[1 CPE] Tackling Ransomware and Leveraging a Cybersecurity Platform with AI

  Presented by Teddy Nicoghosian, Principal Technical Product Marketing Manager, Network Security • Barracuda & BlackPoint IT

The presentation by Barracuda and BlackPoint IT Services highlights the importance of an end-to-end, proactive security strategy. It details every phase of a ransomware attack—from the initial arrival of a malicious email to the final steps of recovery—demonstrating that a comprehensive understanding of the entire attack lifecycle is essential. This insight allows organizations to design defenses that are not only robust and all-encompassing but also flexible enough to adapt to the constantly evolving threat landscape.

[1 CPE] Don’t Build a Fire Department

  Presented by Brian Knopp, Principal Sales Engineer, US • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24×7 monitoring across your collective attack surfaces.

[1 CPE] Architecting a Data-Centric Approach to Zero Trust

  Presented by Aaron Kremer, Technical Solution Specialist • NetApp

As organizations navigate the evolving landscape of virtualization, cloud computing, and AI, they face increasing challenges in securing and managing their data. Security remains a critical foundation, while effective data management and mobility ensure data is accessible and protected across diverse environments. With rising complexity, simplicity becomes key to optimizing operations and accelerating outcomes. This session will explore strategies for balancing security, data management, and efficiency, providing actionable insights to help meet the demands of today’s dynamic IT environment.

[1 CPE] AI in Cybersecurity: Unlocking Potential While Managing Risks

  Presented by Johan Bloomhart, Principal Sales Engineer • WatchGuard & BlackPoint IT

Join us for a 50-minute session exploring the evolving role of Artificial Intelligence (AI) in cybersecurity. AI is transforming the way we detect and respond to threats, offering new opportunities to enhance security while also introducing unique challenges. This presentation will provide insights into how AI is shaping the security landscape and practical strategies for leveraging AI effectively to strengthen defenses and mitigate risks.

Artificial Intelligence (AI) is revolutionizing cybersecurity, offering advanced capabilities to detect, prevent, and respond to threats. At the same time, cybercriminals are finding ways to use AI for more sophisticated attacks. In this session, we’ll explore AI’s impact on cybersecurity and discuss responsible ways to harness its potential while addressing emerging challenges.

This session will cover:

  • The evolution of AI and its growing role in business and security.
  • Ways security professionals are using AI to strengthen defenses and respond to threats.
  • The latest tools and best practices for minimizing AI-related risks.

Additionally, we’ll provide guidance on developing AI policies that help organizations maximize efficiency while maintaining strong security measures. Attendees will leave with actionable insights to help them integrate AI safely and effectively into their security strategies.

[1 CPE] Breaking Down Silos: Unify Assets, Minimize Attack Exposure

  Presented by Mike Brown, Sr Systems Engineer • Axonius

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.

Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.

As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.

[1 CPE] Next-Gen Defense: The Future of Cybersecurity

  Presented by Hubert Ralph Bonnell, CISSP, CCSM – Security Engineer • Check Point

As artificial intelligence (AI) permeates our lives, it’s crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.

[1 CPE] Unlock the Future of Secure Workspaces with Prisma Access Browser

  Presented by Palo Alto Networks

As work increasingly moves to the cloud, traditional network perimeters dissolve, and the browser becomes the new frontline for productivity and risk. This presentation explores how Prisma Access Browser is redefining security by shifting focus from network-based controls to the user’s primary workspace: the Browser. We’ll dive into how this solution uniquely protects users and data at the browser level. Join us to understand how a secure, zero-trust approach to browser activity can streamline compliance, enhance user experience, and fortify your security posture without compromising productivity. This session includes a live demo.

[1 CPE] Zero Trust in Motion: Securing East/West Traffic to Reduce Risk

  Presented by HPE Aruba Networking

Ransomware and targeted cyber security threats are on the rise. A proactive prevention strategy should use both tried and proven methodologies as well as new and emerging technologies. East West traffic identification and isolation is key in preventing malicious content from spreading, both in the Data Center and at the Campus Edge of the network. We will focus on innovative approaches to address the security compliance, performance, agility, and scalability demands of today’s highly distributed, hybrid, network environments.

[1 CPE] Demystifying Zero Trust: Simplifying Network Security

  Presented by Tanner Harrison, Systems Engineer • Fortinet

Today’s ever-changing threat landscape challenges traditional security models. The emergence of the Zero Trust model represents a transformative approach, reshaping how organizations protect their assets. This presentation aims to demystify Zero Trust, offering a comprehensive understanding that goes beyond buzzwords. We will explore the foundational concepts of Zero Trust, emphasizing the “never trust, always verify” philosophy. By the end of this session, attendees will be equipped with the knowledge to begin their Zero Trust journey, enhancing their security posture, and protecting critical data and systems from modern threats. Whether you are a security professional, IT manager, or organizational leader, this discussion will empower you to take decisive action toward a more secure future.

[1 CPE] Modernizing Application Delivery with the Enterprise Browser

  Presented by Island & Abnormal

In today’s dynamic business environment, organizations are increasingly seeking ways to modernize their application delivery infrastructure. The Enterprise Browser (EB) has emerged as a powerful solution that addresses the evolving needs of enterprises. This presentation explores the key features and benefits of the EB, highlighting how it can transform application delivery for enhanced security, productivity, and user experience while reducing IT infrastructure and support costs.