[1 CPE] Don’t Build a Fire Department

  Presented by Gary Quinn, Sr Sales Engineer, Enterprise US • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24×7 monitoring across your collective attack surfaces.

[1 CPE] 2025 State of Infosec: Incident Response Stories and Useful Findings

  Presented by Oscar Minks, President • FRSecure

The result of over 125 incident cases handled by the FRSecure response team in the last two years and nearly 400 validated Risk Assessments, President Oscar Minks will dive into the latest threats and response techniques you need to know—and what you can do to minimize the risk and impact of similar events. The breakdown will cover Business Email Compromise, Ransomware, and Internal Compromise.

Oscar Minks is a seasoned security and ethical hacking expert with over two decades of technical experience. To Oscar, our focus on fixing a broken industry is key. Leading by example and demonstrating the importance of doing things correctly, not just conveniently, remains a major focus in his position among FRSecure’s leadership today. Oscar is the author of FRSecure’s Annual State of InfoSec Report and a leading voice in the security world.

[1 CPE] A History of DNS Security

  Presented by Cricket Liu, Executive Vice President, Chief Evangelist • Infoblox

Over their 40-year history on the Internet, DNS servers have long been the targets of attacks: from cache poisoning to DDoS attacks. But in the last several years, we’ve begun turning DNS servers into security tools, helping us combat the scourges of malware, phishing, and more. This talk describes both the history of DNS and the technologies that allow us to turn DNS servers into effective security tools, Response Policy Zones, and Passive DNS.

[1 CPE] Empowering the Future: Unlocking the Potential of Microsoft Solutions

  Presented by High Point Networks

Join us for an engaging and informative breakout session exploring the latest in Microsoft products and solutions. We’ll dive into key topics like Exchange and Windows 11 End-of-Life, Entra ID best practices, and essential settings to enhance security and identity management. Discover how CoPilot and CoPilot+ PCs are revolutionizing productivity with AI, simplifying complex tasks, and empowering users to work smarter. Plus, learn how Microsoft Server ensures reliable operations in today’s fast-paced tech landscape. These groundbreaking innovations are transforming the way we work and live—don’t miss this opportunity to stay ahead of the curve!

[1 CPE] Cybersecurity and Compliance For 2025

  Presented by Chris Green, Manager of Penetration Testing • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI, and security best practices. Presented by Chris Green, Manager of Penetration Testing at Structured, this discussion will focus on security solutions to these challenges, including penetration testing and zero-trust implementations.

[1 CPE] Reinventing TPRM: Managing Third-Party Cyber Risk with Intelligence

  Presented by Mark Nafe, Director, Solutions Consulting • RiskRecon by Mastercard

In today’s hyperconnected enterprise, your cybersecurity risk doesn’t end at the firewall—it extends to every vendor, supplier, and partner in your digital ecosystem. Yet many organizations struggle to gain visibility into third-party risk, relying on outdated methods that can’t keep pace with modern threats.

This session explores how leading organizations are leveraging machine learning, threat intelligence, and continuous monitoring to transform their third-party risk management (TPRM) programs from reactive check-the-box exercises into proactive, intelligence-driven strategies. You’ll learn how advanced technologies are enabling security teams to identify high-risk vendors before they become the weak link—and how TPRM is evolving into a critical pillar of enterprise resilience.

Whether you’re already managing vendor risk or just starting to explore the issue, this session will provide the business case, practical frameworks, and technology insights you need to elevate your security posture.

[1 CPE] Browse Bravely With Prisma Access Browser

  Presented by JR Silverthorne, Partner Solutions Consultant, West • Palo Alto Networks

Join us as we dive into the latest in last-mile data loss prevention and secure browsing for end users. We will showcase Prisma Access Browser’s capabilities to keep your data protected on both managed and unmanaged devices while maintaining access to internal applications.

We will showcase how Prisma Access Browser can secure work on any device, boost visibility and control across SaaS/GenAI and web apps, and deliver a delightful user experience.

Whether you’re a security architect, IT leader, or network professional, this seminar offers actionable insights and practical guidance to strengthen your organization’s security strategy.

[1 CPE] Don’t Build a Fire Department

  Presented by Herb Williams, Sr Sales Engineer, Enterprise US • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24×7 monitoring across your collective attack surfaces.

[1 CPE] Cybersecurity and Compliance For 2025

  Presented by Chris Green, Manager, Penetration Testing • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI, and security best practices. Presented by Chris Green, Manager, Penetration Testing at Structured, this discussion will focus on security solutions to these challenges, including penetration testing and zero-trust implementations.

[1 CPE] Zero Trust in Motion: Securing East/West Traffic to Reduce Risk

  Presented by Rob Miley, AZ Commercial Sales Engineer • HPE Aruba Networking

Ransomware and targeted cyber security threats are on the rise. A proactive prevention strategy should use both tried and proven methodologies as well as new and emerging technologies. East West traffic identification and isolation is key in preventing malicious content from spreading, both in the Data Center and at the Campus Edge of the network. We will focus on innovative approaches to address the security compliance, performance, agility, and scalability demands of today’s highly distributed, hybrid, network environments.