[1 CPE] Disaster Preparedness and Data Protection Strategies for Business Continuous Availability

  Presented by Stacey Budd, Data Resilience Expert and Sales Engineer Team Leader • Arcserve

As natural disasters like hurricanes, wildfires, and severe winter events become more frequent and intense, businesses face increasing economic and operational challenges. High-profile disasters, including the Camp Fire in 2018, which incurred a staggering $16.5 billion in damages, and Hurricane Maria’s profound impact on Puerto Rico, estimated at $139 billion for full recovery, underscore the escalating financial stakes.

This presentation will explore effective strategies to bolster business resilience in the face of natural catastrophes.

Key elements of the session will include:

  • Critical insights from Arcserve’s annual global research study on disaster preparedness.
  • A comprehensive Disaster Preparedness Checklist tailored for companies.
  • Practical tools designed to safeguard business operations and data resilience.

We will delve into the details of a 5-step disaster and ransomware recovery plan template, as well as the 3-2-1-1 backup strategy, which ensures robust data recovery through multiple backup copies stored both locally and offsite. By implementing these strategies, businesses can minimize financial losses, reduce operational downtime, and achieve a rapid recovery, thereby ensuring continuity even during catastrophic events. This session aims to arm business leaders with the essential tools and knowledge to safeguard their enterprises amidst an increasingly unpredictable global landscape.

[1 CPE] How to Build a High Confidence Cyber Recovery Plan

  Presented by Bharath Nagaraj, Sr Technical Field Director  • Cohesity

In an era where data is both a prime asset and a target, the global cybercrime cost is expected to soar to $10.5 trillion USD by 2025, with ransomware attacks becoming more frequent. Despite this, 80% of organizations doubt their cyber resilience strategies. The importance of being prepared for “black swan” cyber events, which exploit new vulnerabilities and can cause overwhelming damage, is highlighted. Cohesity emphasizes the role of Generative AI in bolstering a company’s security by automating threat detection, ensuring compliance, and promoting collaboration across departments. This approach not only mitigates risks but also aligns with strategic IT resilience planning. In an upcoming discussion led by Cohesity’s Senior Technical Field Director, Bharath Nagaraj, insights into overcoming large organizational challenges, effective response strategies, stakeholder roles, and steps for integrating cyber resilience into IT strategies will be explored, aiming to instill confidence in recovery without succumbing to ransoms.

[1 CPE] Securing the Future: Cyber Insurance and Cybersecurity Strategies for 2024

  Presented by Andrew Livingston, Cyber Security Specialist • Sentinel Technologies

In the dynamic and interconnected digital era of 2024, the landscape of cyber threats continuously evolves, posing unprecedented challenges to businesses worldwide. “Securing the Future: Cyber Insurance and Cybersecurity Strategies for 2024” delves into the intricacies of cyber insurance as a pivotal component of modern business risk management. This presentation offers a thorough exploration of the latest trends in cyber threats that businesses face, such as sophisticated AI-driven attacks, the proliferation of ransomware, and the vulnerabilities introduced by emerging technologies. It highlights the critical challenges that could lead to the denial of cyber insurance claims and potential loss of coverage, emphasizing the importance of compliance, accurate representation of cybersecurity measures, and prompt incident reporting.

Furthermore, the presentation shifts focus towards proactive strategies for enhancing an organization’s cybersecurity posture. It outlines actionable tips for businesses to not only fortify their defenses against cyber threats but also to positively influence their cyber insurance rates. Through a blend of expert insights and practical guidance, the audience will learn about the significance of regular risk assessments, the adoption of multi-factor authentication, encryption, endpoint security, and the development of robust incident response plans. We’ll discuss:

  • Insights into the evolving cyber threat landscape in 2024.
  • Common pitfalls leading to cyber insurance claim denials.
  • Strategies for enhancing cybersecurity measures to favorably impact insurance rates.
  • The future outlook of cyber insurance and the role of emerging technologies.

By the conclusion of this presentation, attendees will be equipped with the knowledge to navigate the complexities of cyber insurance and implement comprehensive cybersecurity strategies. This will not only prepare them to mitigate the risks of cyber threats but also optimize their insurance coverage in the face of an ever-changing digital threat landscape.

[1 CPE] Beyond the Backup: A Look into Resiliency Program Development

  Presented by Jason Tupeck, BCDR Consultant • CompuNet

The presentation “Beyond the Backup: A Look into Resiliency Program Development” delves into the intricacies of building a robust resiliency program beyond traditional backup strategies. It explores the spectrum of disruptive events, from large-scale disasters to smaller, potentially more frequent disruptions, and emphasizes the importance of a comprehensive framework for efficient response and recovery. The talk will cover key areas surrounding the “Four Ps”, offering insights into developing a mature resiliency program, emphasizing the importance of prioritization, planning, preparation, and practice as critical steps to enhancing an organization’s ability to navigate through and recover from various disruptions.

[1 CPE] Modernizing Your DR Strategies Against Ransomware

  Presented by Eddie Huang, Sr Systems Engineer • Quest Software

Scenarios of data loss, including ransomware attacks, can be crippling with the inability to access data, interruption of business operations, and in some cases, significant cost penalties. Creating a Disaster Recovery plan becomes critical to be prepared for unforeseen risks.

But where do you begin? Join us to better understand the importance of starting from the beginning and ensuring all stakeholders are involved and armed with a solid understanding of Data Protection before problems such as malicious attacks and general system failures impact an organization.

We’ll focus on:

  • Best practices to adhere to when creating a DR plan with “recovery” as the focus.
  • The importance of viewing Data Protection from this perspective is to better understand what it means to “protect the backup.”

[1 CPE] The SMB’s Playbook for Cybersecurity in 2024

  Presented by BlackPoint IT Services

The SMB’s Playbook for Cybersecurity in 2024 speaking session offers a concise yet comprehensive overview of the cybersecurity landscape tailored for small and medium-sized businesses. This presentation traverses the evolution of digital threats, providing insights into past trends and current challenges while forecasting future risks. It emphasizes practical strategies for proactive defense and effective incident response. Attendees will learn about the latest advancements in cybersecurity, gain knowledge on managing cyber incidents, and understand the importance of building a cybersecurity-aware culture. This session is vital for SMBs seeking to enhance their digital resilience against the backdrop of an ever-evolving cyber threat environment.

Speakers:

Andrew Hutchison, Director of Service Delivery at BlackPoint IT Services

Sean Banahan, Director of US Channel Sales at WatchGuard

[1 CPE] How to Prepare and Respond to Data-Oriented Cyberattacks in Realtime

  Presented by Jonathan Halstuch, Co-Founder and CTO • RackTop Systems with SD3IT

Today’s cyber threats call for a new approach to data security, placing protections closer to the data. In this session, you’ll develop an understanding of why advanced cyber storage solutions are critical for defending production data from theft and destructive cyberattacks like ransomware. Learn strategies for reducing your organization’s threat window with a data-centric zero-trust architecture and artificial intelligence. Improve security and cyber hygiene while embracing the CISA Zero Trust Maturity Model to ensure your organization’s data is defended during each of the three phases of an attack.

Key takeaways:

  • Stay ahead of insider threats, data theft, ransomware, and extortionware with active defense
  • Improve security and cyber hygiene by aligning with the CISA Zero Trust Maturity Model
  • How to involve stakeholders in a data-centric approach to security

[1 CPE] Adding VX to Your LAN: A Primer on Overlay Networks

  Presented by CompuNet

As network infrastructure evolves, overlay networks are gaining popularity due to their ability to enhance network availability, security, and flexibility. Our presentation will offer a comprehensive overview of overlay network protocols and architectures, along with their role in enterprise networks. Join us to discover how overlay networks can benefit your organization and learn more about their implementation and management.

[1 CPE] Cybersecurity Trends for 2023

  Presented by Jeff Simpson, Sr Sales Executive, Cybersecurity Solutions • AT&T Alaska

With Cybersecurity compliance mandates increasing, and attacks on vulnerable supply chains and endpoints on the rise, it has never been more important to assess and take proactive measures to secure your network. This presentation pulls together information from many different analysts and digests their views on which Cybersecurity priorities your organization may face this year, along with the top eight cybersecurity trends for 2023, such as Supply Chain Resilience, Security Architecture Modernization and Data-Centric Transformation.

[1 CPE] Dark Web Monitoring: It’s time for an Offensive Strategy!

  Presented by Jeff Simpson, Sr Sales Executive, Cybersecurity Solutions • AT&T Alaska

Many organizations discover a cybersecurity breach many months later, too late for any substantial mitigation. With the average cost of breaches in the US at $9.4M, (without including ransom paid), it is advisable for organizations to take a more offensive stance. What if there was a way to detect compromised corporate credentials well before they were used to cause widespread fraud? Dark Web Monitoring goes where cybercriminals traffic stolen emails, usernames, and passwords, and can alert an organization if personal or corporate user information shows up in the Darknet layers. Learn how using a tool like this can help protect an organization’s employees, consumers, and vendors, as well as its reputation.