[1 CPE] From Liability to Asset: Securing Unstructured Data at Scale in the Era of AI

  Presented by Rubrik

Unstructured data is the lifeblood of the modern organization, yet its sheer volume often outpaces the strategies meant to protect it. As this data becomes the fuel for future AI initiatives and business intelligence, the “old way” of managing NAS has become a primary point of failure.

In this session, we’ll dive into how Rubrik NAS Cloud Direct (NCD) redefines the protection of PB-scale file systems. We will explore a modern architectural approach that provides the speed, visibility, and cloud-native flexibility required to turn massive data sets into resilient assets. Whether you are preparing for an AI-driven future or simply struggling with the growth of your current footprint, this session will provide a blueprint for total unstructured data control.

[1 CPE] Data Resilience in the Age of Attack: Protect What Matters

  Presented by Landra Pierce, Product Strategy Technologist • Veeam

Cyberattacks are no longer a distant threat; they are a reality every IT team must be prepared for. When an attack occurs, your data becomes both the primary target and the key to recovery. Many organizations still rely on backup strategies that are designed for hardware failures or accidental deletions, rather than today’s threats, like ransomware, insider risk, and automated attacks. This disconnect creates vulnerabilities, especially when backups become an overlooked entry point in your security strategy. In this session, we will address these challenges to help you better protect your organization.

This session is ideal for IT professionals who want greater confidence in safeguarding their data and peace of mind. We will examine the most common oversights that leave organizations, including those in government, education, healthcare, and other sectors, exposed to cyberthreats. You’ll discover how teams are advancing beyond basic backup to adopt a cyber-ready approach, including topics like immutability, threat awareness, rapid recovery, and intelligent automation.

Our focus will be practical and grounded in real-world scenarios, and what truly works when pressure is high and time is limited. Because when every minute counts and trust is at stake, data resilience means more than surviving an attack. It’s about protecting what matters most and emerging even stronger.

[1 CPE] How to Make AI a Reality in Your Organization

  Presented by Marni Carmichael, Vice President, Marketing • ImageSource

AI adoption is accelerating, yet many organizations struggle to transition AI projects from proof-of-concept to production. The AI Empowerment Blueprint is a structured framework that helps businesses overcome common AI adoption barriers, align AI initiatives with business goals, and implement a governance strategy that ensures ethical and effective AI deployment.

This session will guide attendees through a six-step methodology for AI success, covering key phases such as AI exploration, business value alignment, governance frameworks, and implementation best practices. Learn how to identify AI opportunities, mitigate risks, and build a scalable AI strategy that delivers real business value.

Whether you’re an executive, technologist, or entrepreneur, this presentation will equip you with actionable insights and a proven roadmap to maximize AI’s impact within your organization.

[1 CPE] Realizing AI Value Through Data Quality: Solving Hidden Barriers to Business-Ready AI

  Presented by Mark Brandow, Technical Expert, Digital Core • Hitachi Vantara

Mark Brandow is a Global Solutions Specialist at Hitachi Vantara, where he helps organizations modernize their digital core and unlock new value through data-driven innovation. With over 27 years in the IT industry—including 14 years as a telecommunications architect and operations manager—Mark brings a unique perspective as both a past customer and trusted advisor. For the past decade at Hitachi Vantara, he has focused on enabling businesses to align technology with strategic objectives through a consultative, insight-driven approach. Today, Mark is helping customers explore the transformative potential of Hitachi IQ, Hitachi Vantara’s AI solution, by driving adoption strategies that foster trust, accelerate decision-making, and deliver measurable outcomes.

[1 CPE] SEDI: The Search for Intelligent Identity

  Presented by George McEwan • Privacy Architect, Dept of Government Operations, State of Utah

This presentation will cover the groundbreaking legislation enacted by Utah, which sets down the acceptable standards for digital identity with privacy and individual control by default. In this session, you’ll learn about the principles enshrined in law. Additionally, you’ll get exposure to the envisioned technology stack that will make it possible for individuals to maintain control over their data and how it is disclosed.

George McEwan is a multi-disciplined engineer and inventor credited with several US patents. As a husband, father, soldier, pilot, international traveler, and published author, he has more than a few ideas on how to unlock the value of digital government.

George is currently serving as the Privacy Architect for the State of Utah in the Department of Government Operations. Prior to taking on the challenges of his current role, George was the Chief Strategy Officer for the Division of Technology Services. He is uniquely qualified to advocate on behalf of the digital citizen as he served as the IT Director for the Department of Health during the pandemic, where he witnessed firsthand how the digital divide fractured communities.

Combining his talents as a technologist and award-winning storyteller, George promotes improved government transparency in data collection and the introduction of privacy-preserving verifiable digital credentials in venues across the United States.

[1 CPE] Why Securing Active Directory and Entra ID is Critical in the Age of Escalating Cyber Threats

  Presented by Ryan Garrett, Sr Sales Engineer • Rubrik

In today’s threat landscape, identity-related attacks are rapidly increasing in both frequency and sophistication, targeting core identity engines like Active Directory and Entra ID. This presentation will explore the modern attacker’s playbook, walking through the typical kill chain and the potential impact on an organization’s environment, spanning on-premises infrastructure, cloud, and SaaS applications. We will analyze the limitations and risks associated with current protection strategies—such as relying on point solutions, exposed backup data, and the complexities of Active Directory and Entra ID restoration, which often involve multiple tools and intricate forest-level recoveries.

The session will emphasize the importance of breaking down silos between identity management, data protection, and security teams. Attendees will come away with practical recommendations for collaborative recovery planning, including the value of conducting mock exercises to ensure readiness. By understanding the evolving threats and rethinking recovery strategies, organizations can better defend their most critical digital assets.

[1 CPE] Fortifying Data Resilience: When Backups Become Back Doors to Cyberthreats

  Presented by Rick Vanover, Vice President of Product Strategy • Veeam

Ransomware threats don’t discriminate. And as the industry’s leading provider of data resilience solutions, we’ve seen it all. Public sector organizations are just as likely to be targeted as those in the private sector, and the stakes can be even higher. Veeam’s latest Ransomware Trends Report exposes critical vulnerabilities and highlights why relying solely on backups is no longer enough to ensure resilience. In this session, Veeam’s VP of Product Strategy, Rick Vanover, will unpack the most common oversights that leave organizations — government, education, healthcare, and beyond — exposed to cyber threats, especially when backups become an overlooked back door in your security strategy.

Drawing from real-world incidents and hard-earned lessons, Rick will share what he wishes every IT professional knew before facing a ransomware or security breach event. You’ll leave with actionable insights, practical guidance, and research-backed recommendations to help you strengthen your data resilience. Whether you’re securing sensitive public sector data or safeguarding private enterprise information, this session will equip you to prepare for tomorrow’s threats today.

[1 CPE] How to Make AI a Reality in Your Organization

  Presented by Marni Carmichael, Vice President, Marketing • ImageSource

AI adoption is accelerating, yet many organizations struggle to transition AI projects from proof-of-concept to production. The AI Empowerment Blueprint is a structured framework that helps businesses overcome common AI adoption barriers, align AI initiatives with business goals, and implement a governance strategy that ensures ethical and effective AI deployment.

This session will guide attendees through a six-step methodology for AI success, covering key phases such as AI exploration, business value alignment, governance frameworks, and implementation best practices. Learn how to identify AI opportunities, mitigate risks, and build a scalable AI strategy that delivers real business value.

Whether you’re an executive, technologist, or entrepreneur, this presentation will equip you with actionable insights and a proven roadmap to maximize AI’s impact within your organization.

[1 CPE] Legacy to Modern: Data Migration & Integration for Business Continuity

  Presented by Rami Ramireddy, Chief Executive Officer • ESS

As organizations evolve, aging systems can become a barrier to agility, security, and scalability. This session explores how to transition from legacy platforms to modern ERP environments while maintaining business continuity and disaster recovery readiness. We’ll discuss best practices for data migration, internal system integration, and secure API exposure to external partners—all without referencing specific products or services.

Attendees will gain insights into:

  • Planning and executing data migration with minimal disruption
  • Designing resilient architectures for business continuity
  • Strategies for disaster recovery in hybrid environments
  • Connecting internal systems and exposing data securely via APIs

[1 CPE] A History of DNS Security

  Presented by Cricket Liu, Executive Vice President, Chief Evangelist • Infoblox

Over their 40-year history on the Internet, DNS servers have long been the targets of attacks: from cache poisoning to DDoS attacks. But in the last several years, we’ve begun turning DNS servers into security tools, helping us combat the scourges of malware, phishing, and more. This talk describes both the history of DNS and the technologies that allow us to turn DNS servers into effective security tools, Response Policy Zones, and Passive DNS.