[1 CPE] Rapid Growth of Unstructured Data Across Industries and the Challenge of Protecting It

  Presented by Paul Swanson, Account Executive, PLS NAS • Rubrik & Structured

In today’s digital economy, nearly every industry is finding that data is becoming increasingly critical to its core business success. Data enables innovation and discovery, powers advances in artificial intelligence and machine learning, and drives medical and earth-science breakthroughs. Most of the collective data fueling today’s technological and scientific advances consists of unstructured data files – trillions of them. For effective stewardship of both infrastructure and data, IT needs to have insight into the depth and breadth of your organization’s unstructured datasets and the workflows that use them. Join this session for a discussion of the rapid growth of unstructured data across industries and the challenge of protecting it.

[1 CPE] Cybersecurity and Compliance For 2024

  Presented by Rob Wayt, Director of Governance, Risk, and Compliance • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI and security best practices. This discussion will focus on security solutions to these challenges, including penetration testing and zero trust implementations. Rob Wayt, Director of Governance, Risk, and Compliance at Structured will be the presenter.

[1 CPE] How AZ’s Collective Public/Private Defense Benefits Your Organization & the AZ Ecosystem

  Presented by Ryan Murray •  AZ DHS and Frank Grimmelmann • ACTRA

ACTRA, and the State of Arizona Department of Homeland Security, will share the objective evidence of how the entire State of Arizona, public sector, and private industry, is coming together to raise the bar for the collective defense of the community. Trust-driven collaborative integration of people, processes, and technology demonstrates the advances to be shared!

We’ll focus on the work being done to deploy defensive tools to ensure cybersecurity readiness, the sharing of actionable intelligence to ensure we all have visibility of the threats impacting our organizations, and even developing the cybersecurity workforce of tomorrow. Become part of the conversation and join us in the collaborative communication to better secure the entire state!

Speakers:
Ryan Murray, Deputy Director, Arizona Department of Homeland Security & CISO State of Arizona
Frank J. Grimmelmann, President & CEO, Arizona Cyber Threat Response Alliance, Inc. (ACTRA)

Ryan Murray joined the Arizona Department of Homeland Security in July 2021 and currently serves as the Deputy Director over Cyber Command and as the Interim Chief Information Security Officer for the State. He also previously served as the Chief Information Security Officer for the Arizona Department of Revenue for three and a half years. In his current role, Deputy Director Murray provides tactical and operational leadership for Cyber Command, and strategic planning, facilitation, and coordination of cybersecurity efforts throughout the State.

Frank J. Grimmelmann serves as President & CEO for the Arizona Cyber Threat Response Alliance (ACTRA), a non-profit entity that was developed collaboratively with the Arizona InfraGard Program, the FBI, USDHS, and law enforcement, and independently launched in 2013 to enable its private/public sector member organizations across all critical sectors to enable themselves to respond to the escalating national cybersecurity threat.

[1 CPE] Global Insights on Identity Security Maturity: Why it Matters? Why Now?

  Presented by Brian Roberts, Sr Solutions Engineer • CyberArk

In our global survey of 1,500 identity-related security experts, we found only 9% of organizations have the highest level of maturity. These Transformative organizations have the most mature identity security programs as they strategically focus on four key tenets: tools, integration, automation, and continuous threat detection & response. As a result, these organizations significantly outperform their competition in driving business outcomes and reducing risk. Learn how you can mature your identity security program because the future of security starts with identity.

Key Session Takeaways:

  • Top challenges for identity security
  • The four tenets of identity security
  • How to take a holistic approach to identity security
  • Key considerations in evaluating identity security providers

Brian Roberts is a motivated, technically-minded individual with 12 years of solutions engineering experience ranging from backup and disaster recovery to identity security. He primarily focuses on Privilege Access Management and Least Privilege Enforcement with self-hosted and cloud assets.

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Eric Vanderbur, Global Solutions Architect • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Eric Vanderbur, Global Solutions Architect • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

[1 CPE] The Human Factor: Quantifying Human Risk

  Presented by Sara Anstey, Director of Data Analytics and Risk  • Novacoast

This talk will explore the growing field of human risk management and quantification, diving into the next step in an organization’s risk journey: quantifying people. We will discuss where the market is, how people are adopting it, and what organizations can gain from human risk management.

Join this session on the emerging and evolving field of human risk quantification, which aims to apply quantitative methods to assign risk scores to every employee at a company based on their actions and access. This space is very similar to where cyber risk quantification was about 4 years ago when there were a few start-ups in the market and a few active voices on LinkedIn advocating for the adoption of these practices. Now, human risk quantification is an organizational priority. Having done extensive research into where the players in the market are and how companies utilize these strategies, human risk quantification has become the next step of a risk journey for many companies. Over 80% of breaches involve the human element –– if organizations want to stop them, they need to understand how the people they employ affect their security posture.

[1 CPE] Zero Trust for More than a More Secure Future

  Presented by Chad Haskell, Sr Solutions Architect • Barracuda & BlackPoint IT

Like many relatively new technologies, Zero Trust has a reputation for being complex, and difficult to configure and manage. But it’s clearly gaining traction. Gartner predicts that more than 60% of organizations will embrace zero trust as a starting place for security by 2025. Attend this information-packed session and get answers to all your questions about how it works, why you need it, and how many of you are already implementing it in one way or another. We’ll cover the stages of a successful Zero Trust implementation — seed, sprout, and bloom — and how easily you can use it to secure access to all your network resources, data, and applications.

[1 CPE] Adversaries for Hire!

  Presented by Steven Massey, Regional Sales Manager • Secureworks & Dell

By exploring modern threat tactics, tooling, and anonymized cases from Healthcare, Critical Infrastructure, and Finance sectors, this talk aims to equip participants with insights into how adversaries operate, enhancing their ability to secure their organizations against breaches and cyber-attacks.

By incorporating various skillsets from active operations, Secureworks has amassed a wealth of offensive knowledge and tradecraft that allows our operators to perform complex offensive security engagements and provide remediation advice and controls to businesses of all types and technologies.

[1 CPE] One Click Away: Lateral Movement Stemming from Office 365 Compromises

  Presented by Wayne Johnson, CEO • Stellar Technologies

In the rapidly evolving digital age, the security of cloud-based platforms like Office 365 is paramount for businesses worldwide. “One Click Away: Lateral Breaches Stemming from Office 365 Compromises” delves into the hacker’s mindset, unveiling how the hack occurs (LIVE DEMONSTRATION) and how a seemingly minor compromise can trigger a cascade of security breaches with profound implications for businesses. This presentation will explore the multifaceted threat landscape of Office 365, Active Directory, SAML, and SSLVPN, illuminating the pathways through which a simple breach can spread across an organization’s digital ecosystem. Attendees will gain insight into the initial indicators of compromise, empowering them with the knowledge to detect early signs of infiltration. By emphasizing preventative measures and best practices, the session aims to equip participants with robust strategies to safeguard businesses from everyday threats. Furthermore, it will outline effective incident response and mitigation strategies, providing a blueprint for responding to breaches with precision and agility. The presentation will also underscore the far-reaching consequences of breaches, from operational disruptions to severe financial and reputational damage, highlighting the critical need for a proactive and informed approach to cybersecurity in the era of cloud computing.