI can be manipulated to perform nefarious tasks, such as writing harmful software or impersonating voices with high accuracy. Through live demonstrations and critical discussions, we aim to equip the audience with a comprehensive understanding of these risks and foster a dialogue on developing robust countermeasures and ethical guidelines to prevent misuse of AI technologies. Join us as we explore the shadowy corners of AI applications, understanding their implications and preparing for a secure technological future.

[1 CPE] Securing the Hyperconnected World in the AI Era

  Presented by Grant Asplund, Security Evangelist • Check Point

The AI revolution is fundamentally transforming cybersecurity, while the future of networking evolves toward Hybrid Full Mesh—integrating 5G, WiFi, Ethernet, Fiber, and other network infrastructures. This presentation examines how AI is accelerating cyber threats: attack costs are skyrocketing, incidents surging 50% year-over-year, and ransomware development compressed from nine days to mere minutes*. We’ll explore why Hybrid SASE (not cloud-only) forms the core of an effective hybrid full-mesh security architecture and how organizations can respond when the rate of change and complexity outpace their capabilities. Most importantly, we’ll demonstrate why security isn’t just a feature but the essential foundation of operations in this new era of hyperconnected vulnerability.

*Source: 2025 Check Point Research, CyberInt, Cybercrime Magazine, IBM, SAN

[1 CPE] AI: The New Attack Surface

  Presented by Jeff Crume, Distinguished Engineer, Data and AI Security, IBM • Converge Technology Solutions

Artificial Intelligence introduces novel security challenges, including adversarial attacks and model vulnerabilities. Also, there is the issue of whether you can trust the AI you have. This session will cover six different types of AI attacks to provide a better understanding of the threatscape along with some suggestions for securing the data, the model, the usage and the infrastructure.

[1 CPE] Surfing the Different Waves of AI

  Presented by Tyler Stuart, Sales Engineer, Trellix • Cyberuptive

Riding the ever-breaking wave of AI security model evolution can feel like a gnarly wipeout. This presentation will help your security team hang ten by navigating the diverse swells of Language Learning Models (LLMs), paddling through the currents of Retrieval-Augmented Generation, and catching the perfect set of Agentic AI. Our goal is to provide the knowledge you need to confidently choose and manage the right boards – I mean, tools – for your organization’s security lineup.

[1 CPE] Heart of Agile with Aloha: Driving IT Innovation

  Presented by Bradley K. Foster, PMP, CSM, CPO, CAC, CAL • Worth Agility

Join Bradley K. Foster, founder of Worth Agility, to explore how Alistair Cockburn’s Heart of Agile—Collaborate, Probe, Deliver, Reflect, Improve—blends with Aloha’s compassion to ignite IT innovation. With 5+ years in health and aviation IT, Bradley led Hawaiian Airlines’ EDW (Microsoft-driven, real-time insights), Health Catalyst’s cloud analytics at Queens (30% efficiency gain), and Hawaii DOT’s Google CCAI demo (40% faster calls).

Learn to probe risks early, collaborate across silos, and deliver secure systems under Worth Agility’s human-centered approach, guided by DevSecOps insights from Isaac Sacolick.

Ideal for IT leaders tackling ransomware, AI, and bandwidth challenges with agility and heart.

[1 CPE] Mitigating the Risk of AI in the Corporate Environment

  Presented by Teresa Rule, President, RNT Cyber Academy, Member • ISACA Anchorage

In the corporate environment, mitigating the risks associated with artificial intelligence (AI) is crucial for ensuring operational resilience and strategic growth. AI, while offering unparalleled benefits in risk management through predictive analytics and real-time monitoring, also introduces new challenges such as data breaches, algorithmic bias, and cybersecurity threats. To effectively manage these risks, organizations must adopt a systematic approach. This includes identifying areas of risk, such as financial, operational, and cybersecurity vulnerabilities, and evaluating data quality to support AI implementation. Choosing the right AI technology and training AI algorithms with historical data are also essential steps. Furthermore, integrating AI into existing processes and continuously evaluating its performance are vital for refining risk mitigation strategies. By leveraging frameworks like the NIST AI Risk Management Framework and engaging in proactive threat assessments, businesses can ensure that AI enhances their risk management capabilities while minimizing its inherent risks. Ultimately, a well-managed AI strategy can transform traditional risk assessment, enhance decision-making, and foster a secure and efficient corporate environment.

[1 CPE] AI-Backed Cybersecurity Threats Require AI-Backed Solutions

  Presented by Chris Blanding, Public Sector Security Sales Specialist • Juniper Networks

Context: Supported by AI, cybersecurity threat actors are accelerating both the speed and breadth of attacks. Every indicator, from increasing click rates on phishing emails to shrinking attacker breakout times suggests a sea change in the threat landscape. Consequently, integration and AI/ML-backed automation across a layered cybersecurity stack is more important than ever. Historically, cybersecurity solutions were developed to address specific threats. Consequently, as the number and diversity of threats grew the number and complexity of cybersecurity solutions in the system enterprise also grew, driving complexity, slowing response times, and ultimately reducing efficacy. SIEM, SOAR, and XDR platforms were developed to visualize cybersecurity telemetry across the system enterprise, investigate, and respond to threats. While these solutions greatly improved visibility and response they are unable to respond quickly and efficiently enough to stop AI-backed threats.

Approach: In addition to the broad adoption of layered security services providing visibility across the system enterprise, the solution is to leverage a strategically integrated, AI/ML-backed, enterprise security stack that accelerates detection and automates response.

Implications: While an integrated, AI-backed enterprise security stack will allow enterprises to stay ahead of cyber risk the impact on the system enterprise is far greater. By integrating security into the broad enterprise stack, you will mature network, application, and data visibility creating opportunities for more granular, targeted SLAs that ultimately impact uptime, quality of service, flexibility and speed. That makes businesses more competitive and public entities more responsive to citizens.

[1 CPE] AI in Cybersecurity: Navigating the New Frontier of Cyber Defense

  Presented by Devin Johnstone, Security Operations Consultant • Palo Alto Networks

In an era where cyber threats are becoming increasingly sophisticated, traditional security measures are often insufficient. Devin Johnstone, Security Operations Domain Consultant at Palo Alto Networks with vast experience in network security, threat intelligence, and cloud security will delve into the transformative role of Artificial Intelligence (AI) in modern cybersecurity. Attendees will gain insights into how AI enhances threat detection, enables proactive defense strategies, and addresses the evolving landscape of cyber threats. The discussion will also cover the benefits and challenges associated with integrating AI into cybersecurity frameworks, providing a comprehensive overview of how AI is shaping the future of cyber defense.

Devin has spent over a decade in the trenches of a Security Operations Center and is passionate about sharing his lived experience in building a successful SecOps team from the ground up. 8 years ago, he joined Palo Alto Networks to begin architecting the internal SOC and went on to lead the development of the Security Automation, Data Loss Prevention, Insider Risk, and Customer Outreach programs.

Devin has had the opportunity to advise thousands of security teams, big and small, in their security operations journeys through media, tours of Palo Alto Networks SOC facility, and at events in 7 countries. He has since moved into a Consultant role to help customers accelerate their realization of “the art of the possible”: AI-enabled security operations strategies prepared for whatever the future brings.

[1 CPE] AI for IT Project Management: Tools, Techniques, and Use Cases

  Presented by Jim Bates, Founder, President & CEO  • Business Improvement Group

Discover how Artificial Intelligence (AI) is being used to transform IT Project Management approaches and how it can impact our IT project effectiveness and efficiency. We will explore trends and separate the hype from reality. We will discuss tools and techniques and demonstrate how we use AI to save time and more accurately predict and control our project outcomes, manage risk, and support transparent and defensible project governance.

[1 CPE] How to Make AI a Reality in Your Organization

  Presented by Colton Rockwell, Lead Generation Marketing Manager • ImageSource

AI adoption is accelerating, yet many organizations struggle to transition AI projects from proof-of-concept to production. The AI Empowerment Blueprint is a structured framework that helps businesses overcome common AI adoption barriers, align AI initiatives with business goals, and implement a governance strategy that ensures ethical and effective AI deployment.

This session will guide attendees through a six-step methodology for AI success, covering key phases such as AI exploration, business value alignment, governance frameworks, and implementation best practices. Learn how to identify AI opportunities, mitigate risks, and build a scalable AI strategy that delivers real business value.

Whether you’re an executive, technologist, or entrepreneur, this presentation will equip you with actionable insights and a proven roadmap to maximize AI’s impact within your organization.