[1 CPE] Building a Secure Foundation: An Overview of Zero Trust and Fixed Wireless

  Presented by David Mathis, Sr Solutions Partner, and TJ Smith, Principal Manager, Solutions Architect for Connected Devices  • Verizon

The Zero Trust Framework is a model that shifts defenses from network perimeters to users, assets, and resources. It emphasizes verifying all entities before allowing network communication. Fixed Wireless Access is a technology that enables us to place the edge of our network anywhere that we need to do business. This presentation outlines how zero trust works, its importance, and how to build a zero trust infrastructure that allows us to build out our networks quickly, reliably, and securely.

Fixed Wireless Access (FWA) is a broadband technology that provides last-mile connectivity using wireless transmission between fixed points. Unlike traditional terrestrial or mobile wireless solutions. FWA offers High-Speed, reliable Internet connectivity, rapid deployment, and quick tear down, and is a flexible yet cost-effective alternative or augmentation to existing fiber or cable connections. Ensuring that these new connections still meet or exceed existing network requirements is key successful adoption of the technology.

[1 CPE] Fortifying Enterprise Security: Advanced Cybersecurity Strategies for Today

  Presented by Elizabeth Schaedler, Security Strategist • Splunk a Cisco Company

In an era of escalating cyber threats, robust cybersecurity measures are vital to safeguarding sensitive data, critical systems, and enterprise networks. This presentation dives deep into the pivotal role of cybersecurity within information security (InfoSec), emphasizing the protection of confidentiality, integrity, and availability against sophisticated attacks like ransomware, phishing, and insider threats. IT operations and security professionals will explore cutting-edge tools and strategies—including firewalls, intrusion detection systems (IDS), encryption, multi-factor authentication (MFA), and incident response frameworks—that form the backbone of modern cyber defense.

The session will also address how cybersecurity drives enterprise risk management, empowering teams to identify vulnerabilities, enforce compliance, and ensure business continuity in the face of evolving risks. Expect practical, actionable insights to enhance your organization’s security posture, secure networks, and defend critical assets against today’s dynamic threat landscape. This is a must-attend for professionals tasked with staying ahead of cybercriminals and protecting their operations.

[1 CPE] Restoration in 72 Hours, Not 72 Days: Building Cyber Resilience in Healthcare

  Presented by James Cramer, PNW Healthcare GTM Lead • Rubrik

A singular focus on prevention and security is proving necessary but not sufficient to ensure continuity of operations and quality care. In an era of increasing cyberattacks, understanding the foundational principles of cyber resilience is essential for safeguarding patient data, ensuring organizational resilience, and ultimately, upholding patient care standards.

This session will explore the core concepts of cyber resilience and how they enable rapid recovery following cyber-attacks. With a focus on quantifying the impacts to operational downtime, legal costs and regulatory fines, as well as reputational damage, this discussion is tailored to help C-suite leaders prioritize cyber resilience strategies.

  • Explore the fundamental principles of cyber resilience, focusing on preserving continuity of care and business operations.
  • Assess the financial and operational risks of data breaches and ransomware attacks, including real-world examples from healthcare.
  • Discuss how to communicate the value of and build support for cyber resilience initiatives.

[1 CPE] What the Hack is Going On?

  Presented by Tim Medin, Chief Executive Officer • Red Siege

A comprehensive overview of modern cybersecurity threats and how breaches occur. We will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited. There are a lot of vulnerabilities in the wild, and IT administrators and security professionals often focus on the wrong issues because they are easier to monitor or measure. By the end of the presentation, you will have gained valuable insights into the latest cybersecurity threats and how to protect against them.

[1 CPE] Breaking Down Silos: Unify Assets, Minimize Attack Exposure

  Presented by Lucas Zaichkowsky, Sr Sales Engineer • Axonius

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.

Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.

As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.

[1 CPE] Pragmatic AI: Moving from Aspirations to Operations to Outcomes

  Presented by Seth Crosby, Principal Architect • GCSIT

Ready to cut through the AI hype? Join us for a no-nonsense guide to making AI actually work for your business. We’ll map today’s real AI capabilities (not the social-network demos), show you practical entry points whether you’re just starting or ready to scale, and reveal the essential ingredients for successfully managing AI projects without drowning in complexity. Most importantly, you’ll learn how to deliver and measure genuine business value through smart pilot programs without budgetary surprises. This session transforms intimidating AI concepts into actionable plans with tangible results—because impressive demos are nice, but outcomes are what really matter.

What You’ll Learn:

  • How to apply a pragmatic framework to assess your AI control and develop a personalized adoption strategy
  • Techniques to identify AI opportunities that enhance your specific professional expertise
  • Methods to overcome resistance to change
  • Strategies to maintain your position as the “intelligence director” while leveraging AI as your thought assistant”
  • Practical approaches to deliver and measure genuine business value through smart, budget-conscious initiatives

This session is ideal for IT professionals and leadership in small to mid-market businesses looking for a pragmatic pathway to AI competency.

[1 CPE] Into the Future: A Virtual Tour of Palo Alto Networks’ SOC

  Presented by Devin Johnstone, Security Operations Consultant • Palo Alto Networks

Security leaders everywhere are asking the same question: how can I future-proof my cybersecurity strategy with less resources? Automation and AI are already within your reach! Learn how Palo Alto Networks is protecting itself and its customers and how you can take advantage of the same tools and strategies today.

Devin has spent over a decade in the trenches of a Security Operations Center and is passionate about sharing his lived experience in building a successful SecOps team from the ground up. 8 years ago, he joined Palo Alto Networks to begin architecting the internal SOC and went on to lead the development of the Security Automation, Data Loss Prevention, Insider Risk, and Customer Outreach programs.

Devin has had the opportunity to advise thousands of security teams, big and small, in their security operations journeys through media, tours of Palo Alto Networks SOC facility, and at events in 7 countries. He has since moved into a Consultant role to help customers accelerate their realization of “the art of the possible”: AI-enabled security operations strategies prepared for whatever the future brings.

[1 CPE] Cybersecurity and Compliance For 2025

  Presented by Rob Wayt, Director of Governance, Risk, and Compliance • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI, and security best practices. Presented by Rob Wayt, Director of Governance, Risk, and Compliance at Structured, this discussion will focus on security solutions to these challenges, including penetration testing and zero-trust implementations.

[1 CPE] Modern Security: Quantum Computing, AI, and External Key Management in the Cloud

  Presented by Thales

In this presentation, we will explore the emerging data threats posed by quantum computing and artificial intelligence and discuss their implications for data security. We will also delve into the advantages of external key management for cloud data, examining various strategies for protection, including encryption.

Join us to gain insights into the latest advancements in data security and learn how to safeguard your data against evolving threats.

[1 CPE] Tackling Ransomware and Leveraging a Cybersecurity Platform with AI

  Presented by Teddy Nicoghosian, Principal Technical Product Marketing Manager, Network Security • Barracuda & BlackPoint IT

The presentation by Barracuda and BlackPoint IT Services highlights the importance of an end-to-end, proactive security strategy. It details every phase of a ransomware attack—from the initial arrival of a malicious email to the final steps of recovery—demonstrating that a comprehensive understanding of the entire attack lifecycle is essential. This insight allows organizations to design defenses that are not only robust and all-encompassing but also flexible enough to adapt to the constantly evolving threat landscape.