[1 CPE] Cybersecurity and Compliance For 2025

  Presented by Rob Wayt, Director of Governance, Risk, and Compliance • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI, and security best practices. Presented by Rob Wayt, Director of Governance, Risk, and Compliance at Structured, this discussion will focus on security solutions to these challenges, including penetration testing and zero-trust implementations.

[1 CPE] Modern Security: Quantum Computing, AI, and External Key Management in the Cloud

  Presented by Thales

In this presentation, we will explore the emerging data threats posed by quantum computing and artificial intelligence and discuss their implications for data security. We will also delve into the advantages of external key management for cloud data, examining various strategies for protection, including encryption.

Join us to gain insights into the latest advancements in data security and learn how to safeguard your data against evolving threats.

[1 CPE] AI-Backed Cybersecurity Threats Require AI-Backed Solutions

  Presented by Chris Blanding, Public Sector Security Sales Specialist • Juniper Networks

Context: Supported by AI, cybersecurity threat actors are accelerating both the speed and breadth of attacks. Every indicator, from increasing click rates on phishing emails to shrinking attacker breakout times suggests a sea change in the threat landscape. Consequently, integration and AI/ML-backed automation across a layered cybersecurity stack is more important than ever. Historically, cybersecurity solutions were developed to address specific threats. Consequently, as the number and diversity of threats grew the number and complexity of cybersecurity solutions in the system enterprise also grew, driving complexity, slowing response times, and ultimately reducing efficacy. SIEM, SOAR, and XDR platforms were developed to visualize cybersecurity telemetry across the system enterprise, investigate, and respond to threats. While these solutions greatly improved visibility and response they are unable to respond quickly and efficiently enough to stop AI-backed threats.

Approach: In addition to the broad adoption of layered security services providing visibility across the system enterprise, the solution is to leverage a strategically integrated, AI/ML-backed, enterprise security stack that accelerates detection and automates response.

Implications: While an integrated, AI-backed enterprise security stack will allow enterprises to stay ahead of cyber risk the impact on the system enterprise is far greater. By integrating security into the broad enterprise stack, you will mature network, application, and data visibility creating opportunities for more granular, targeted SLAs that ultimately impact uptime, quality of service, flexibility and speed. That makes businesses more competitive and public entities more responsive to citizens.

[1 CPE] Security First AI-Powered Networking

  Presented by Jim Galiardi, System Engineering Manager • HPE Aruba Networking

Innovations in network visibility and telemetry now allow the network to be more than just plumbing. By actively participating in your zero-trust strategy the network can now offer additional insights and methods to protect users and data on and off the network. AI/ML will be the key to managing the wealth of telemetry now available, dynamically applying policy, and the beginnings of self-aware/self-healing networks.

[1 CPE] AI in Cybersecurity: Navigating the New Frontier of Cyber Defense

  Presented by Devin Johnstone, Security Operations Consultant • Palo Alto Networks

In an era where cyber threats are becoming increasingly sophisticated, traditional security measures are often insufficient. Devin Johnstone, Security Operations Domain Consultant at Palo Alto Networks with vast experience in network security, threat intelligence, and cloud security will delve into the transformative role of Artificial Intelligence (AI) in modern cybersecurity. Attendees will gain insights into how AI enhances threat detection, enables proactive defense strategies, and addresses the evolving landscape of cyber threats. The discussion will also cover the benefits and challenges associated with integrating AI into cybersecurity frameworks, providing a comprehensive overview of how AI is shaping the future of cyber defense.

Devin has spent over a decade in the trenches of a Security Operations Center and is passionate about sharing his lived experience in building a successful SecOps team from the ground up. 8 years ago, he joined Palo Alto Networks to begin architecting the internal SOC and went on to lead the development of the Security Automation, Data Loss Prevention, Insider Risk, and Customer Outreach programs.

Devin has had the opportunity to advise thousands of security teams, big and small, in their security operations journeys through media, tours of Palo Alto Networks SOC facility, and at events in 7 countries. He has since moved into a Consultant role to help customers accelerate their realization of “the art of the possible”: AI-enabled security operations strategies prepared for whatever the future brings.

[1 CPE] Building a Secure Foundation: An Overview of Zero Trust and Fixed Wireless

  Presented by David Mathis, Sr Solutions Partner, and TJ Smith, Principal Manager, Solutions Architect for Connected Devices  • Verizon

The Zero Trust Framework is a model that shifts defenses from network perimeters to users, assets, and resources. It emphasizes verifying all entities before allowing network communication. Fixed Wireless Access is a technology that enables us to place the edge of our network anywhere that we need to do business. This presentation outlines how zero trust works, its importance, and how to build a zero trust infrastructure that allows us to build out our networks quickly, reliably, and securely.

Fixed Wireless Access (FWA) is a broadband technology that provides last-mile connectivity using wireless transmission between fixed points. Unlike traditional terrestrial or mobile wireless solutions. FWA offers High-Speed, reliable Internet connectivity, rapid deployment, and quick tear down, and is a flexible yet cost-effective alternative or augmentation to existing fiber or cable connections. Ensuring that these new connections still meet or exceed existing network requirements is key successful adoption of the technology.

[1 CPE] Fortifying Enterprise Security: Advanced Cybersecurity Strategies for Today

  Presented by Elizabeth Schaedler, Security Strategist • Splunk a Cisco Company

In an era of escalating cyber threats, robust cybersecurity measures are vital to safeguarding sensitive data, critical systems, and enterprise networks. This presentation dives deep into the pivotal role of cybersecurity within information security (InfoSec), emphasizing the protection of confidentiality, integrity, and availability against sophisticated attacks like ransomware, phishing, and insider threats. IT operations and security professionals will explore cutting-edge tools and strategies—including firewalls, intrusion detection systems (IDS), encryption, multi-factor authentication (MFA), and incident response frameworks—that form the backbone of modern cyber defense.

The session will also address how cybersecurity drives enterprise risk management, empowering teams to identify vulnerabilities, enforce compliance, and ensure business continuity in the face of evolving risks. Expect practical, actionable insights to enhance your organization’s security posture, secure networks, and defend critical assets against today’s dynamic threat landscape. This is a must-attend for professionals tasked with staying ahead of cybercriminals and protecting their operations.

[1 CPE] Restoration in 72 Hours, Not 72 Days: Building Cyber Resilience in Healthcare

  Presented by James Cramer, PNW Healthcare GTM Lead • Rubrik

A singular focus on prevention and security is proving necessary but not sufficient to ensure continuity of operations and quality care. In an era of increasing cyberattacks, understanding the foundational principles of cyber resilience is essential for safeguarding patient data, ensuring organizational resilience, and ultimately, upholding patient care standards.

This session will explore the core concepts of cyber resilience and how they enable rapid recovery following cyber-attacks. With a focus on quantifying the impacts to operational downtime, legal costs and regulatory fines, as well as reputational damage, this discussion is tailored to help C-suite leaders prioritize cyber resilience strategies.

  • Explore the fundamental principles of cyber resilience, focusing on preserving continuity of care and business operations.
  • Assess the financial and operational risks of data breaches and ransomware attacks, including real-world examples from healthcare.
  • Discuss how to communicate the value of and build support for cyber resilience initiatives.

[1 CPE] What the Hack is Going On?

  Presented by Tim Medin, Chief Executive Officer • Red Siege

A comprehensive overview of modern cybersecurity threats and how breaches occur. We will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited. There are a lot of vulnerabilities in the wild, and IT administrators and security professionals often focus on the wrong issues because they are easier to monitor or measure. By the end of the presentation, you will have gained valuable insights into the latest cybersecurity threats and how to protect against them.

[1 CPE] Breaking Down Silos: Unify Assets, Minimize Attack Exposure

  Presented by Lucas Zaichkowsky, Sr Sales Engineer • Axonius

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.

Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.

As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.