[1 CPE] Backup ≠ Cyber Recovery

  Presented by Matthew Sheehan, Enterprise Sales Engineer • Rubrik

Legacy backups are vulnerable to attacks, can’t help you find threats, and force you to do wholesale restores that drag out recovery times. Rubrik Zero Labs found that only 5% of organizations were able to return to business continuity or normal operations within one hour of discovering a CyberAttack. A modern cyber recovery solution is critical for Security and IT teams to be cyber-resilient. Learn how you can make your data indestructible.

[1 CPE] Optimizing Mainframe Environments Against Today’s Cybersecurity Threats

  Presented by Don Pecha, Chief Information Security Officer • FNTS

IBM Z is more modern than you may think. The IBM Mainframe is inherently built around security and quantum proof. Mainframes are still at the core of many businesses. Their mission critical data is secured and runs on a mainframe. Insurance, Finance, Manufacturing, Grocery, and Healthcare among other businesses are still actively leveraging mainframes. How do we know these critical machines are secure?

[1 CPE] Cyber Audibles: Making the Most of Your Digital Defense

  Presented by Jamion Aden, Solutions Architect • IP Pathways

In the realm of cybersecurity, no conventional game plan, Business Continuity Plan, or tabletop exercise can fully anticipate and mitigate the challenges posed by cyber threats. Join us as we navigate through real-world encounters, and ‘calling the play at the line,’ when ransomware becomes the opposing force.

Our Solutions Architect, Jamion Aden, leverages over 18 years of comprehensive industry experience to lead this engaging and interactive presentation. In doing so, we aim to equip you with the necessary insights and strategies essential to effective event preparedness, as well as furnish your security toolkit with the necessary tools for bolstering your organization’s cyber defenses.

[1 CPE] How to Prepare and Respond to Data-Oriented Cyberattacks in Realtime

  Presented by Jonathan Halstuch, Co-Founder and CTO • RackTop Systems with SD3IT

Today’s cyber threats call for a new approach to data security, placing protections closer to the data. In this session, you’ll develop an understanding of why advanced cyber storage solutions are critical for defending production data from theft and destructive cyberattacks like ransomware. Learn strategies for reducing your organization’s threat window with a data-centric zero-trust architecture and artificial intelligence. Improve security and cyber hygiene while embracing the CISA Zero Trust Maturity Model to ensure your organization’s data is defended during each of the three phases of an attack.

Key takeaways:

  • Stay ahead of insider threats, data theft, ransomware, and extortionware with active defense
  • Improve security and cyber hygiene by aligning with the CISA Zero Trust Maturity Model
  • How to involve stakeholders in a data-centric approach to security

[1 CPE] Selecting an MDR Vendor for Your Organization

  Presented by Tim Evans, Co-Founder and Senior Vice President • Adlumin

Join Adlumin’s EVP, Tim Evans, as he provides guidance on selecting the right Managed Detection and Response (MDR) vendor for your organization. Evans will cover key considerations such as assessing your organization’s security needs, evaluating the vendor’s capabilities and expertise, and ensuring alignment with your organization’s goals and objectives. Attendees will gain insights into the critical factors to consider when choosing an MDR vendor to enhance their organization’s cybersecurity posture.

[1 CPE] How AI Can Think Like an Attacker

  Presented by Darktrace

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

[1 CPE] Defend Today, Secure Tomorrow

  Presented by Warren Hagelstien • Cybersecurity Advisor, CISA

Join Warren Hagelstien, CISA Cybersecurity Advisor, for a discussion of the evolution of ransomware, beginning with the first reported incident to the present. This presentation will provide a high-level overview of one incident followed by a look at the lessons learned. We’ll close with an introduction to the Department of Homeland Security’s (DHS) youngest agency, the Cybersecurity and Infrastructure Security Agency (CISA), and resources available at “no cost” to State, Local, Tribal, and Territorial Governments and Organizations with Critical Infrastructure.

Mr. Warren Hagelstien serves as a Cybersecurity Advisor for Region 7 (IA, KS, MO, and NE) for CISA in the Integrated Operations Division. Based in Omaha, NE he supports the Department of Homeland Security’s mission of partnering with industry and government to understand and manage risk, strengthening the security and resilience of the nation’s critical infrastructure. Mr. Hagelstien provides cyber preparedness assessments and protective resources, working group support, leadership, partnership in public-private development, and coordination and support in times of cyber threat, disruption, or attack to the nation’s sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities.

Mr. Hagelstien holds a Master of Science in Cybersecurity and a Master of Business Administration from Bellevue University. He also holds a Bachelor of Science degree in Management Information Systems from Bellevue University. He is a member of (ISC)2 and has been a Certified Information System Security Professional (CISSP) in good standing for the past 12 years.

[1 CPE] Educating Your Guesses: How to Quantify Risk and Uncertainty

  Presented by Sara Anstey, Director of Data Analytics and Integration • Novacoast

Asking for budget and justifying spend in cybersecurity departments can be a difficult task due to limited data and high uncertainty of future events. This talk will dive into quantitative risk analysis as it relates to cybersecurity –– how to model uncertain events and understand financial risk. Attendees will see a first-hand demonstration of how quantitative modeling can be used to communicate risk and understand ROI. Attendees will walk away with the tools needed to present cyber risk as a dollar amount that can be easily understood by other business decision-makers at their company.

[1 CPE] Thirty Years of Arguing with Adults

  Presented by Paul Dant, Senior Director of Cybersecurity Research • Illumio

In this talk, you’ll hear hilarious stories from a former child hacker that eerily predict the treacherous security landscape of today. Do you want to know why we’re still losing to ransomware? Attend this talk to find out and get insight into how you can start actually solving security problems and prepare your organization for the inevitable breach.

Paul has been coding and hacking since 1987. As a security researcher, he has performed offensive security testing of facilities ranging from nuclear energy plants to hospitals to tent-pole film sets. He’s presented to countless audiences the realities of cyberattacks, the hacker mindset, and new paradigms to address the potentially life-impacting threats we are faced with today.

He is currently the Senior Director of Cybersecurity Research at Illumio, where he works across industries to help organizations understand how to protect their critical assets in the “assume breach” mentality of zero trust.

[1 CPE] Cyber Security is National Security

  Presented by Kenneth A. Schmutz, Supervisory Special Agent • FBI

Cybersecurity is one of the FBI’s highest priorities. Our strategy is multifaceted. We take aim at the actors, disrupt their operations, and go after their money. One of the most important actions a business can take in preparing for a cyber security incident is to make a cyber incident response plan and include the FBI in that plan. When the FBI quickly engages with a company hit by a cyber-attack, we’re able to share indicators that help network defenders identify malicious activity and intelligence about the actors that inform a company’s decision-making during a crisis. As the cyber threat has evolved over the past 20 years, one thing has remained the same: The FBI is at the center of acting on cyber threat information to provide support to victims and impose costs on cybercriminals.