[1 CPE] A History of DNS Security

  Presented by Cricket Liu, Executive Vice President, Chief Evangelist • Infoblox

Over their 40-year history on the Internet, DNS servers have long been the targets of attacks: from cache poisoning to DDoS attacks. But in the last several years, we’ve begun turning DNS servers into security tools, helping us combat the scourges of malware, phishing, and more. This talk describes both the history of DNS and the technologies that allow us to turn DNS servers into effective security tools, Response Policy Zones, and Passive DNS.

[1 CPE] Empowering the Future: Unlocking the Potential of Microsoft Solutions

  Presented by High Point Networks

Join us for an engaging and informative breakout session exploring the latest in Microsoft products and solutions. We’ll dive into key topics like Exchange and Windows 11 End-of-Life, Entra ID best practices, and essential settings to enhance security and identity management. Discover how CoPilot and CoPilot+ PCs are revolutionizing productivity with AI, simplifying complex tasks, and empowering users to work smarter. Plus, learn how Microsoft Server ensures reliable operations in today’s fast-paced tech landscape. These groundbreaking innovations are transforming the way we work and live—don’t miss this opportunity to stay ahead of the curve!

[1 CPE] Cybersecurity and Compliance For 2025

  Presented by Chris Green, Manager of Penetration Testing • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI, and security best practices. Presented by Chris Green, Manager of Penetration Testing at Structured, this discussion will focus on security solutions to these challenges, including penetration testing and zero-trust implementations.

[1 CPE] Reinventing TPRM: Managing Third-Party Cyber Risk with Intelligence

  Presented by Mark Nafe, Director, Solutions Consulting • RiskRecon by Mastercard

In today’s hyperconnected enterprise, your cybersecurity risk doesn’t end at the firewall—it extends to every vendor, supplier, and partner in your digital ecosystem. Yet many organizations struggle to gain visibility into third-party risk, relying on outdated methods that can’t keep pace with modern threats.

This session explores how leading organizations are leveraging machine learning, threat intelligence, and continuous monitoring to transform their third-party risk management (TPRM) programs from reactive check-the-box exercises into proactive, intelligence-driven strategies. You’ll learn how advanced technologies are enabling security teams to identify high-risk vendors before they become the weak link—and how TPRM is evolving into a critical pillar of enterprise resilience.

Whether you’re already managing vendor risk or just starting to explore the issue, this session will provide the business case, practical frameworks, and technology insights you need to elevate your security posture.

[1 CPE] Browse Bravely With Prisma Access Browser

  Presented by JR Silverthorne, Partner Solutions Consultant, West • Palo Alto Networks

Join us as we dive into the latest in last-mile data loss prevention and secure browsing for end users. We will showcase Prisma Access Browser’s capabilities to keep your data protected on both managed and unmanaged devices while maintaining access to internal applications.

We will showcase how Prisma Access Browser can secure work on any device, boost visibility and control across SaaS/GenAI and web apps, and deliver a delightful user experience.

Whether you’re a security architect, IT leader, or network professional, this seminar offers actionable insights and practical guidance to strengthen your organization’s security strategy.

[1 CPE] Don’t Build a Fire Department

  Presented by Herb Williams, Sr Sales Engineer, Enterprise US • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24×7 monitoring across your collective attack surfaces.

[1 CPE] Cybersecurity and Compliance For 2025

  Presented by Chris Green, Manager, Penetration Testing • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI, and security best practices. Presented by Chris Green, Manager, Penetration Testing at Structured, this discussion will focus on security solutions to these challenges, including penetration testing and zero-trust implementations.

[1 CPE] Zero Trust in Motion: Securing East/West Traffic to Reduce Risk

  Presented by Rob Miley, AZ Commercial Sales Engineer • HPE Aruba Networking

Ransomware and targeted cyber security threats are on the rise. A proactive prevention strategy should use both tried and proven methodologies as well as new and emerging technologies. East West traffic identification and isolation is key in preventing malicious content from spreading, both in the Data Center and at the Campus Edge of the network. We will focus on innovative approaches to address the security compliance, performance, agility, and scalability demands of today’s highly distributed, hybrid, network environments.

[1 CPE] Breaking Down Silos: Unify Assets, Minimize Attack Exposure

  Presented by Lucas Zaichkowsky, Sr Sales Engineer • Axonius

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.

Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.

As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.

[1 CPE] Hackers Gonna Hack: When Defenses Break Down

  Presented by Jason Graun, Director of Sales Engineering • Fortinet

Organized threat actors continue to be the most dangerous risk in Cybersecurity. The tactics used to get into endpoints are constantly evolving in sophistication and scale. In this session, we will discuss industry trends/challenges, as well as walk through the tactics, techniques, and procedures used by threat actor groups by using a known active group as an example. We will also discuss practical real-world situations and how to defend against them using a unique approach to stopping ransomware before it becomes an active breach.

Jason Graun is the Sales Engineering Director for the Fortinet Security Operations team. He brings over 20 years of experience in information security and has spent 11 years at Fortinet. He regularly speaks at industry events, CIO/CISO summits, and works closely with IT executives to understand the business challenges they face in securing assets across an ever increasingly mobile workforce. Jason’s focus is to find ways technology can solve the biggest challenges in information security, he also holds a patent on cloud security malware inspection methods.