[1 CPE] Outsmart Cybercrime: Protection Optimized with MDR

  Presented by Raymond Neff, Solution Architect • ESET

With the rise of cyber threats and ongoing cyber talent shortage continuing unabated, many organizations are turning toward Managed Detection and Response (MDR). So how can this service enhance an organization’s overall security posture and improve incident response? This presentation explores combatting new threats, like multi-extortion ransomware with MDR how to leverage AI-powered threat detection and response, and human expertise, to prevent new ransomware variants the significance of a prevention-first, holistic cybersecurity strategy.

[1 CPE] Strengthening the Cyber Shield: Private-Public Partnerships at the State and Local Level

  Presented by ACTRA

This session focuses on maturing actionable strategies and collaborative frameworks designed to help IT leaders and cybersecurity professionals navigate today’s dynamic threat landscape. As adversaries increasingly target state and local systems, Arizona’s model for public-private cooperation demonstrates how trusted partnerships, timely threat intelligence sharing, and coordinated incident response can significantly enhance cyber resilience. This session will update participants on practical timely insights into how cross-sector collaboration is being operationalized to protect infrastructure, ensure business continuity, and support a unified cybersecurity posture across the state.

Speakers:

  • Frank J. Grimmelmann, President & CEO, Arizona Cyber Threat Response Alliance, Inc. (ACTRA)
  • Ryan Murray, Deputy Director, AZ Dept of Homeland Security, CISO, State of Arizona

[1 CPE] Building Hawaii’s Cybersecurity Future, Together

  Presented by Michael Cardenas, CTO, Co-Founder, MC3 Technologies • Vicinity

Hawaiʻi faces a growing cybersecurity threat landscape and yet thousands of IT and cyber positions remain unfilled locally. We will share why homegrown talent is key to strengthening our region’s digital resilience. This session explores today’s top cyber risks, practical steps for small businesses to boost their security, and how collaboration between industry, education, and community partners is critical for protecting Hawaiʻi’s future. Attendees will walk away with actionable strategies to enhance their cybersecurity posture and engage in workforce development efforts that build a stronger, more secure Hawaiʻi.

[1 CPE] Restoration in 72 Hours, Not 72 Days: Building Cyber Resilience in Healthcare

  Presented by Daniel Tang, Healthcare Solutions Engineer • Rubrik

A singular focus on prevention and security is proving necessary but not sufficient to ensure continuity of operations and quality care. In an era of increasing cyberattacks, understanding the foundational principles of cyber resilience is essential for safeguarding patient data, ensuring organizational resilience, and ultimately, upholding patient care standards.

This session will explore the core concepts of cyber resilience and how they enable rapid recovery following cyber-attacks. With a focus on quantifying the impacts to operational downtime, legal costs and regulatory fines, as well as reputational damage, this discussion is tailored to help C-suite leaders prioritize cyber resilience strategies.

  • Explore the fundamental principles of cyber resilience, focusing on preserving continuity of care and business operations.
  • Assess the financial and operational risks of data breaches and ransomware attacks, including real-world examples from healthcare.
  • Discuss how to communicate the value of and build support for cyber resilience initiatives.

[1 CPE] Demystifying Zero Trust: Simplifying Network Security

  Presented by Pete Lujan, Director, Systems Engineering • Fortinet

Today’s ever-changing threat landscape challenges traditional security models. The emergence of the Zero Trust model represents a transformative approach, reshaping how organizations protect their assets. This presentation aims to demystify Zero Trust, offering a comprehensive understanding that goes beyond buzzwords. We will explore the foundational concepts of Zero Trust, emphasizing the “never trust, always verify” philosophy. By the end of this session, attendees will be equipped with the knowledge to begin their Zero Trust journey, enhancing their security posture, and protecting critical data and systems from modern threats. Whether you are a security professional, IT manager, or organizational leader, this discussion will empower you to take decisive action toward a more secure future.

[1 CPE] LIVE Hack: Unmasking AI’s Dark Side

  Presented by Wayne Johnson, CEO • Stellar

In this eye-opening presentation, we will delve into the darker applications of artificial intelligence, specifically focusing on its potential to craft malicious code and generate deceptive voice replicas. As AI continues to evolve, its capabilities extend beyond beneficial innovations, posing significant ethical and security challenges. This session aims to shed light on how AI can be manipulated to perform nefarious tasks, such as writing harmful software or impersonating voices with high accuracy. Through live demonstrations and critical discussions, we aim to equip the audience with a comprehensive understanding of these risks and foster a dialogue on developing robust countermeasures and ethical guidelines to prevent misuse of AI technologies. Join us as we explore the shadowy corners of AI applications, understanding their implications and preparing for a secure technological future.

[1 CPE] Securing the Hyperconnected World in the AI Era

  Presented by Grant Asplund, Security Evangelist • Check Point

The AI revolution is fundamentally transforming cybersecurity, while the future of networking evolves toward Hybrid Full Mesh—integrating 5G, WiFi, Ethernet, Fiber, and other network infrastructures. This presentation examines how AI is accelerating cyber threats: attack costs are skyrocketing, incidents surging 50% year-over-year, and ransomware development compressed from nine days to mere minutes*. We’ll explore why Hybrid SASE (not cloud-only) forms the core of an effective hybrid full-mesh security architecture and how organizations can respond when the rate of change and complexity outpace their capabilities. Most importantly, we’ll demonstrate why security isn’t just a feature but the essential foundation of operations in this new era of hyperconnected vulnerability.

*Source: 2025 Check Point Research, CyberInt, Cybercrime Magazine, IBM, SAN

[1 CPE] Don’t Build a Fire Department

  Presented by Tom Simonis, Sr Sales Engineer, Enterprise US • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24×7 monitoring across your collective attack surfaces.

[1 CPE] Don’t Build a Fire Department

  Presented by Matt Martin, Sr Sales Engineer, Large Enterprise • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24×7 monitoring across your collective attack surfaces.

[1 CPE] Achieving Ransomware Resilience and Disaster Recovery in a Multi-Cloud World

  Presented by Ken Smallwood, Systems Engineer • Zerto

Discover how to achieve an always-on 24/7 business, ensuring that customers and stakeholders can expect uninterrupted access to their data and applications. Learn how to solve for Ransomware Resilience, Disaster Recovery, and Multi-Cloud mobility for virtualized environments, with continuous data protection (CDP) for any app, any cloud, and any threat. With the right solutions in place, your organization can seamlessly protect critical data and applications, mitigate the risk of ransomware attacks, and maintain business continuity.

Explore strategies for achieving ransomware resilience, automated disaster recovery planning and testing, and flexible hybrid-cloud capabilities that allow you to move applications and scale capacity on demand. By integrating comprehensive data protection measures, you can ensure compliance with regulatory mandates and provide robust resilience against evolving cyber threats. This approach empowers your IT team to focus on strategic initiatives by reducing the burden of manual recovery processes and ensuring rapid restoration of operations.