[1 CPE] Securing Critical Environments

  Presented by Dan Frechette, Sales Engineer • Keystrike

Security in Industrial Control Systems and other critical environments comes with unique challenges and desired outcomes when compared to traditional cybersecurity.

[1 CPE] Protect Against Organized Attackers with Verified Trust for the Extended Workforce

  Presented by Fernando Barcelo, Sr Sales Engineer • Ping Identity

Organized attacker groups aren’t just hammering your perimeter anymore—they’re impersonating your employees, contractors, and partners across hiring, access, and the helpdesk. AI-powered deepfakes, credential-stuffing, MFA fatigue, and social engineering are turning the extended workforce into the easiest path into critical systems. In this session, we will show how to move from implicit trust to Verified Trust: a continuous, identity-centric security model that binds every digital interaction back to a real, verified human—without slowing them down. You’ll see practical patterns for adding high-assurance verification and adaptive controls on top of your existing IdPs and infrastructure to stop organized attackers before they can establish a foothold.

Key Takeaways:

  • Understand how AI-driven impersonation and organized attacker groups exploit gaps across hiring, workforce access, and helpdesk workflows.
  • Learn how Continuous Verification, Verified Onboarding, Verified Access, and Verified Helpdesk reduce risk across your extended workforce without adding friction.
  • See how to layer verification, credentials, and orchestration capabilities on top of your existing identity and security stack to strengthen Zero Trust initiatives.

[1 CPE] Cybersecurity and Compliance For 2026

  Presented by Structured

This session examines how organizations can align cybersecurity, privacy, and compliance programs with the realities of 2026. The presentation reviews current threat trends, executive accountability requirements, and the expanding impact of artificial intelligence on risk management. It then connects federal, state, and industry obligations, including NIST CSF 2.0, HIPAA, CJIS, PCI DSS 4.0, CMMC, and emerging privacy laws to practical security program design. Attendees will leave with a clear framework for building a complete security program that integrates governance, segmentation, risk management, Zero Trust principles, and penetration testing to reduce risk and support regulatory readiness.

[1 CPE] From Endless Alerts to Continuous Action: Why CISOs Are Shifting to CTEM

  Presented by George Tang, Solution Engineer • Zafran Security

First introduced by Gartner in 2022, Continuous Threat Exposure Management (CTEM) has quickly moved beyond buzzword status to become a cornerstone of modern cybersecurity programs. Beyond traditional vulnerability management programs, CTEM focuses on continuously identifying, validating, and prioritizing exposures so security teams can act with precision.

But the stakes are rising. Adversaries are weaponizing AI to discover and exploit vulnerabilities faster than ever, leaving organizations little margin for error. For CISOs, the challenge isn’t just finding exposures—it’s keeping pace with an accelerating threat landscape while making smarter use of existing resources.

[1 CPE] Bridging Zero Trust and SASE: A Unified Approach to Modern Cybersecurity

  Presented by Fortinet

This will be a panel discussion on how organizations can effectively bridge Zero Trust and SASE to create a unified, adaptive cybersecurity architecture that meets the demands of today’s hybrid workforce and threat landscape.

Key Takeaways:

  • Understand the core principles of Zero Trust and SASE, and how they complement each other.
  • Learn practical strategies for implementing a unified approach without adding complexity or disrupting operations.
  • Gain insights into real-world use cases and lessons learned from organizations successfully integrating these frameworks.

Moderator: Michael Lippman, Regional Channel Systems Engineer, Fortinet

Panelists:

  • Tanner Harrison, Senior Sales Engineer, Fortinet
  • Greg Still, Chief Executive Officer, Xiologix
  • Mark Wernet, Major Account Manager, Fortinet

[1 CPE] What the Hack is Going On?

  Presented by Tim Medin, Chief Executive Officer • Red Siege

A comprehensive overview of modern cybersecurity threats and how breaches occur. We will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited. There are a lot of vulnerabilities in the wild, and IT administrators and security professionals often focus on the wrong issues because they are easier to monitor or measure. By the end of the presentation, you will have gained valuable insights into the latest cybersecurity threats and how to protect against them.

[1 CPE] Data Resilience in the Age of Attack: Protect What Matters

  Presented by Landra Pierce, Product Strategy Technologist • Veeam

Cyberattacks are no longer a distant threat; they are a reality every IT team must be prepared for. When an attack occurs, your data becomes both the primary target and the key to recovery. Many organizations still rely on backup strategies that are designed for hardware failures or accidental deletions, rather than today’s threats, like ransomware, insider risk, and automated attacks. This disconnect creates vulnerabilities, especially when backups become an overlooked entry point in your security strategy. In this session, we will address these challenges to help you better protect your organization.

This session is ideal for IT professionals who want greater confidence in safeguarding their data and peace of mind. We will examine the most common oversights that leave organizations, including those in government, education, healthcare, and other sectors, exposed to cyberthreats. You’ll discover how teams are advancing beyond basic backup to adopt a cyber-ready approach, including topics like immutability, threat awareness, rapid recovery, and intelligent automation.

Our focus will be practical and grounded in real-world scenarios, and what truly works when pressure is high and time is limited. Because when every minute counts and trust is at stake, data resilience means more than surviving an attack. It’s about protecting what matters most and emerging even stronger.

[1 CPE] Inside the 2026 Threat Detection Report: A First Look at this Year’s Report

  Presented by Red Canary

Join us for a deep dive into our 2026 Threat Detection Report. We’ll reveal how identity threats have skyrocketed to account for more than half of all detected threats. We will discuss how adversaries are weaponizing the “human element” through “paste-and-run” tactics and discover why the browser has become the ultimate frontline for both defenders and attackers alike. You’ll leave with better knowledge of the top threats and techniques, along with our recommendations on how to handle them.

[1 CPE] Maximizing Impact: A Guide to Scaling Red Team Operations

  Presented by Jake Gillen, Solutions Engineer • Pentera

As organizations face expanding attack surfaces, Red Teaming remains vital for uncovering true security gaps—but traditional methods can be difficult to scale. This session introduces Automated Security Validation and its role in strengthening and accelerating Red Team activities. We’ll define what Red Teaming is, outline how to plan an exercise, and walk through real examples that illustrate improved efficiency and coverage. Attendees will learn to complement manual Red Teaming by automating repetitive tasks, enabling teams to focus on high-value adversarial techniques and maximize overall impact.

[1 CPE] The Foundation of Strong Security: Demystifying CIS Controls 1 & 2 for Enterprise Success

  Presented by Collin Covington, Sales Engineer • Axonius

Tired of the gap between security compliance and applicability? This session explores how to turn CIS Controls 1& 2, Asset Inventory and Secure Configuration, into actionable steps that strengthen your organization’s security foundation. We’ll discuss why these controls are essential for measuring and reducing risk, and how to apply them in ways that drive real outcomes rather than just checking compliance boxes. You will gain practical guidance to improve efficiency, reduce risk, and translate security requirements into meaningful results.