[1 CPE] Breaking Down Silos: Unify Assets, Minimize Attack Exposure

  Presented by Lucas Zaichkowsky, Sr Sales Engineer • Axonius

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.

Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.

As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.

[1 CPE] Hackers Gonna Hack: When Defenses Break Down

  Presented by Jason Graun, Director of Sales Engineering • Fortinet

Organized threat actors continue to be the most dangerous risk in Cybersecurity. The tactics used to get into endpoints are constantly evolving in sophistication and scale. In this session, we will discuss industry trends/challenges, as well as walk through the tactics, techniques, and procedures used by threat actor groups by using a known active group as an example. We will also discuss practical real-world situations and how to defend against them using a unique approach to stopping ransomware before it becomes an active breach.

Jason Graun is the Sales Engineering Director for the Fortinet Security Operations team. He brings over 20 years of experience in information security and has spent 11 years at Fortinet. He regularly speaks at industry events, CIO/CISO summits, and works closely with IT executives to understand the business challenges they face in securing assets across an ever increasingly mobile workforce. Jason’s focus is to find ways technology can solve the biggest challenges in information security, he also holds a patent on cloud security malware inspection methods.

[1 CPE] Outsmart Cybercrime: Protection Optimized with MDR

  Presented by Raymond Neff, Solution Architect • ESET

With the rise of cyber threats and ongoing cyber talent shortage continuing unabated, many organizations are turning toward Managed Detection and Response (MDR). So how can this service enhance an organization’s overall security posture and improve incident response? This presentation explores combatting new threats, like multi-extortion ransomware with MDR how to leverage AI-powered threat detection and response, and human expertise, to prevent new ransomware variants the significance of a prevention-first, holistic cybersecurity strategy.

[1 CPE] Strengthening the Cyber Shield: Private-Public Partnerships at the State and Local Level

  Presented by ACTRA

This session focuses on maturing actionable strategies and collaborative frameworks designed to help IT leaders and cybersecurity professionals navigate today’s dynamic threat landscape. As adversaries increasingly target state and local systems, Arizona’s model for public-private cooperation demonstrates how trusted partnerships, timely threat intelligence sharing, and coordinated incident response can significantly enhance cyber resilience. This session will update participants on practical timely insights into how cross-sector collaboration is being operationalized to protect infrastructure, ensure business continuity, and support a unified cybersecurity posture across the state.

Speakers:

  • Frank J. Grimmelmann, President & CEO, Arizona Cyber Threat Response Alliance, Inc. (ACTRA)
  • Ryan Murray, Deputy Director, AZ Dept of Homeland Security, CISO, State of Arizona

[1 CPE] Restoration in 72 Hours, Not 72 Days: Building Cyber Resilience in Healthcare

  Presented by Daniel Tang, Healthcare Solutions Engineer • Rubrik

A singular focus on prevention and security is proving necessary but not sufficient to ensure continuity of operations and quality care. In an era of increasing cyberattacks, understanding the foundational principles of cyber resilience is essential for safeguarding patient data, ensuring organizational resilience, and ultimately, upholding patient care standards.

This session will explore the core concepts of cyber resilience and how they enable rapid recovery following cyber-attacks. With a focus on quantifying the impacts to operational downtime, legal costs and regulatory fines, as well as reputational damage, this discussion is tailored to help C-suite leaders prioritize cyber resilience strategies.

  • Explore the fundamental principles of cyber resilience, focusing on preserving continuity of care and business operations.
  • Assess the financial and operational risks of data breaches and ransomware attacks, including real-world examples from healthcare.
  • Discuss how to communicate the value of and build support for cyber resilience initiatives.

[1 CPE] Building Hawaii’s Cybersecurity Future, Together

  Presented by Michael Cardenas, CTO, Co-Founder, MC3 Technologies • Vicinity

Hawaiʻi faces a growing cybersecurity threat landscape and yet thousands of IT and cyber positions remain unfilled locally. We will share why homegrown talent is key to strengthening our region’s digital resilience. This session explores today’s top cyber risks, practical steps for small businesses to boost their security, and how collaboration between industry, education, and community partners is critical for protecting Hawaiʻi’s future. Attendees will walk away with actionable strategies to enhance their cybersecurity posture and engage in workforce development efforts that build a stronger, more secure Hawaiʻi.

[1 CPE] Demystifying Zero Trust: Simplifying Network Security

  Presented by Pete Lujan, Director, Systems Engineering • Fortinet

Today’s ever-changing threat landscape challenges traditional security models. The emergence of the Zero Trust model represents a transformative approach, reshaping how organizations protect their assets. This presentation aims to demystify Zero Trust, offering a comprehensive understanding that goes beyond buzzwords. We will explore the foundational concepts of Zero Trust, emphasizing the “never trust, always verify” philosophy. By the end of this session, attendees will be equipped with the knowledge to begin their Zero Trust journey, enhancing their security posture, and protecting critical data and systems from modern threats. Whether you are a security professional, IT manager, or organizational leader, this discussion will empower you to take decisive action toward a more secure future.

[1 CPE] LIVE Hack: Unmasking AI’s Dark Side

  Presented by Wayne Johnson, CEO • Stellar

In this eye-opening presentation, we will delve into the darker applications of artificial intelligence, specifically focusing on its potential to craft malicious code and generate deceptive voice replicas. As AI continues to evolve, its capabilities extend beyond beneficial innovations, posing significant ethical and security challenges. This session aims to shed light on how AI can be manipulated to perform nefarious tasks, such as writing harmful software or impersonating voices with high accuracy. Through live demonstrations and critical discussions, we aim to equip the audience with a comprehensive understanding of these risks and foster a dialogue on developing robust countermeasures and ethical guidelines to prevent misuse of AI technologies. Join us as we explore the shadowy corners of AI applications, understanding their implications and preparing for a secure technological future.

[1 CPE] Securing the Hyperconnected World in the AI Era

  Presented by Grant Asplund, Security Evangelist • Check Point

The AI revolution is fundamentally transforming cybersecurity, while the future of networking evolves toward Hybrid Full Mesh—integrating 5G, WiFi, Ethernet, Fiber, and other network infrastructures. This presentation examines how AI is accelerating cyber threats: attack costs are skyrocketing, incidents surging 50% year-over-year, and ransomware development compressed from nine days to mere minutes*. We’ll explore why Hybrid SASE (not cloud-only) forms the core of an effective hybrid full-mesh security architecture and how organizations can respond when the rate of change and complexity outpace their capabilities. Most importantly, we’ll demonstrate why security isn’t just a feature but the essential foundation of operations in this new era of hyperconnected vulnerability.

*Source: 2025 Check Point Research, CyberInt, Cybercrime Magazine, IBM, SAN

[1 CPE] Don’t Build a Fire Department

  Presented by Tom Simonis, Sr Sales Engineer, Enterprise US • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24×7 monitoring across your collective attack surfaces.