[1 CPE] Exploring the Anatomy of Modern-Day Breaches

  Presented by Tim Medin, CEO • Red Siege

Join this presentation for a comprehensive overview of modern cybersecurity threats and how breaches occur. We will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited. Throughout the presentation, we’ll discuss the importance of a proactive approach to cybersecurity, including regular security assessments, penetration testing, and vulnerability scanning, as well as education and training for employees to recognize and report suspicious activity. There are a lot of vulnerabilities in the wild, and IT administrators and security professionals often focus on the wrong issues because they are easier to monitor or measure. By the end of the presentation, you will have gained valuable insights into the latest cybersecurity threats and how to protect against them.

[1 CPE] MDR Services: Enhancing Compliance and Mitigating Cyber Insurance Risks

  Presented by Mitch Gurick, Sr Cybersecurity Specialist • AT&T Business

Join us for a captivating 50-minute discussion on how organizations effectively collaborate with MDR services to secure their business. Discover how MDR services not only help organizations meet critical cyber controls for insurability and superior coverage offerings but also elevate overall protection, significantly reducing the risk of costly data breaches and the financial burdens associated with major incidents.

Whether you’re a small company with limited IT resources or a large enterprise with an in-house SOC group, MDR services are indispensable across all sectors. In an ever-evolving threat landscape, where attackers utilize stolen credentials, security misconfigurations, and legitimate IT tools to bypass defenses, technology alone cannot thwart every attack. Experience the power of 24×7 expert monitoring and response provided by skilled security operations professionals, as we explore how MDR services deliver round-the-clock protection, a feat that is often unattainable for most organizations independently.

Don’t miss out on this enlightening discussion as we delve into the growing reliance on MDR providers to effectively combat sophisticated adversaries and safeguard your business.

[1 CPE] How AI Can Think Like an Attacker

  Presented by Alissa Guevara, Cyber Security Technologist • Darktrace

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

[1 CPE] Looking to the Future: Threat and Security Trends for 2023

  Presented by Christopher Fielder, Field Chief Technology Officer • Arctic Wolf

According to global leaders, last year’s concerns are still top of mind, but forward progress is being made. The skill shortage is still a present pain point for most, while cloud security continues to be a major source of concern and the number of breaches pace steadily upwards.

Worry has now become action as organizations evaluate their weaknesses, increase budget plans, and proactively work against rising cyber threats. Join Arctic Wolf Field CTO Christopher Fielder as we review our research into the top threats and security trends businesses are facing along with predictions and guidance for the future.

[1 CPE] Evening the Odds of Cyber Warfare

  Presented by Michael Lettman • Cyber Security Advisor, Cybersecurity and Infrastructure Security Agency

Protecting your network and data is always a challenge. Threats can come from hackers looking to cause trouble, disgruntled employees, or users that don’t realize they are being targeted. Possibly the biggest threat now is cyber warfare. Nation States are sponsoring campaigns of disinformation and are constantly looking to disrupt any systems they can. Technology professionals have a great ally in this battle and help is available now.

In this session, you will learn about the Department of Homeland Security’s (DHS) youngest agency, the Cybersecurity and Infrastructure Security Agency (CISA), and resources available at “no cost” to State, Local, Tribal, and Territorial governments and organizations with critical infrastructure. Your enemies will use any tools they have, even drones, to attack your systems. Come get the information you need to stay on top of the current threat landscape.

Mike Lettman is the Cyber Security Advisor for Region 9 with the Department of Homeland Security. The mission of cyber security advisors is to provide direct coordination, outreach, and regional support to protect cyber components essential to the sustainability, preparedness, and protection of the Nation’s Critical Infrastructure and Key Resources (CIKR) and State, Local, Tribal, and Territorial (SLTT) governments. This is primarily accomplished with tools and assessments to test an organization’s resilience and cyber maturity. Mike has served in several capacities on many cyber and security teams, task forces, and committees over his career. He is currently sitting on the Governor’s Arizona Cyber Team (ACT), a member of the Arizona Counter Terrorism Information Center (ACTIC), and a member of the State of Arizona’s Cyber Disruption Planning Group.

Prior to becoming the Arizona CSA, Mike was the Chief Information Security Officer (CISO) for the State of Arizona for 6 years and the CISO for the State of Wisconsin for 8 years. Mike is currently only one of three people in the country that has worked as a CISO for two different state governments. During this time Mike has briefed four Governors offices, many Adjutants Generals, and policy advisors on cyber issues, adversaries, and threats, creating strategies and recommendations to improve the cyber resilience and maturity of those entities. He supported many high-level events such as the Super Bowl, state elections, inaugurations, and government officials lying in state. In addition to high-level events, Mike has organized, participated in, and successfully completed multiple cyber exercises in both states involving government entities, critical infrastructure private sector companies, and the National Guard.

[1 CPE] A Truly Statewide Strategy for Building the Collective Defense of Arizona

  Presented by ACTRA

As NATO says, an attack against one of us is an attack against all of us. Threat actors continue to victimize both government and business targets without regard to their affiliation or sector. Arizona’s unique strategic partnerships allow it to combine public sector support and private sector ingenuity to break down silos and build a truly statewide community of collaborative cyber defenders.

Speakers:

Ryan Murray, Deputy Director & Interim State CISO, State of Arizona
Frank Grimmelmann, President & CEO, Arizona Cyber Threat Response Alliance

Ryan Murray joined the Arizona Department of Homeland Security in July 2021 and currently serves as the Deputy Director over Cyber Command and as the Interim Chief Information Security Officer for the State. He also previously served as the Chief Information Security Officer for the Arizona Department of Revenue for three and a half years. In his current role, Deputy Director Murray provides tactical and operational leadership for Cyber Command, and strategic planning, facilitation, and coordination of cybersecurity efforts throughout the State.

Frank J. Grimmelmann serves as President & CEO for the Arizona Cyber Threat Response Alliance (ACTRA), a non-profit entity that was developed collaboratively with the Arizona InfraGard Program, the FBI, USDHS and law enforcement, and independently launched in 2013 to enable its private/public sector member organizations across all critical sectors to enable themselves to respond to the escalating national cybersecurity threat.

[1 CPE] Open Source Developers Are Security’s New Front Line

  Presented by Neel Thakkar, Sales Engineer • Sonatype

Bad actors have recognized the power of open source and are now beginning to create their own attack opportunities. This new form of assault allows hackers to poison the well, where OSS project credentials are compromised, and malicious code is intentionally injected into open source libraries. In this session, Sonatype will explain how both security and developers must work together to stop this trend or risk losing the entire open source ecosystem.

  • Analyze and detail the events leading to today’s “all-out” attack on the OSS industry.
  • Define the future of open source in today’s new normal.
  • Outline how developers can step into the role of security to protect themselves and the millions of people depending on them.

[1 CPE] Panel: Has Security Awareness Been Forgotten?

  Presented by INTERFACE Advisory Council

With all the challenges of the last few years, IT departments have been tasked with keeping remote workers productive, protecting data, safeguarding networks, and many other tasks. Now that companies have solidified their in-office and remote working setups, security awareness needs to be revisited.

As we frequently see, many security issues come from insider threats. Whether intentional or accidental, network users still present a major security issue. Join the INTERFACE Salt Lake City Advisory Council for a discussion to offer some of the best tips to better protect from human errors. Local IT leaders will discuss their approaches, shares success stories, and discuss what else needs to be addressed. Bring your questions for an open conversation to try and help everyone better secure their network from internal threats.

Panelists:

  • Greg Pugh, Information System Security Officer/COMSEC Engineer, Space Dynamics Laboratory
  • Paul Tew, Information Security Officer, Snow College
  • Danny Yeo, Information Technology Director, Brigham Young University Life Sciences

[1 CPE] Zero Trust Microsegmentation – It’s Easier Than You Think

  Presented by Sumi Gorla, Director of Systems Engineering • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

Sumi Gorla is the Director of Systems Engineering at Illumio. Her responsibilities include executing Illumio strategic product vision, field engineering enablement, and enterprise customer selling and support across US West. Prior to Illumio, Sumi has held several engineering and technical sales leadership roles in companies such as EMC, Brocade, Citrix, and BigSwitch Networks. As a sales leader, Sumi brings a unique approach to problem-solving, from both a technical and a business perspective. Sumi’s strengths are in her ability to explain how technical features can meet business requirements for all levels of audience.

[1 CPE] The Ransomware Recovery Puzzle

  Presented by Peter Martinson, Sr Security Engineer • Sanity Solutions

We all hear about ransomware on the news but are we prepared to deal with it? Join us as we talk through real-life case studies of companies that have gone through ransomware attacks and learn how the process works.

  • Timeline of an attack
  • Recovery of Systems
  • To pay or not to pay
  • Legal concerns
  • Cyber Insurance

We will look at all the pieces of the puzzle and see if we can’t form a picture.