[1 CPE] The Intersection of AI and Cybersecurity

  Presented by Dan Hackney, Security Architect • Check Point

As artificial intelligence (AI) permeates our lives, it’s crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.

[1 CPE] Securing the Future: Cyber Insurance and Cybersecurity Strategies for 2024

  Presented by Andrew Livingston, Cyber Security Specialist • Sentinel Technologies

In the dynamic and interconnected digital era of 2024, the landscape of cyber threats continuously evolves, posing unprecedented challenges to businesses worldwide. “Securing the Future: Cyber Insurance and Cybersecurity Strategies for 2024” delves into the intricacies of cyber insurance as a pivotal component of modern business risk management. This presentation offers a thorough exploration of the latest trends in cyber threats that businesses face, such as sophisticated AI-driven attacks, the proliferation of ransomware, and the vulnerabilities introduced by emerging technologies. It highlights the critical challenges that could lead to the denial of cyber insurance claims and potential loss of coverage, emphasizing the importance of compliance, accurate representation of cybersecurity measures, and prompt incident reporting.

Furthermore, the presentation shifts focus towards proactive strategies for enhancing an organization’s cybersecurity posture. It outlines actionable tips for businesses to not only fortify their defenses against cyber threats but also to positively influence their cyber insurance rates. Through a blend of expert insights and practical guidance, the audience will learn about the significance of regular risk assessments, the adoption of multi-factor authentication, encryption, endpoint security, and the development of robust incident response plans. We’ll discuss:

  • Insights into the evolving cyber threat landscape in 2024.
  • Common pitfalls leading to cyber insurance claim denials.
  • Strategies for enhancing cybersecurity measures to favorably impact insurance rates.
  • The future outlook of cyber insurance and the role of emerging technologies.

By the conclusion of this presentation, attendees will be equipped with the knowledge to navigate the complexities of cyber insurance and implement comprehensive cybersecurity strategies. This will not only prepare them to mitigate the risks of cyber threats but also optimize their insurance coverage in the face of an ever-changing digital threat landscape.

[1 CPE] Cybersecurity and Compliance For 2024

  Presented by Rob Wayt, Director of Governance, Risk, and Compliance • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI and security best practices. This discussion will focus on security solutions to these challenges, including penetration testing and zero trust implementations. Rob Wayt, Director of Governance, Risk, and Compliance at Structured will be the presenter.

[1 CPE] Foundations of Cybersecurity

  Presented by Mark Breunig & Troy Lofven • CISA

Cybersecurity is comprised of many aspects and fields. To build into the more advanced defenses, every organization must first develop a solid foundation in each area. This presentation will touch on the practical steps necessary to begin that approach.

Speakers:

  • Mark Breunig, Alaska Cybersecurity State Coordinator
  • Troy Lofven, Cybersecurity Advisor

Mark Breunig is the Cybersecurity State Coordinator in Alaska, representing the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). CISA serves as the nation’s risk advisor and collaborates with industry and government partners to strengthen the resilience of the nation’s critical infrastructure against cyber and physical risks. In this role, Mr. Breunig is a cybersecurity liaison between state and local government officials, critical infrastructure stakeholders, and the federal government and provides strategic planning, threat awareness, risk management advice, and incident response coordination.

Prior to joining CISA, Mr. Breunig served as the Chief Information Security Officer for the State of Alaska for two and a half years. As the Chief Information Security Officer, Mr. Breunig was responsible for strategic planning and design of the State’s cyber defense posture and operational management of the State Security Office. The State Security Office provided cyber security services for all departments within the State Executive branch. Prior to his role as the Alaska Chief Information Security Officer, Mr. Breunig was the IT Compliance Officer for the Municipality of Anchorage. He was responsible for the security of over 12,000 endpoints throughout the municipality and also oversaw the Records Management Office.

Overall, Mr. Breunig has more than two decades of professional experience in cybersecurity and information assurance in the government and private sectors.

[1 CPE] Go Hack Yourself: More War Stories from ~50k Pentests

  Presented by Jake Mickley, Sr Sales Engineer • Horizon3.ai

Join Jake Mickley, Senior Sales Engineer at Horizon3.ai, for an eye-opening session where he’ll discuss real-world examples of what NodeZero discovered in networks just like yours. You’ll hear about how fast and easy it is to compromise some of the largest networks in the world – with full domain takeover – often in minutes, and sometimes, without even exploiting a CVE. Discover how autonomous pentesting helps find unknown weaknesses in your infrastructure that could quickly result in ransomware exposure.

During this session, you’ll learn how attackers:

  • Use OSINT and password spraying to takeover systems without ever targeting CVEs.
  • Land and expand with legitimate credentials, then poison assets to take over domains.
  • Find cloud credentials and use them to compromise cloud services.

[1 CPE] Security Trends and Predictions

  Presented by Peter Ingebrigtsen, Sr Technical Marketing Manager • Arctic Wolf

In a dynamic cybersecurity landscape and fast-paced market, organizations grapple with ever-changing threats. Uncertainty abounds as they seek to benchmark themselves against their peers and prioritize initiatives. Join Arctic Wolf Senior Technical Marketing Manager, Peter Ingebrigtsen, as he explores key areas organizations are focusing on, top threat concerns, and responses by established organizations to emerging threats. Leveraging Arctic Wolf research, Peter further presents five critical security predictions for the next 12 months.

[1 CPE] AI-Powered Security First Unified SASE (Secure Access Service Edge)

  Presented by HPE Aruba Networking & Structured

As the traditional security perimeter continues to dissolve, traditional networking and security architectures are now insufficient.

Over the last year, many IT leaders have embraced a Secure Access Service Edge (SASE) framework to enable faster and more secure connectivity across their global organizations. SASE converges the functions of network and security solutions into a single, cloud-native service that delivers consistent connectivity and security from everywhere.

[1 CPE] Panel: Help is Here to Govern AI in Your Workplace!

  Presented by INTERFACE Advisory Council

Is generative AI a true hope, or is it all hype? Are you struggling to keep your end users protected from using AI tools that could cause security concerns? Is your data being protected from entering the AI space? These are just a few of the questions occupying the IT workforce today. While it may seem like a daunting task with no end in sight, there are others facing your challenges and wanting to share their experiences.

Our panel of local IT experts will share their experiences in what it takes to have a smart AI posture. We will discuss data governance, cyber security, and privacy concerns when it comes to AI in your workplace. Please bring your questions as well so you can get some guidance on the challenges you face today. Our esteemed panelists are some of the most experienced IT leaders in Hawaii and they want to share their experiences.

Panelists:

  • Rebecca Cal, Chief Data Officer, State of Hawaii
  • Randy Faatau, Vice President, Cybersecurity Architecture & Operations, First Hawaiian Bank
  • Vince Hoang, Chief Information Security Officer, State of Hawaii
  • Jodi Ito, Chief Information Security Officer, University of Hawaii