[1 CPE] Go Hack Yourself: War Stories from ~20k Pentests

  Presented by Habibeh Deyhim, Director of Customer Success • Horizon3.ai

In an ecosystem where you know you’re being targeted daily, how can you prove you’re secure? Are you finding and fixing the most critical attack paths, logging the right data, and alerting on the right events? Do you know if you’re ready to respond to an incident and are your security controls configured and integrated correctly? All this effort is supposed to measurably reduce your risk, but is any of it working?

Join Habibeh Deyhim, Director of Customer Success at Horizon3.ai, to learn a proven way to find, fix, and verify that you’re secure. Habibeh will discuss several real-world examples of what autonomous pentesting discovered in networks just like yours. And you’ll hear more about how fast and easy it was to safely compromise some of the biggest (and smallest) networks in the world – with full domain takeover in a little more than a few hours. Learn how you can safely do the same in your own network today!

[1 CPE] How I Really Feel About ChatGPT from an IP Lawyer’s Perspective

  Presented by Bradlee Frazer Esq., Partner, Hawley Troxell Law Firm  • INTERFACE Advisory Council

Everyone wants to use artificial intelligence to increase productivity. AI is a great way to maximize employee efficiency in the enterprise environment. But, in this interactive session, IP lawyer Brad Frazer will give you his perspectives on the legal risks of the unrestrained use of AI in the workplace. He’ll also give you some best practices for using it safely and correctly, to minimize your legal risks.

Bradlee Frazer is a partner with Hawley Troxell and is Chair of the firm’s Intellectual Property & Internet practice group. In addition to emphasizing and focusing on all facets of Internet law, Intellectual Property law, and Information Technology law, he also helps clients with related transactional work and litigation.

Brad is a published novelist, and he has also written extensively for national legal publications and law blogs. He is also a frequent speaker on internet, intellectual property, and computer law topics and is a regular guest lecturer at Boise State University on those subjects.

A Boise native, Brad began his legal career in 1989 as an intellectual property attorney and commercial litigator at a Boise-based law firm. In 1997 he accepted an in-house position as Senior Intellectual Property Counsel with Fortune 1000 company, Micron Electronics, Inc., and remained there through the company’s merger with Interland, Inc. (now Web.com), then the nation’s largest Web hosting company. He eventually became Deputy General Counsel for Micron Electronics, Inc., and Interland, Inc. From June 2003 to February 2006, Mr. Frazer served as Deputy General Counsel to MPC Computers, LLC, in Nampa, Idaho.

[1 CPE] Why is Critical Data Being Compromised?

  Presented by Matthew Olive, Partner Solutions Architect • Thales Group

Securing critical data and information was where this industry started a long time ago, but it became more challenging with the rapid growth of enterprise data in an interconnected world. The pandemic forced organizations to support a remote workforce and expose critical systems that were once only accessible from inside the company’s network. We’ve increased the attack surface and the number of vulnerabilities which has led to more data breaches. With the technology advancements in access management, data discovery and encryption we can once again shift the focus to securing our data and information. In this presentation, we will discuss a unified data-centric security approach and strategy to protecting your most critical data and information.

Matt Olive is a data security professional with over 20 years of technical cybersecurity experience. In his role at Thales Cloud Protection & Licensing, Matt is dedicated to providing customers with high-quality data security solutions that address security priorities and make the connected world more secure.

[1 CPE] Zero Trust—Let’s Dive into Security

  Presented by Kevin Heide, Director of Enterprise Networking • Cerium Networks

Spend the morning with us while we explore the world of Zero Trust Architecture—but with a twist. Instead of a high-level overview of this strategic cybersecurity approach, we’ll get hands-on and show you practical examples using tools and environments that most of us are already familiar with.

Buckle up and join us on this exciting journey as we learn how to integrate different elements and policies across our organizations. We’ll also focus on optimizing our policies and enhancing threat protection.

[1 CPE] Adding VX to Your LAN: A Primer on Overlay Networks

  Presented by CompuNet

As network infrastructure evolves, overlay networks are gaining popularity due to their ability to enhance network availability, security, and flexibility. Our presentation will offer a comprehensive overview of overlay network protocols and architectures, along with their role in enterprise networks. Join us to discover how overlay networks can benefit your organization and learn more about their implementation and management.

[1 CPE] Zero Trust Framework as a Baseline for Identity Management

  Presented by Andrew Massi, Digital Security Consultant, Identity • Entrust

With the recent increase in cyber-attacks that involve the use of weak / compromised credentials, it is critical for organizations to secure their environment and resources with a Zero Trust framework and a Phishing resistant RBA in mind. Organizations can establish trust through verifiable, phishing-resistant, certificate-based identities across users, devices, and apps to implement a secure first line of defense against cyberattacks.

Today’s technology leaders must navigate different tools and methodologies yet remain confident they’re quantifying risk effectively. During this session, we’ll be discussing emerging digital security trends and how your peers are shaping the way the market approaches cybersecurity and risk management.

Specifically, we will discuss:

  • How to establish trust across users, devices, and apps that secure a first line of defense
  • How to support the Zero Trust framework through the adoption of Phishing resistant passwordless authentication

[1 CPE] How Do You Secure ANY-ANY-NOW?

  Presented by Grant Asplund, Growth Technologies Evangelist • Check Point Software Technologies

  • ANY Device
  • ANY Location
  • Access To Corporate Resources NOW

Today, more than any other time in history, we are digitally connected. With a continuous rise in mobile-related attacks, and an ever-increasing use of mobile devices to perform business tasks, protecting your organization from mobile threats is more critical than ever. Despite our best efforts, threats and breaches continue to increase.

Join Grant Asplund for this insightful presentation to learn about the latest mobile and user protection including Check Point’s Harmony suite for securing users and access. Today’s mobile security needs to prevent the download of malicious files to mobile devices, not just from the web and email but also from collaboration tools like Teams and Slack, and others. Learn how you can achieve 99.7% efficacy against zero-day threats across your entire enterprise leveraging ThreatCloud, an industry-leading threat intelligence solution.

[1 CPE] Building a Ransomware Resilience Strategy

  Presented by Alfred Rojas, Systems Engineer • Zerto & 11:11 Systems

Ransomware attacks are affecting every industry and every size organization with the threats of downtime, data loss, reputation damage, and more. You can protect your organization from these threats by building ransomware resilience into your IT infrastructure. As ransomware threats evolve, so do the available technologies to protect your organization, and having a ransomware resilience strategy is more important than ever. In this session, we will discuss how:

  • The threat of ransomware has become systemic in data recovery planning
  • Prevention alone is not enough, and recovery alone is not enough
  • A ransomware resilience strategy relies on early detection to be effective
  • Air-gapped and isolated recovery are critical for ransomware resilience
  • Speed of recovery and minimal data loss recovery prevent ransom payments

[1 CPE] Uniting Networking and Security to Build for a World that Never Stops

  Presented by Anthony James, Vice President, Security Strategy • Infoblox

Technology professionals are challenged with ensuring significant digital risks do not impact their organizations or those who depend on them. However, new approaches to networking and security are required with an increasingly distributed workforce, ever-more sophisticated cyberattacks, adoption of cloud-based infrastructures, and the rollout of 5G and IoT. Tomorrow’s technology ecosystem must be built on new, highly resilient foundations. These foundations empower those responsible for network performance and protection with the visibility, context, and control to tame complexity, protect users and customers, and ensure their businesses will thrive in a world that never stops.

[1 CPE] How to Simplify and Secure Your Network & What You Need to Know About Wi-FI 6e

  Presented by Matt Helm, Sr Systems Engineer  • Extreme Networks

During the presentation, we will discuss how to simplify your network and make it more secure by using the IEEE standard 802.1aq. We explain the standard, and how it is easier to use than traditional networking and much more secure. We will demo its simplicity and what makes it secure.

We will then move into Wifi 6e and how it is changing the way we must look at wireless deployments. We will discuss all the changes that it has brought us and what we must be planning for with the higher speeds that we will be able to achieve.