[1 CPE] Global Insights on Identity Security Maturity: Why it Matters? Why Now?

  Presented by Brian Roberts, Sr Solutions Engineer • CyberArk

In our global survey of 1,500 identity-related security experts, we found only 9% of organizations have the highest level of maturity. These Transformative organizations have the most mature identity security programs as they strategically focus on four key tenets: tools, integration, automation, and continuous threat detection & response. As a result, these organizations significantly outperform their competition in driving business outcomes and reducing risk. Learn how you can mature your identity security program because the future of security starts with identity.

Key Session Takeaways:

  • Top challenges for identity security
  • The four tenets of identity security
  • How to take a holistic approach to identity security
  • Key considerations in evaluating identity security providers

Brian Roberts is a motivated, technically-minded individual with 12 years of solutions engineering experience ranging from backup and disaster recovery to identity security. He primarily focuses on Privilege Access Management and Least Privilege Enforcement with self-hosted and cloud assets.

[1 CPE] Implementing Vendor-Agnostic Zero Trust Networking Access

  Presented by Kevin Heide, Director of Enterprise Networking • Cerium Networks

In the realm of cybersecurity, the Zero Trust Networking Access (ZTNA) model has emerged as a paramount strategy for safeguarding digital assets. This presentation focuses on the practical implementation of a vendor-agnostic Zero Trust approach, guided by the standards set by the National Institute of Standards and Technology (NIST) and the Cybersecurity and Infrastructure Security Agency (CISA).

We will explore the fundamental principles of the Zero Trust model, emphasizing its ‘never trust, always verify’ philosophy. This approach is critical in a landscape where traditional perimeter-based security models fall short against sophisticated cyber threats. The talk will elucidate how a vendor-agnostic ZTNA framework enhances flexibility and interoperability, allowing organizations to integrate the best solutions irrespective of vendor.

Special attention will be given to aligning ZTNA implementations with NIST’s guidelines and CISA’s recommendations. This alignment ensures that Zero Trust architectures are robust, compliant, and capable of mitigating a wide range of cyber threats. We will review key NIST publications, such as NIST SP 800-207, to demonstrate how they can be practically applied in crafting a Zero Trust strategy.

[1 CPE] Case Study: Modernizing Authentication in the Enterprise

  Presented by Pete Hernandez, Principal Security Architect • Atmosera

Join us as we discuss the challenges a global manufacturing company faced 2-years after adopting a modern authentication platform. We’ll cover how to approach adaptive access correctly, based on user context. We’ll cover how sprawling App registrations and misshapen service accounts were brought under control. Also, we’ll talk about how to govern identities correctly using Separation of Duties. Finally, we’ll review the real-world journey of adopting a Zero Trust Model for dynamic environments and how ZT empowers enterprises to remain resilient in the face of today’s threats.

[1 CPE] 2024 Global CISO Predictions

  Presented by Greg Pepper, Security Architect • Check Point

Join this session to leverage strategic, evidence-backed insights from top voices in the field. Tap into the expertise of seasoned professionals to untangle complexity and stay ahead of the curve. In this must-attend CISO session, discover how to keep up with artificial intelligence trends, cloud security challenges, and cyber security solutions that can cancel attacks faster than you can say ‘distinctive cyber-readiness’.

Greg Pepper, Security Architect, will share reflections on 2023 and identify a variety of key cyber threats and cybercriminal tactics that could influence your cybersecurity plans in the year ahead.

Gregory (Greg) Pepper is a Senior Architect and a Check Point Evangelist. Greg has been an IT professional for 20+ years with expertise in Security, Networking & Cloud Computing. At Check Point, Greg’s main focus is to work with customers, partners and Check Point employees to help plan, design and implement security solutions across their networks, clouds, endpoints & mobile devices. Greg has been involved with a significant number of our of major cloud migrations and transformation across some of the largest Enterprise, Commercial and Public Sector Customers. Prior to Check Point, Greg has worked at well-known companies like Sony, Cisco and Price Waterhouse Coopers and Organic. Greg holds a Bachelor of Business Administration from Emory University – Class of 1998.

[1 CPE] Addressing Cybersecurity Concerns for Critical Infrastructure Organizations

  Presented by Leslie Ann Kainoa, Oregon Cybersecurity State Coordinator • CISA

In this session, we will address the current cybersecurity threats and critical infrastructure stakeholder concerns. We will focus on under-discussed topics, including how to address resource constraints and organizational dependencies. We will also review CISA’s recommended best practices and offer guidance for how all critical infrastructure organizations can effectively leverage CISA resources.

Leslie Ann Kainoa is the Oregon Cybersecurity State Coordinator for the Cybersecurity and Infrastructure Security Agency (CISA), Region 10. In her current role, Leslie provides cybersecurity assistance and support to public and private Critical Infrastructure sectors throughout the State. She is focused on working with these organizations to improve cybersecurity and critical infrastructure resilience.

[1 CPE] Modern Cloud Security Beyond the Buzzwords

  Presented by Palo Alto Networks & Structured

Get up to date with the rapidly evolving world of cloud and container security without the buzzword bingo. In a sea of acronyms (CNAPP! CSPM! CIEM!) it can be hard to know what it all means and what really matters. And because of the rapid pace of advancement, what was state of the art a couple of years ago underperforms today. We will catch you up and as a bonus, we’ll also talk about the opportunity to improve security while reducing costs (that’s right, reducing costs) through proactive and preventative collaboration with your dev teams.

[1 CPE] Zero Trust Microsegmentation: It’s Easier Than You Think

  Presented by Tony Steffe, Sr Systems Engineer, CISSP • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

Tony is a knowledgeable technical professional with 20+ years of experience developing, selling, and integrating technology for enterprise customers. He is effective in sales engineering, Internet security, project management, computer networking, and interpersonal relations. Exceptional at managing the personal and technical challenges that arise from building something new, Tony has successfully built out several high-impact IT projects.

[1 CPE] A Review of FRSecure’s 2023 Annual Information Security Report

  Presented by Dave Tuckman, Information Security Consultant • FRSecure

FRSecure (an Information Security company located in Edina, MN) took the results of +/- 400 Validated Information Security Assessments and 55 Incident Response Engagements conducted in 2022 and created an anonymized report from the data called: The State of Information Security. Full details and access to the report are available here: https://frsecure.com/2023-annual-infosec-report/

In this presentation, FRSecure Information Security Consultant Dave Tuckman will highlight key findings in the report, and what we can learn from it.

Understand how you can mitigate risk going forward to protect your business and clients in an ever-changing threat landscape. Dave will provide additional perspective on how you can leverage this information for a better understanding of your third-party (supply, vendor, contractor) relationships.

Topics include:

  • FRSecure’s Annual State of InfoSec Report, informed by over 400 validated security assessments
  • Where organizations are getting it right vs. falling behind
  • How you can use this report to inform your own business’s security decisions
  • How you can use this report to inform your business’s Third-Party Risk Management

[1 CPE] Navigating the Cybersecurity Landscape: Essential Considerations for MDR

  Presented by Wayne Selk, Vice President of Cybersecurity Programs and Executive Director at CompTIA ISAO • ESET

Join Wayne Selk, Vice President of Cybersecurity Programs and Executive Director at CompTIA ISAO, and ESET as they navigate the intricacies of MDR (Managed Detection and Response) services and chart a course for enhanced cybersecurity resilience. Discover the importance of 24/7 service coverage in the face of global threats and the importance of human analysts working alongside your technology stack. Understand how compliance requirements influence vendor selection.