[1 CPE] Why Securing Active Directory and Entra ID is Critical in the Age of Escalating Cyber Threats

  Presented by Ryan Garrett, Sr Sales Engineer • Rubrik

In today’s threat landscape, identity-related attacks are rapidly increasing in both frequency and sophistication, targeting core identity engines like Active Directory and Entra ID. This presentation will explore the modern attacker’s playbook, walking through the typical kill chain and the potential impact on an organization’s environment, spanning on-premises infrastructure, cloud, and SaaS applications. We will analyze the limitations and risks associated with current protection strategies—such as relying on point solutions, exposed backup data, and the complexities of Active Directory and Entra ID restoration, which often involve multiple tools and intricate forest-level recoveries.

The session will emphasize the importance of breaking down silos between identity management, data protection, and security teams. Attendees will come away with practical recommendations for collaborative recovery planning, including the value of conducting mock exercises to ensure readiness. By understanding the evolving threats and rethinking recovery strategies, organizations can better defend their most critical digital assets.

[1 CPE] Fortifying Data Resilience: When Backups Become Back Doors to Cyberthreats

  Presented by Rick Vanover, Vice President of Product Strategy • Veeam

Ransomware threats don’t discriminate. And as the industry’s leading provider of data resilience solutions, we’ve seen it all. Public sector organizations are just as likely to be targeted as those in the private sector, and the stakes can be even higher. Veeam’s latest Ransomware Trends Report exposes critical vulnerabilities and highlights why relying solely on backups is no longer enough to ensure resilience. In this session, Veeam’s VP of Product Strategy, Rick Vanover, will unpack the most common oversights that leave organizations — government, education, healthcare, and beyond — exposed to cyber threats, especially when backups become an overlooked back door in your security strategy.

Drawing from real-world incidents and hard-earned lessons, Rick will share what he wishes every IT professional knew before facing a ransomware or security breach event. You’ll leave with actionable insights, practical guidance, and research-backed recommendations to help you strengthen your data resilience. Whether you’re securing sensitive public sector data or safeguarding private enterprise information, this session will equip you to prepare for tomorrow’s threats today.

[1 CPE] How to Make AI a Reality in Your Organization

  Presented by Marni Carmichael, Vice President, Marketing • ImageSource

AI adoption is accelerating, yet many organizations struggle to transition AI projects from proof-of-concept to production. The AI Empowerment Blueprint is a structured framework that helps businesses overcome common AI adoption barriers, align AI initiatives with business goals, and implement a governance strategy that ensures ethical and effective AI deployment.

This session will guide attendees through a six-step methodology for AI success, covering key phases such as AI exploration, business value alignment, governance frameworks, and implementation best practices. Learn how to identify AI opportunities, mitigate risks, and build a scalable AI strategy that delivers real business value.

Whether you’re an executive, technologist, or entrepreneur, this presentation will equip you with actionable insights and a proven roadmap to maximize AI’s impact within your organization.

[1 CPE] Legacy to Modern: Data Migration & Integration for Business Continuity

  Presented by Rami Ramireddy, Chief Executive Officer • ESS

As organizations evolve, aging systems can become a barrier to agility, security, and scalability. This session explores how to transition from legacy platforms to modern ERP environments while maintaining business continuity and disaster recovery readiness. We’ll discuss best practices for data migration, internal system integration, and secure API exposure to external partners—all without referencing specific products or services.

Attendees will gain insights into:

  • Planning and executing data migration with minimal disruption
  • Designing resilient architectures for business continuity
  • Strategies for disaster recovery in hybrid environments
  • Connecting internal systems and exposing data securely via APIs

[1 CPE] A History of DNS Security

  Presented by Cricket Liu, Executive Vice President, Chief Evangelist • Infoblox

Over their 40-year history on the Internet, DNS servers have long been the targets of attacks: from cache poisoning to DDoS attacks. But in the last several years, we’ve begun turning DNS servers into security tools, helping us combat the scourges of malware, phishing, and more. This talk describes both the history of DNS and the technologies that allow us to turn DNS servers into effective security tools, Response Policy Zones, and Passive DNS.

[1 CPE] How to Make AI a Reality in Your Organization

  Presented by Marni Carmichael, Vice President, Marketing • ImageSource

AI adoption is accelerating, yet many organizations struggle to transition AI projects from proof-of-concept to production. The AI Empowerment Blueprint is a structured framework that helps businesses overcome common AI adoption barriers, align AI initiatives with business goals, and implement a governance strategy that ensures ethical and effective AI deployment.

This session will guide attendees through a six-step methodology for AI success, covering key phases such as AI exploration, business value alignment, governance frameworks, and implementation best practices. Learn how to identify AI opportunities, mitigate risks, and build a scalable AI strategy that delivers real business value.

Whether you’re an executive, technologist, or entrepreneur, this presentation will equip you with actionable insights and a proven roadmap to maximize AI’s impact within your organization.

[1 CPE] Restoration in 72 Hours, Not 72 Days: Building Cyber Resilience in Healthcare

  Presented by Daniel Tang, Healthcare Solutions Engineer • Rubrik

A singular focus on prevention and security is proving necessary but not sufficient to ensure continuity of operations and quality care. In an era of increasing cyberattacks, understanding the foundational principles of cyber resilience is essential for safeguarding patient data, ensuring organizational resilience, and ultimately, upholding patient care standards.

This session will explore the core concepts of cyber resilience and how they enable rapid recovery following cyber-attacks. With a focus on quantifying the impacts to operational downtime, legal costs and regulatory fines, as well as reputational damage, this discussion is tailored to help C-suite leaders prioritize cyber resilience strategies.

  • Explore the fundamental principles of cyber resilience, focusing on preserving continuity of care and business operations.
  • Assess the financial and operational risks of data breaches and ransomware attacks, including real-world examples from healthcare.
  • Discuss how to communicate the value of and build support for cyber resilience initiatives.

[1 CPE] Building a Secure Foundation: An Overview of Zero Trust and Fixed Wireless

  Presented by David Mathis, Sr Solutions Partner, and TJ Smith, Principal Manager, Solutions Architect for Connected Devices  • Verizon

The Zero Trust Framework is a model that shifts defenses from network perimeters to users, assets, and resources. It emphasizes verifying all entities before allowing network communication. Fixed Wireless Access is a technology that enables us to place the edge of our network anywhere that we need to do business. This presentation outlines how zero trust works, its importance, and how to build a zero trust infrastructure that allows us to build out our networks quickly, reliably, and securely.

Fixed Wireless Access (FWA) is a broadband technology that provides last-mile connectivity using wireless transmission between fixed points. Unlike traditional terrestrial or mobile wireless solutions. FWA offers High-Speed, reliable Internet connectivity, rapid deployment, and quick tear down, and is a flexible yet cost-effective alternative or augmentation to existing fiber or cable connections. Ensuring that these new connections still meet or exceed existing network requirements is key successful adoption of the technology.

[1 CPE] How to Make AI a Reality in Your Organization

  Presented by Colton Rockwell, Lead Generation Marketing Manager • ImageSource

AI adoption is accelerating, yet many organizations struggle to transition AI projects from proof-of-concept to production. The AI Empowerment Blueprint is a structured framework that helps businesses overcome common AI adoption barriers, align AI initiatives with business goals, and implement a governance strategy that ensures ethical and effective AI deployment.

This session will guide attendees through a six-step methodology for AI success, covering key phases such as AI exploration, business value alignment, governance frameworks, and implementation best practices. Learn how to identify AI opportunities, mitigate risks, and build a scalable AI strategy that delivers real business value.

Whether you’re an executive, technologist, or entrepreneur, this presentation will equip you with actionable insights and a proven roadmap to maximize AI’s impact within your organization.

[1 CPE] Restoration in 72 Hours, Not 72 Days: Building Cyber Resilience in Healthcare

  Presented by James Cramer, PNW Healthcare GTM Lead • Rubrik

A singular focus on prevention and security is proving necessary but not sufficient to ensure continuity of operations and quality care. In an era of increasing cyberattacks, understanding the foundational principles of cyber resilience is essential for safeguarding patient data, ensuring organizational resilience, and ultimately, upholding patient care standards.

This session will explore the core concepts of cyber resilience and how they enable rapid recovery following cyber-attacks. With a focus on quantifying the impacts to operational downtime, legal costs and regulatory fines, as well as reputational damage, this discussion is tailored to help C-suite leaders prioritize cyber resilience strategies.

  • Explore the fundamental principles of cyber resilience, focusing on preserving continuity of care and business operations.
  • Assess the financial and operational risks of data breaches and ransomware attacks, including real-world examples from healthcare.
  • Discuss how to communicate the value of and build support for cyber resilience initiatives.