[1 CPE] Cybersecurity and Compliance For 2024

  Presented by Rob Wayt, Director of Governance, Risk, and Compliance • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI and security best practices. This discussion will focus on security solutions to these challenges, including penetration testing and zero trust implementations. Rob Wayt, Director of Governance, Risk, and Compliance at Structured will be the presenter.

[1 CPE] Implementing Vendor-Agnostic Zero Trust Networking Access

  Presented by Kevin Heide, Director of Enterprise Networking • Cerium Networks

In the realm of cybersecurity, the Zero Trust Networking Access (ZTNA) model has emerged as a paramount strategy for safeguarding digital assets. This presentation focuses on the practical implementation of a vendor-agnostic Zero Trust approach, guided by the standards set by the National Institute of Standards and Technology (NIST) and the Cybersecurity and Infrastructure Security Agency (CISA).

We will explore the fundamental principles of the Zero Trust model, emphasizing its ‘never trust, always verify’ philosophy. This approach is critical in a landscape where traditional perimeter-based security models fall short against sophisticated cyber threats. The talk will elucidate how a vendor-agnostic ZTNA framework enhances flexibility and interoperability, allowing organizations to integrate the best solutions irrespective of vendor.

Special attention will be given to aligning ZTNA implementations with NIST’s guidelines and CISA’s recommendations. This alignment ensures that Zero Trust architectures are robust, compliant, and capable of mitigating a wide range of cyber threats. We will review key NIST publications, such as NIST SP 800-207, to demonstrate how they can be practically applied in crafting a Zero Trust strategy.

[1 CPE] Case Study: Modernizing Authentication in the Enterprise

  Presented by Pete Hernandez, Principal Security Architect • Atmosera

Join us as we discuss the challenges a global manufacturing company faced 2-years after adopting a modern authentication platform. We’ll cover how to approach adaptive access correctly, based on user context. We’ll cover how sprawling App registrations and misshapen service accounts were brought under control. Also, we’ll talk about how to govern identities correctly using Separation of Duties. Finally, we’ll review the real-world journey of adopting a Zero Trust Model for dynamic environments and how ZT empowers enterprises to remain resilient in the face of today’s threats.

[1 CPE] Zero Trust Microsegmentation: It’s Easier Than You Think

  Presented by Tony Steffe, Sr Systems Engineer, CISSP • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

Tony is a knowledgeable technical professional with 20+ years of experience developing, selling, and integrating technology for enterprise customers. He is effective in sales engineering, Internet security, project management, computer networking, and interpersonal relations. Exceptional at managing the personal and technical challenges that arise from building something new, Tony has successfully built out several high-impact IT projects.

[1 CPE] Addressing Cybersecurity Concerns for Critical Infrastructure Organizations

  Presented by Leslie Ann Kainoa, Oregon Cybersecurity State Coordinator • CISA

In this session, we will address the current cybersecurity threats and critical infrastructure stakeholder concerns. We will focus on under-discussed topics, including how to address resource constraints and organizational dependencies. We will also review CISA’s recommended best practices and offer guidance for how all critical infrastructure organizations can effectively leverage CISA resources.

Leslie Ann Kainoa is the Oregon Cybersecurity State Coordinator for the Cybersecurity and Infrastructure Security Agency (CISA), Region 10. In her current role, Leslie provides cybersecurity assistance and support to public and private Critical Infrastructure sectors throughout the State. She is focused on working with these organizations to improve cybersecurity and critical infrastructure resilience.

[1 CPE] Intelligent SSE: Secure Everything from Anywhere

  Presented by Matt Senechal, Regional Sales Manager • Netskope

This session will provide a technical overview of Security Service Edge (SSE), focused on the following topics:

  • Unintentional or unapproved data movement
  • Data protection for internal and external threats
  • Conditional and contextual access to safely enable cloud & SaaS applications
  • Protection from cloud-enabled SaaS and web threats
  • Work from anywhere with a secure, fast experience

You will walk away understanding the fundamentals of SSE and how it will benefit your business.

[1 CPE] Data Security: Challenge Met Through Immutable Storage

  Presented by Isaac Story, Data Intelligence Sales Specialist • Hitachi Vantara

In a world with increasingly complex attacks being carried out on enterprise data assets, immutable storage is becoming a powerful defense against data breaches and Ransomware. Learn how customers are using this age-old technology that has come of age with more adaptable access options and increasing application integrations.

Isaac Story is a Data Intelligence Specialist with Hitachi Vantara. He has over 23 years of experience in IT infrastructure with a specific focus on advanced and emerging storage technologies including object storage and high-speed parallel file systems.

[1 CPE] 2024 Global CISO Predictions

  Presented by Greg Pepper, Security Architect • Check Point

Join this session to leverage strategic, evidence-backed insights from top voices in the field. Tap into the expertise of seasoned professionals to untangle complexity and stay ahead of the curve. In this must-attend CISO session, discover how to keep up with artificial intelligence trends, cloud security challenges, and cyber security solutions that can cancel attacks faster than you can say ‘distinctive cyber-readiness’.

Greg Pepper, Security Architect, will share reflections on 2023 and identify a variety of key cyber threats and cybercriminal tactics that could influence your cybersecurity plans in the year ahead.

Gregory (Greg) Pepper is a Senior Architect and a Check Point Evangelist. Greg has been an IT professional for 20+ years with expertise in Security, Networking & Cloud Computing. At Check Point, Greg’s main focus is to work with customers, partners and Check Point employees to help plan, design and implement security solutions across their networks, clouds, endpoints & mobile devices. Greg has been involved with a significant number of our of major cloud migrations and transformation across some of the largest Enterprise, Commercial and Public Sector Customers. Prior to Check Point, Greg has worked at well-known companies like Sony, Cisco and Price Waterhouse Coopers and Organic. Greg holds a Bachelor of Business Administration from Emory University – Class of 1998.

[1 CPE] Modern Cloud Security Beyond the Buzzwords

  Presented by Palo Alto Networks & Structured

Get up to date with the rapidly evolving world of cloud and container security without the buzzword bingo. In a sea of acronyms (CNAPP! CSPM! CIEM!) it can be hard to know what it all means and what really matters. And because of the rapid pace of advancement, what was state of the art a couple of years ago underperforms today. We will catch you up and as a bonus, we’ll also talk about the opportunity to improve security while reducing costs (that’s right, reducing costs) through proactive and preventative collaboration with your dev teams.