[1 CPE] Pragmatic AI: Moving from Aspirations to Operations to Outcomes

  Presented by Seth Crosby, Principal Architect • GCSIT

Ready to cut through the AI hype? Join us for a no-nonsense guide to making AI actually work for your business. We’ll map today’s real AI capabilities (not the social-network demos), show you practical entry points whether you’re just starting or ready to scale, and reveal the essential ingredients for successfully managing AI projects without drowning in complexity. Most importantly, you’ll learn how to deliver and measure genuine business value through smart pilot programs without budgetary surprises. This session transforms intimidating AI concepts into actionable plans with tangible results—because impressive demos are nice, but outcomes are what really matter.

[1 CPE] Achieving Ransomware Resilience and Disaster Recovery in a Multi-Cloud World

  Presented by Ken Smallwood, Systems Engineer • Zerto

Discover how to achieve an always-on 24/7 business, ensuring that customers and stakeholders can expect uninterrupted access to their data and applications. Learn how to solve for Ransomware Resilience, Disaster Recovery, and Multi-Cloud mobility for virtualized environments, with continuous data protection (CDP) for any app, any cloud, and any threat. With the right solutions in place, your organization can seamlessly protect critical data and applications, mitigate the risk of ransomware attacks, and maintain business continuity.

Explore strategies for achieving ransomware resilience, automated disaster recovery planning and testing, and flexible hybrid-cloud capabilities that allow you to move applications and scale capacity on demand. By integrating comprehensive data protection measures, you can ensure compliance with regulatory mandates and provide robust resilience against evolving cyber threats. This approach empowers your IT team to focus on strategic initiatives by reducing the burden of manual recovery processes and ensuring rapid restoration of operations.

[1 CPE] Building a Secure Foundation: An Overview of Zero Trust and Fixed Wireless

  Presented by David Mathis, Sr Solutions Partner, and TJ Smith, Principal Manager, Solutions Architect for Connected Devices  • Verizon

The Zero Trust Framework is a model that shifts defenses from network perimeters to users, assets, and resources. It emphasizes verifying all entities before allowing network communication. Fixed Wireless Access is a technology that enables us to place the edge of our network anywhere that we need to do business. This presentation outlines how zero trust works, its importance, and how to build a zero trust infrastructure that allows us to build out our networks quickly, reliably, and securely.

Fixed Wireless Access (FWA) is a broadband technology that provides last-mile connectivity using wireless transmission between fixed points. Unlike traditional terrestrial or mobile wireless solutions. FWA offers High-Speed, reliable Internet connectivity, rapid deployment, and quick tear down, and is a flexible yet cost-effective alternative or augmentation to existing fiber or cable connections. Ensuring that these new connections still meet or exceed existing network requirements is key successful adoption of the technology.

[1 CPE] Fortifying Enterprise Security: Advanced Cybersecurity Strategies for Today

  Presented by Elizabeth Schaedler, Security Strategist • Splunk

In an era of escalating cyber threats, robust cybersecurity measures are vital to safeguarding sensitive data, critical systems, and enterprise networks. This presentation dives deep into the pivotal role of cybersecurity within information security (InfoSec), emphasizing the protection of confidentiality, integrity, and availability against sophisticated attacks like ransomware, phishing, and insider threats. IT operations and security professionals will explore cutting-edge tools and strategies—including firewalls, intrusion detection systems (IDS), encryption, multi-factor authentication (MFA), and incident response frameworks—that form the backbone of modern cyber defense.

The session will also address how cybersecurity drives enterprise risk management, empowering teams to identify vulnerabilities, enforce compliance, and ensure business continuity in the face of evolving risks. Expect practical, actionable insights to enhance your organization’s security posture, secure networks, and defend critical assets against today’s dynamic threat landscape. This is a must-attend for professionals tasked with staying ahead of cybercriminals and protecting their operations.

[1 CPE] Breaking Down Silos: Unify Assets, Minimize Attack Exposure

  Presented by Mike Brown, Sr Systems Engineer • Axonius

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.

Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.

As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.

[1 CPE] Rapid Growth of Unstructured Data Across Industries and the Challenge of Protecting It

  Presented by Rubrik

In today’s digital economy, nearly every industry is finding that data is becoming increasingly critical to its core business success. Data enables innovation and discovery, powers advances in artificial intelligence and machine learning, and drives medical and earth-science breakthroughs. Most of the collective data fueling today’s technological and scientific advances consists of unstructured data files – trillions of them. For effective stewardship of both infrastructure and data, IT needs to have insight into the depth and breadth of your organization’s unstructured datasets and the workflows that use them. Join this session for a discussion of the rapid growth of unstructured data across industries and the challenge of protecting it.

[1 CPE] Don’t Build a Fire Department

  Presented by Alfonso Rodriguez, Sr Sales Engineer • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24×7 monitoring across your collective attack surfaces.

[1 CPE] Unlock the Future of Secure Workspaces with Prisma Access Browser

  Presented by Palo Alto Networks

As work increasingly moves to the cloud, traditional network perimeters dissolve, and the browser becomes the new frontline for productivity and risk. This presentation explores how Prisma Access Browser is redefining security by shifting focus from network-based controls to the user’s primary workspace: the Browser. We’ll dive into how this solution uniquely protects users and data at the browser level. Join us to understand how a secure, zero-trust approach to browser activity can streamline compliance, enhance user experience, and fortify your security posture without compromising productivity. This session includes a live demo.

[1 CPE] Zero Trust in Motion: Securing East/West Traffic to Reduce Risk

  Presented by HPE Aruba Networking

Ransomware and targeted cyber security threats are on the rise. A proactive prevention strategy should use both tried and proven methodologies as well as new and emerging technologies. East West traffic identification and isolation is key in preventing malicious content from spreading, both in the Data Center and at the Campus Edge of the network. We will focus on innovative approaches to address the security compliance, performance, agility, and scalability demands of today’s highly distributed, hybrid, network environments.

[1 CPE] Real-Time Threat Mitigation with AI-Driven SASE: A Practical Approach

  Presented by Cato Networks

In this session, we’ll explore how a converged SASE platform combined with AI and machine learning (ML) enables real-time threat detection and mitigation, transforming network security from a reactive to a proactive model. The focus will be on how AI-driven solutions within the SASE framework can identify, analyze, and neutralize security threats in real time across distributed environments.

Brian Anderson, Global Field CTO at Cato, has over 20 years of experience in technology, working with networks, systems, application development, and security specializing in automation. Brian has worked to architect, attack, integrate, and secure networks and applications for emergency notification systems, government environments, healthcare organizations, transactional and e-commerce, including multi-tier cloud-based solutions, and has had a focus on web, database, and network and infrastructure security for the past 13 years at Imperva.