[1 CPE] Enhancing Security with Observability: Real-Time Threat Detection and Insights

  Presented by Kyle Kowalski, Lead Solutions Engineer • Dynatrace

In a world of complex dependencies, leveraging observability data can improve the security posture of any organization. From identifying false alarms to removing noise, to including critical context to vulnerability and anomaly detection, it helps to identify threats in real time.

Kyle Kowalski, Lead Solutions Engineer, will discuss how organizations can merge logs, metrics, events, and traces to create a comprehensive view of their environments. He will demonstrate the impact of AI in unifying these data points for faster, more accurate security insights.

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Liran Chen, Vice President, Sales Engineering & Technical Services • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

[1 CPE] Incident Response: A Peek Behind the Curtain & the Solution

  Presented by Ron Pelletier, Founder and Chief Customer Officer • Pondurance, with iT1 Source

Join Ron Pelletier, Pondurance’s Co-Founder as he shares insights from the in-house Incident Response Team on current causes & trends, shortfalls on current IR Teams, and the solutions available. Learn about how Ransomware has evolved, how it’s analyzed, and what measures should be taken by security programs to keep themselves secure.

Ron has more than twenty-five years of client advisory experience in security and enterprise risk management. His expertise is centered within the enterprise risk assessment, business continuity, and governance areas. He has also provided HIPAA, HITECH, ISO 27002, and PCI DSS advisory services to large and mid-sized organizations. Ron is certified in multiple disciplines relating to information and asset protection, including Certified Information Systems Security Professional (CISSP), Certified Information Systems Security Manager (CISM), Certified Business Continuity Professional (CBCP), Certified Information Systems Auditor (CISA), Certified Computer Forensics Examiner (CCFE), and Certified Ethical Hacker (CEH).

[1 CPE] Securing Work Where It Happens with Prisma Access Browser

  Presented by Yossi Rosenboim, Manager, Solution Engineering • Palo Alto Networks & Structured

As work increasingly moves to the cloud, traditional network perimeters dissolve, and the browser becomes the new frontline for productivity and risk. This presentation explores how Prisma Access Browser is redefining security by shifting focus from network-based controls to the user’s primary workspace: the Browser. We’ll dive into how this solution uniquely protects users and data at the browser level. Join us to understand how a secure, zero-trust approach to browser activity can streamline compliance, enhance user experience, and fortify your security posture without compromising productivity. This session includes a live demo.

Yossi Rosenboim is a seasoned cybersecurity professional with over 20 years of experience. As a leader of the PNW solution consulting team at Palo Alto Networks, he specializes in guiding organizations through the evolving landscape of cyber security.

[1 CPE] Fortifying the Digital Landscape: Integrating Regulation with Cybersecurity and GRC

  Presented by Rob Wayt, Director, Governance, Risk & Compliance • Structured

In today’s digital landscape, organizations face an increasing challenge to safeguard their information assets amidst evolving cybersecurity threats, regulatory demands, and operational complexities. This presentation explores the critical interplay between cybersecurity, compliance, risk management, and governance in the protection of sensitive data and information assets. Attendees will gain insights into best practices for creating a resilient cybersecurity program that aligns with regulatory requirements and organizational goals, supporting robust governance structures. Key topics include strategies for assessing and utilizing AI, implementing compliance controls, fostering a culture of security, and leveraging governance to ensure accountability and continuous improvement. This session provides a comprehensive approach for leaders and professionals aiming to secure information assets and enhance resilience in the face of emerging cyber threats.

[1 CPE] Proactive Threat Mitigation Through East/West Traffic Isolation

  Presented by Rich Horsely, Channel Sales Engineer • HPE Aruba Networking & Structured

Ransomware and targeted cyber security threats are on the rise. A proactive prevention strategy should use both tried and proven methodologies as well as new and emerging technologies. East West traffic identification and isolation is key in preventing malicious content from spreading, both in the Data Center and at the Campus Edge of the network. We will focus on innovative approaches to address the security compliance, performance, agility, and scalability demands of today’s highly distributed, hybrid, network environments.

[1 CPE] Unleashing the Power of XDR: Elevating Security for Everyone!

  Presented by Aaron Biancrosso, Regional Account Director, and Jeff Baine, Solutions Architect • Barracuda & BlackPoint

Cyberattacks can reach your organization from any device and attack surface. With limited cybersecurity resources, how do you keep up with the ever-increasing volume of sophisticated, AI-powered attacks? Join this session to learn more about:

  • Transforming Security with XDR Solutions
  • Enhancing Protection within your environment
  • Simplifying the SOC Maturity Model
  • Improved visibility
  • Automated incident response
  • Integration with existing security tools

[1 CPE] Zero Trust Made Simple: Transforming Security Without Complexity

  Presented by Tony Steffe, Sr Systems Engineer, CISSP • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

Tony is a knowledgeable technical professional with 20+ years of experience developing, selling, and integrating technology for enterprise customers. He is effective in sales engineering, Internet security, project management, computer networking, and interpersonal relations. Exceptional at managing the personal and technical challenges that arise from building something new, Tony has successfully built out several high-impact IT projects.

[1 CPE] From Silos to Synergy: The Power of Cybersecurity Platformization

  Presented by Jonathan Becker, Security Engineer • Check Point

Attendees will gain insights into the power of platformized cybersecurity, discovering how it can transform security operations into a more agile, integrated, and proactive defense mechanism.

In today’s rapidly evolving digital landscape, organizations are confronted with a growing and diverse array of cybersecurity threats. This presentation explores the transformative shift toward platform-based cybersecurity solutions, emphasizing how platformization can enhance security posture across the enterprise.

We will begin with a brief history of platformization, tracing its evolution from isolated security tools to integrated, cohesive frameworks. We’ll delve into how platformization unites disparate security tools, systems, and processes, creating a unified approach that improves threat detection, response, and mitigation. By breaking down traditional silos and fostering seamless communication across security layers, platformization enables organizations to respond more swiftly and effectively to emerging threats, reduce operational complexity, and bolster overall resilience.

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Liran Chen, Vice President, Sales Engineering & Technical Services • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.