[1 CPE] Email Archiving and Security Compliance

  Presented by BlackPoint IT Services

In today’s data-driven world, email has become an indispensable tool for communication and collaboration. However, the sheer volume and sensitivity of email data pose significant challenges for organizations seeking to ensure data integrity, maintain compliance, and safeguard against cyber threats. In this presentation, we will delve into the intricacies of email archiving and security compliance, providing you with a comprehensive understanding of the essential principles and practical strategies for effective email management.

[1 CPE] Exploring the Anatomy of Modern-Day Breaches

  Presented by Tim Medin, CEO • Red Siege

Join this presentation for a comprehensive overview of modern cybersecurity threats and how breaches occur. We will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited. Throughout the presentation, we’ll discuss the importance of a proactive approach to cybersecurity, including regular security assessments, penetration testing, and vulnerability scanning, as well as education and training for employees to recognize and report suspicious activity. There are a lot of vulnerabilities in the wild, and IT administrators and security professionals often focus on the wrong issues because they are easier to monitor or measure. By the end of the presentation, you will have gained valuable insights into the latest cybersecurity threats and how to protect against them.

[1 CPE] Modern Segmentation Architectures

  Presented by Joe Lentz, Systems Engineer • Arista Networks

In this presentation, we will explore the different network segmentation models available, including VLANs, VRFs, and group-based segmentation models.

We will begin with an overview of the different segmentation models and discuss their benefits and drawbacks. VLANs provide a simple way to segment traffic but do not scale well in larger environments. VRFs offer more robust isolation but can be complex to manage. Group-based segmentation models offer a flexible and scalable way to segment traffic based on the endpoint itself rather than the network. We will discuss the implementation and configuration of each of these models and provide examples of how they can be used in different scenarios.

Next, we will discuss how EVPN with either VXLAN or MPLS transport can be used as an attachment point to allow for segmentation to cross the network device boundary and become a network-wide policy.

Finally, we will compare the different models to help you choose the best segmentation approach for your network, as well as how to layer these together to have a more complete design. By the end of this presentation, you will have a better understanding of modern segmentation architectures and be equipped to make informed decisions for your network.

[1 CPE] Zero Trust—Let’s Dive into Security

  Presented by Kevin Heide, Director of Enterprise Networking • Cerium Networks

Spend the morning with us while we explore the world of Zero Trust Architecture—but with a twist. Instead of a high-level overview of this strategic cybersecurity approach, we’ll get hands-on and show you practical examples using tools and environments that most of us are already familiar with.

Buckle up and join us on this exciting journey as we learn how to integrate different elements and policies across our organizations. We’ll also focus on optimizing our policies and enhancing threat protection.

[1 CPE] Security Trends & Predictions

  Presented by Peter Ingebrigtsen, Sr Technical Marketing Manager • Arctic Wolf

In a dynamic cybersecurity landscape and fast-paced market, organizations grapple with ever-changing threats. Uncertainty abounds as they seek to benchmark themselves against their peers and prioritize initiatives. Join Arctic Wolf to explore key areas organizations are focusing on, top threat concerns, and responses by established organizations to emerging threats. Leveraging Arctic Wolf research, we’ll further present five critical security predictions for the next 12 months.

[1 CPE] The Most Important Shift for Cybersecurity in a Generation

  Presented by Steve Riley, Field CTO • Netskope

We live in a world where everything is hybrid and the blend between personal, corporate, private, and public is ever-changing and presents us with a host of new challenges. This has increased and complicated the attack surface and the pressure to converge tools and do “more with less” is at peak levels. We must meet this watershed moment with the right team, plans, and technology.

Join this interactive session to learn:

  • How to build an effective plan for change without adding to the chaos
  • What consolidation approaches save money without sacrificing security
  • Use cases that deliver immediate value and efficiency while improving user experience

Steve Riley is a Field CTO at Netskope. Having worked at the intersection of cloud and security for pretty much as long as that’s been an actual topic, Steve offers that perspective to field and executive engagements and also supports long-term technology strategy and works with key industry influencers. A widely renowned expert speaker, author, researcher, and analyst, Steve came to Netskope from Gartner, where for five years he maintained a collection of cloud security research that included the Magic Quadrant for Cloud Access Security Brokers and the Market Guide for Zero Trust Network Access. Before Gartner, Steve spent four years as Deputy CTO of Riverbed Technology and held various security strategy and technical program management roles at Amazon Web Services for two years and at Microsoft for eleven years. Steve’s interest in security began all the way back in 1995 when he convinced his then-employer that it would be a good idea to install a firewall on their brand-new internet connection.

[1 CPE] The Ukrainian Paradox

  Presented by Jerry Petru, President • InfraGard Washington

This session is designed for individuals interested in interrogating the far-reaching cybersecurity impact of the war in Ukraine. We will cover how to prepare your organization for a bad day; what combat electronic warfare is and whether it is different from cybercriminal activity; the tactics and techniques of a cyber guerrilla force; how drones are changing the attack vector of security; and why having a detailed action plan for incident response is critical and where to find reliable information. This presentation is based on facts and information gathered by a former US Army Special Force Operator (Green Beret) who has family and friends in Ukraine. This session will be an open and free-flowing discussion of real-world issues; attendees are encouraged to ask questions.

Bio: Jerry Petru is the President of the Washington State InfraGard Chapter and a Fellow of the British Computer Society, The Charted Institute for IT. He is an innovative and technically sophisticated professional, offering substantial years of broad-based experience in evaluating large corporate systems. Powered with a comprehensive background in development and implementation, he has authored more than forty-seven different courses based on AIX, Encryption, Linux, Networking, Security, and Virtualization technologies teaching to an audience of tens of thousands around the world for the past twenty-five years.

Mr. Petru is equipped with a proven track record of success in designing and implementing systems and policies based on Confidentiality, Integrity, and Availability to meet business continuity and disaster recovery for long-range strategic plans of Fortune 100 Companies. He is also armed with stellar qualifications in all facets of project lifecycle development, from initial analysis and conceptual design to implementation, quality review, and enhancement to optimize operational efficiencies that improve business and IT operations.

[1 CPE] Why is Critical Data Being Compromised?

  Presented by Thales Group

Securing critical data and information was where this industry started a long time ago, but it became more challenging with the rapid growth of enterprise data in an interconnected world. The pandemic forced organizations to support a remote workforce and expose critical systems that were once only accessible from inside the company’s network. We’ve increased the attack surface and the number of vulnerabilities which has led to more data breaches. With the technology advancements in access management, data discovery and encryption we can once again shift the focus to securing our data and information. In this presentation, we will discuss a unified data-centric security approach and strategy to protecting your most critical data and information.

[1 CPE] Cybersecurity and Compliance For Winter 2023/2024

  Presented by Rob Wayt, Director of Governance, Risk & Compliance • Structured Communication Systems

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI and security best practices. This discussion will focus on security solutions to these challenges, including penetration testing and zero trust implementations.