[1 CPE] Cybersecurity and Compliance For 2024

  Presented by Rob Wayt, Director of Governance, Risk, and Compliance • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI and security best practices. This discussion will focus on security solutions to these challenges, including penetration testing and zero trust implementations. Rob Wayt, Director of Governance, Risk, and Compliance at Structured will be the presenter.

[1 CPE] Global Insights on Identity Security Maturity: Why it Matters? Why Now?

  Presented by Brian Roberts, Sr Solutions Engineer • CyberArk

In our global survey of 1,500 identity-related security experts, we found only 9% of organizations have the highest level of maturity. These Transformative organizations have the most mature identity security programs as they strategically focus on four key tenets: tools, integration, automation, and continuous threat detection & response. As a result, these organizations significantly outperform their competition in driving business outcomes and reducing risk. Learn how you can mature your identity security program because the future of security starts with identity.

Key Session Takeaways:

  • Top challenges for identity security
  • The four tenets of identity security
  • How to take a holistic approach to identity security
  • Key considerations in evaluating identity security providers

Brian Roberts is a motivated, technically-minded individual with 12 years of solutions engineering experience ranging from backup and disaster recovery to identity security. He primarily focuses on Privilege Access Management and Least Privilege Enforcement with self-hosted and cloud assets.

[1 CPE] Navigating the Cybersecurity Landscape: Essential Considerations for MDR

  Presented by Wayne Selk, Vice President of Cybersecurity Programs and Executive Director at CompTIA ISAO • ESET

Join Wayne Selk, Vice President of Cybersecurity Programs and Executive Director at CompTIA ISAO, and ESET as they navigate the intricacies of MDR (Managed Detection and Response) services and chart a course for enhanced cybersecurity resilience. Discover the importance of 24/7 service coverage in the face of global threats and the importance of human analysts working alongside your technology stack. Understand how compliance requirements influence vendor selection.

[1 CPE] Implementing Vendor-Agnostic Zero Trust Networking Access

  Presented by Kevin Heide, Director of Enterprise Networking • Cerium Networks

In the realm of cybersecurity, the Zero Trust Networking Access (ZTNA) model has emerged as a paramount strategy for safeguarding digital assets. This presentation focuses on the practical implementation of a vendor-agnostic Zero Trust approach, guided by the standards set by the National Institute of Standards and Technology (NIST) and the Cybersecurity and Infrastructure Security Agency (CISA).

We will explore the fundamental principles of the Zero Trust model, emphasizing its ‘never trust, always verify’ philosophy. This approach is critical in a landscape where traditional perimeter-based security models fall short against sophisticated cyber threats. The talk will elucidate how a vendor-agnostic ZTNA framework enhances flexibility and interoperability, allowing organizations to integrate the best solutions irrespective of vendor.

Special attention will be given to aligning ZTNA implementations with NIST’s guidelines and CISA’s recommendations. This alignment ensures that Zero Trust architectures are robust, compliant, and capable of mitigating a wide range of cyber threats. We will review key NIST publications, such as NIST SP 800-207, to demonstrate how they can be practically applied in crafting a Zero Trust strategy.

[1 CPE] Case Study: Modernizing Authentication in the Enterprise

  Presented by Pete Hernandez, Principal Security Architect • Atmosera

Join us as we discuss the challenges a global manufacturing company faced 2-years after adopting a modern authentication platform. We’ll cover how to approach adaptive access correctly, based on user context. We’ll cover how sprawling App registrations and misshapen service accounts were brought under control. Also, we’ll talk about how to govern identities correctly using Separation of Duties. Finally, we’ll review the real-world journey of adopting a Zero Trust Model for dynamic environments and how ZT empowers enterprises to remain resilient in the face of today’s threats.

[1 CPE] Zero Trust Microsegmentation: It’s Easier Than You Think

  Presented by Tony Steffe, Sr Systems Engineer, CISSP • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

Tony is a knowledgeable technical professional with 20+ years of experience developing, selling, and integrating technology for enterprise customers. He is effective in sales engineering, Internet security, project management, computer networking, and interpersonal relations. Exceptional at managing the personal and technical challenges that arise from building something new, Tony has successfully built out several high-impact IT projects.

[1 CPE] Addressing Cybersecurity Concerns for Critical Infrastructure Organizations

  Presented by Leslie Ann Kainoa, Oregon Cybersecurity State Coordinator • CISA

In this session, we will address the current cybersecurity threats and critical infrastructure stakeholder concerns. We will focus on under-discussed topics, including how to address resource constraints and organizational dependencies. We will also review CISA’s recommended best practices and offer guidance for how all critical infrastructure organizations can effectively leverage CISA resources.

Leslie Ann Kainoa is the Oregon Cybersecurity State Coordinator for the Cybersecurity and Infrastructure Security Agency (CISA), Region 10. In her current role, Leslie provides cybersecurity assistance and support to public and private Critical Infrastructure sectors throughout the State. She is focused on working with these organizations to improve cybersecurity and critical infrastructure resilience.

[1 CPE] Intelligent SSE: Secure Everything from Anywhere

  Presented by Matt Senechal, Regional Sales Manager • Netskope

This session will provide a technical overview of Security Service Edge (SSE), focused on the following topics:

  • Unintentional or unapproved data movement
  • Data protection for internal and external threats
  • Conditional and contextual access to safely enable cloud & SaaS applications
  • Protection from cloud-enabled SaaS and web threats
  • Work from anywhere with a secure, fast experience

You will walk away understanding the fundamentals of SSE and how it will benefit your business.