[1 CPE] Intelligent SSE: Secure Everything from Anywhere

  Presented by Matt Senechal, Regional Sales Manager • Netskope

This session will provide a technical overview of Security Service Edge (SSE), focused on the following topics:

  • Unintentional or unapproved data movement
  • Data protection for internal and external threats
  • Conditional and contextual access to safely enable cloud & SaaS applications
  • Protection from cloud-enabled SaaS and web threats
  • Work from anywhere with a secure, fast experience

You will walk away understanding the fundamentals of SSE and how it will benefit your business.

[1 CPE] How to Build a High Confidence Cyber Recovery Plan

  Presented by Bharath Nagaraj, Sr Technical Field Director  • Cohesity

In an era where data is both a prime asset and a target, the global cybercrime cost is expected to soar to $10.5 trillion USD by 2025, with ransomware attacks becoming more frequent. Despite this, 80% of organizations doubt their cyber resilience strategies. The importance of being prepared for “black swan” cyber events, which exploit new vulnerabilities and can cause overwhelming damage, is highlighted. Cohesity emphasizes the role of Generative AI in bolstering a company’s security by automating threat detection, ensuring compliance, and promoting collaboration across departments. This approach not only mitigates risks but also aligns with strategic IT resilience planning. In an upcoming discussion led by Cohesity’s Senior Technical Field Director, Bharath Nagaraj, insights into overcoming large organizational challenges, effective response strategies, stakeholder roles, and steps for integrating cyber resilience into IT strategies will be explored, aiming to instill confidence in recovery without succumbing to ransoms.

[1 CPE] Panel: Help is Here to Govern AI in Your Workplace!

  Presented by INTERFACE Advisory Council

Is generative AI a true hope, or is it all hype? Are you struggling to keep your end users protected from using AI tools that could cause security concerns? Is your data being protected from entering the AI space? These are just a few of the questions occupying the IT workforce today. While it may seem like a daunting task with no end in sight, there are others facing your challenges and wanting to share their experiences.

Our panel of local IT experts will share their experiences in what it takes to have a smart AI posture. We will discuss data governance, cyber security, and privacy concerns when it comes to AI in your workplace. Please bring your questions as well so you can get some guidance on the challenges you face today. Our esteemed panelists are some of the most experienced IT leaders in Hawaii and they want to share their experiences.

Panelists:

  • Rebecca Cal, Chief Data Officer, State of Hawaii
  • Randy Faatau, Vice President, Cybersecurity Architecture & Operations, First Hawaiian Bank
  • Vince Hoang, Chief Information Security Officer, State of Hawaii
  • Jodi Ito, Chief Information Security Officer, University of Hawaii

[1 CPE] Avoiding the Silver Bullet Fallacy Within Insider Threat Detection

  Presented by Damien Weiss, National Security Defense Strategist  • Splunk & Cisco

Damien Weiss is an insider threat specialist at Splunk, where he has been for the past seven years. He works to find ways for analysts to use a constellation of software tools to help find insiders faster. Over the past year, he has focused on using ML and LLMs to help identify those who are looking to harm others or themselves.

[1 CPE] Backup ≠ Cyber Recovery

  Presented by Rubrik

Legacy backups are vulnerable to attacks, can’t help you find threats, and force you to do wholesale restores that drag out recovery times. Rubrik Zero Labs found that only 5% of organizations were able to return to business continuity or normal operations within one hour of discovering a CyberAttack. A modern cyber recovery solution is critical for Security and IT teams to be cyber-resilient. Learn how you can make your data indestructible.

[1 CPE] Adversaries for Hire!

  Presented by Steven Massey, Regional Sales Manager • Secureworks & Dell

By exploring modern threat tactics, tooling, and anonymized cases from Healthcare, Critical Infrastructure, and Finance sectors, this talk aims to equip participants with insights into how adversaries operate, enhancing their ability to secure their organizations against breaches and cyber-attacks.

By incorporating various skillsets from active operations, Secureworks has amassed a wealth of offensive knowledge and tradecraft that allows our operators to perform complex offensive security engagements and provide remediation advice and controls to businesses of all types and technologies.

[1 CPE] One Click Away: Lateral Movement Stemming from Office 365 Compromises

  Presented by Wayne Johnson, CEO • Stellar Technologies

In the rapidly evolving digital age, the security of cloud-based platforms like Office 365 is paramount for businesses worldwide. “One Click Away: Lateral Breaches Stemming from Office 365 Compromises” delves into the hacker’s mindset, unveiling how the hack occurs (LIVE DEMONSTRATION) and how a seemingly minor compromise can trigger a cascade of security breaches with profound implications for businesses. This presentation will explore the multifaceted threat landscape of Office 365, Active Directory, SAML, and SSLVPN, illuminating the pathways through which a simple breach can spread across an organization’s digital ecosystem. Attendees will gain insight into the initial indicators of compromise, empowering them with the knowledge to detect early signs of infiltration. By emphasizing preventative measures and best practices, the session aims to equip participants with robust strategies to safeguard businesses from everyday threats. Furthermore, it will outline effective incident response and mitigation strategies, providing a blueprint for responding to breaches with precision and agility. The presentation will also underscore the far-reaching consequences of breaches, from operational disruptions to severe financial and reputational damage, highlighting the critical need for a proactive and informed approach to cybersecurity in the era of cloud computing.

[1 CPE] The Intersection of AI and Cybersecurity

  Presented by Robbie Elliott, Head of Engineering, West & Eric Darancette, Security Engineer • Check Point

As artificial intelligence (AI) permeates our lives, it’s crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.

[1 CPE] Foundations of Cybersecurity

  Presented by Mark Breunig & Troy Lofven • CISA

Cybersecurity is comprised of many aspects and fields. To build into the more advanced defenses, every organization must first develop a solid foundation in each area. This presentation will touch on the practical steps necessary to begin that approach.

Speakers:

  • Mark Breunig, Alaska Cybersecurity State Coordinator
  • Troy Lofven, Cybersecurity Advisor

Mark Breunig is the Cybersecurity State Coordinator in Alaska, representing the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). CISA serves as the nation’s risk advisor and collaborates with industry and government partners to strengthen the resilience of the nation’s critical infrastructure against cyber and physical risks. In this role, Mr. Breunig is a cybersecurity liaison between state and local government officials, critical infrastructure stakeholders, and the federal government and provides strategic planning, threat awareness, risk management advice, and incident response coordination.

Prior to joining CISA, Mr. Breunig served as the Chief Information Security Officer for the State of Alaska for two and a half years. As the Chief Information Security Officer, Mr. Breunig was responsible for strategic planning and design of the State’s cyber defense posture and operational management of the State Security Office. The State Security Office provided cyber security services for all departments within the State Executive branch. Prior to his role as the Alaska Chief Information Security Officer, Mr. Breunig was the IT Compliance Officer for the Municipality of Anchorage. He was responsible for the security of over 12,000 endpoints throughout the municipality and also oversaw the Records Management Office.

Overall, Mr. Breunig has more than two decades of professional experience in cybersecurity and information assurance in the government and private sectors.