[1 CPE] Work Smarter, Not Harder: How to Choose the Best Partners

  Presented by Zane Smith, Principle Solutions Architect • Tech Heads

Want to know the secret to gaining expertise in cybersecurity, AI, digital transformation, cloud migration, and more? The secret is: you don’t have to become an expert in these areas – you just have to become an expert in picking the right partner. Learn from an IT Industry veteran and CISSP-certified cybersecurity expert about the top 5 criteria for selecting the right external partner, ensuring your team focuses on innovation, not information overload or fire-fighting. Elevate your strategy, empower your team, and don’t miss out on this game-changing session – your IT leadership success starts here!

[1 CPE] Unveiling the Power of Zero Trust: Unlocking Business Value & Building Resilience

  Presented by Optiv & Akamai

Join us for an enlightening fireside chat as we delve into the realm of Zero Trust security architecture. Discover how Zero Trust principles can revolutionize your organization’s cybersecurity approach, mitigate risks, and drive tangible business outcomes. Our expert panelists will demystify Zero Trust, offering actionable insights and strategies to harness its full potential in today’s dynamic threat landscape.

Speakers:

  • Dan Brown, Technical Director, Optiv
  • Umar Carter, Sr Security Advisor, Optiv
  • Tony Lauro, Director of Security Technology & Strategy, Akamai

[1 CPE] Seeing Your Attack Surface Through the Eyes of an Adversary

  Presented by Kraig Faulkner, Channel Systems Engineer – Cortex • Palo Alto Networks

Modern attack surfaces are dynamic. Without clear visibility that is constantly updated, it is all too easy to have persistent exposures and unmanaged assets. Security practitioners can only be as good as the data they have, so having a strong foundation of continuous discovery and monitoring ensures you can keep up with modern, dynamic attack surfaces to find, prioritize, and mitigate exposures as they arise.

[1 CPE] The SMB’s Playbook for Cybersecurity in 2024

  Presented by BlackPoint IT Services

The SMB’s Playbook for Cybersecurity in 2024 speaking session offers a concise yet comprehensive overview of the cybersecurity landscape tailored for small and medium-sized businesses. This presentation traverses the evolution of digital threats, providing insights into past trends and current challenges while forecasting future risks. It emphasizes practical strategies for proactive defense and effective incident response. Attendees will learn about the latest advancements in cybersecurity, gain knowledge on managing cyber incidents, and understand the importance of building a cybersecurity-aware culture. This session is vital for SMBs seeking to enhance their digital resilience against the backdrop of an ever-evolving cyber threat environment.

Speakers:

Andrew Hutchison, Director of Service Delivery at BlackPoint IT Services

Sean Banahan, Director of US Channel Sales at WatchGuard

[1 CPE] How AI Can Think Like an Attacker

  Presented by Darktrace

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

[1 CPE] Data Backup Best Practice for SMEs

  Presented by Jane Garrity, Director Channels, North America • Macrium Software

Data is one of the most valuable resources in the world, so doesn’t it make sense to keep such an important asset safe? In the same way that businesses insure physical assets and employees, backup protects data. As life is unpredictable and people can make mistakes, whether a natural disaster, hardware failure, or an employee accidentally infecting your network with a nasty virus, having current backups gives you peace of mind. In this session, we will review the proactive approach to data loss.

We will provide a broad yet critical overview of data protection, which will require us to discuss how data is imperative to business operations. We’ll cover the everyday risks to your business’s data, the consequences of data loss, and the significance of developing a data backup plan. We approach topics like understanding your business needs, analyzing the data backup types and methods, and knowing how to equip your teams for data backup and recovery best practices. As a trustworthy and reliable leader in backup software protection, Macrium Software is delighted and compelled to explore backup that can scale to meet the needs of your business.

[1 CPE] Email Archiving and Security Compliance

  Presented by BlackPoint IT Services

In today’s data-driven world, email has become an indispensable tool for communication and collaboration. However, the sheer volume and sensitivity of email data pose significant challenges for organizations seeking to ensure data integrity, maintain compliance, and safeguard against cyber threats. In this presentation, we will delve into the intricacies of email archiving and security compliance, providing you with a comprehensive understanding of the essential principles and practical strategies for effective email management.

[1 CPE] Exploring the Anatomy of Modern-Day Breaches

  Presented by Tim Medin, CEO • Red Siege

Join this presentation for a comprehensive overview of modern cybersecurity threats and how breaches occur. We will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited. Throughout the presentation, we’ll discuss the importance of a proactive approach to cybersecurity, including regular security assessments, penetration testing, and vulnerability scanning, as well as education and training for employees to recognize and report suspicious activity. There are a lot of vulnerabilities in the wild, and IT administrators and security professionals often focus on the wrong issues because they are easier to monitor or measure. By the end of the presentation, you will have gained valuable insights into the latest cybersecurity threats and how to protect against them.