[1 CPE] How to Prepare and Respond to Data-Oriented Cyberattacks in Realtime

  Presented by Jonathan Halstuch, Co-Founder and CTO • RackTop Systems with SD3IT

Today’s cyber threats call for a new approach to data security, placing protections closer to the data. In this session, you’ll develop an understanding of why advanced cyber storage solutions are critical for defending production data from theft and destructive cyberattacks like ransomware. Learn strategies for reducing your organization’s threat window with a data-centric zero-trust architecture and artificial intelligence. Improve security and cyber hygiene while embracing the CISA Zero Trust Maturity Model to ensure your organization’s data is defended during each of the three phases of an attack.

Key takeaways:

  • Stay ahead of insider threats, data theft, ransomware, and extortionware with active defense
  • Improve security and cyber hygiene by aligning with the CISA Zero Trust Maturity Model
  • How to involve stakeholders in a data-centric approach to security

[1 CPE] APEX Platform for Multi-Cloud and Edge

  Presented by Adam Smolka, Sr Director, Product and Solutions Sales Specialist • Dell Technologies

IT organizations everywhere face increasingly complex siloed multi-cloud ecosystems, with pressure to move more quickly and improve efficiency in the face of skills gaps and economic headwinds. The Dell APEX portfolio addresses these challenges through a multi-cloud by-design approach that optimizes public cloud operations and brings the agility of the cloud operating model to any IT environment, offering greater control over applications and data.

Dell APEX Cloud Platforms provide an on-premises private cloud environment with consistent full-stack integration for the most widely deployed cloud ecosystem software including Microsoft Azure, Red Hat OpenShift, and VMware vSphere. They can be configured to connect to the corresponding public cloud implementation of their respective ecosystems. This provides easy access to multiple deployment options with the security, flexibility, efficiency, and control of an on-premises location, freeing IT to focus on their applications and data rather than infrastructure.

[1 CPE] Cybersecurity Trends for 2023

  Presented by Jeff Simpson, Sr Sales Executive, Cybersecurity Solutions • AT&T Alaska

With Cybersecurity compliance mandates increasing, and attacks on vulnerable supply chains and endpoints on the rise, it has never been more important to assess and take proactive measures to secure your network. This presentation pulls together information from many different analysts and digests their views on which Cybersecurity priorities your organization may face this year, along with the top eight cybersecurity trends for 2023, such as Supply Chain Resilience, Security Architecture Modernization and Data-Centric Transformation.

[1 CPE] Dark Web Monitoring: It’s time for an Offensive Strategy!

  Presented by Jeff Simpson, Sr Sales Executive, Cybersecurity Solutions • AT&T Alaska

Many organizations discover a cybersecurity breach many months later, too late for any substantial mitigation. With the average cost of breaches in the US at $9.4M, (without including ransom paid), it is advisable for organizations to take a more offensive stance. What if there was a way to detect compromised corporate credentials well before they were used to cause widespread fraud? Dark Web Monitoring goes where cybercriminals traffic stolen emails, usernames, and passwords, and can alert an organization if personal or corporate user information shows up in the Darknet layers. Learn how using a tool like this can help protect an organization’s employees, consumers, and vendors, as well as its reputation.

[1 CPE] Who’s Attacking You?

  Presented by Critical Insight

One of the most common questions from IT Leaders and Executives is: Who would attack our organization and why?

In this discussion, we’ll examine the most common cyberattack perpetrators and their methods. From hostile Nation-States to teenagers to some threat actors you might not expect. We will discuss the methods these attackers are using to gain access to your networks, be it unpatched systems, newly found zero days, as well as other avenues into your network. Also covered will be the intent of these attacks, whether it is to steal your intellectual property, extort your cryptocurrency, or to disrupt your operation to meet strategic goals. Most importantly, we will discuss how to tell the difference, and how to protect yourself.

[1 CPE] Enterprise Data: A Curse and a Blessing

  Presented by Sasi Pillay, Ph.D. • Vice President of IT Services & CIO, Washington State University

Many organizations collect data and use it for a variety of purposes. Often the data is gathered, contained, processed, and reported from a single system. It lacks the holistic view of looking at data from an enterprise perspective. Only if data is viewed with an enterprise lens, insights can be gained. This insight allows organizations to make decisions whether to detect, mitigate, and prevent issues, or increase market share, improve customer satisfaction, and deliver other positive outcomes. This talk will focus on addressing how to use data from disparate systems for organizational good and, in higher education, how this typically translates to improved student success and experience.

Dr. Pillay was recently named ORBIE CIO of the Year in the enterprise category for organizations with over $800 million in annual revenue. Pillay was recognized at the 2022 CIO of the Year® ORBIE® Awards in June.​

Dr. Pillay is the recipient of NASA’s Exceptional Service Medal and the Outstanding Leadership Medal. He is also the recipient of the Presidential Rank Award recognizing him as a Meritorious Executive in the U.S. federal government. He was recognized as one of the Federal 100 winners based on his positive impact on NASA and the community. He was also named as one of the top 25 IT leaders in Government citing his technology vision, clout among peers in other agencies, and his ability to show concrete results. The Northeast Ohio Software Association recognized him as the CIO of the Year in 2008.​ ​

[1 CPE] Cloud is a Tool, Not a Destination

  Presented by GCSIT

So, you’re ready to move to the cloud. Where do you start? Moving business functions to the cloud is almost always a good idea, but there is no “one cloud fits all” solution. The cloud offers a great number of benefits to the intelligent and engaged IT decision-maker, but the cloud is a tool to be leveraged and utilized, not a destination to be achieved.

Cloud adoption is a realistic approach to embracing the benefits of cloud computing. Join this session to gain a full breadth understanding of requirements to help you decide when, how, and how much to move to the cloud. Learn how the cloud adoption approach evaluates and encourages the use of Cloud resources when and where they make sense.

[1 CPE] Who’s Attacking You?

  Presented by Critical Insight

One of the most common questions from IT Leaders and Executives is: Who would attack our organization and why?

In this panel discussion, we’ll examine the most common cyberattack perpetrators and their methods. From hostile Nation-States to teenagers to some threat actors you might not expect. We will discuss the methods these attackers are using to gain access to your networks, be it unpatched systems, newly found zero days, as well as other avenues into your network. Also covered will be the intent of these attacks, whether it is to steal your intellectual property, extort your cryptocurrency, or to disrupt your operation to meet strategic goals. Most importantly, we will discuss how to tell the difference, and how to protect yourself.