[1 CPE] Zero Trust Begins with Identity

  Presented by Sami Laine, Director of Technology Strategy • Okta

IAM didn’t rank in the NASCIO priority list before 2019 but has now moved up to #5 and will continue to climb. Yet, many State and Local Government entities find it difficult to articulate a comprehensive IAM strategy and governance framework. To address challenges posed by legacy applications, technical debt, and organizational inertia, a vision of Identity as a Platform can allow for rapid adoption, improved user experience, reduced administrative burden, and contribute to your Zero Trust initiatives. Join this session to:

  • Understand the value of a platform approach to IAM
  • Learn how to enhance existing investments in Microsoft, Duo, and other security solutions
  • Improve cross-functional relationships and employee on/off-boarding

[1 CPE] Dark Web Monitoring: It’s time for an Offensive Strategy!

  Presented by Jeff Simpson, Sr Sales Executive, Cybersecurity Solutions • AT&T Alaska

Many organizations discover a cybersecurity breach many months later, too late for any substantial mitigation. With the average cost of breaches in the US at $9.4M, (without including ransom paid), it is advisable for organizations to take a more offensive stance. What if there was a way to detect compromised corporate credentials well before they were used to cause widespread fraud? Dark Web Monitoring goes where cybercriminals traffic stolen emails, usernames, and passwords, and can alert an organization if personal or corporate user information shows up in the Darknet layers. Learn how using a tool like this can help protect an organization’s employees, consumers, and vendors, as well as its reputation.

[1 CPE] Security Service Edge (SSE) is redefining Cloud, Data, and Network Security

  Presented by Netskope

The inversion effect of cloud applications, users, and data outside of the corporate network, along with the new hybrid workforce, demands a new approach to IT security and network architecture. Cloud application traffic has overtaken web traffic in the enterprise, creating blind spots and complexity with existing legacy security and network solutions that were designed for access to data centers through on-premises security stacks. These challenges demand a new approach to cloud security that delivers the simplicity and agility for access, security, and performance that businesses need for their successful digital transformation journeys while securing their critical data assets and embracing zero-trust principles. They also demand an intelligent solution approach based on a converged, cloud-native architecture.

[1 CPE] Seeing Your Attack Surface Through the Eyes of an Adversary

  Presented by Kraig Faulkner, Channel Systems Engineer, Cortex • Palo Alto Networks

Modern attack surfaces are dynamic. Without clear visibility that is constantly updated, it is all too easy to have persistent exposures and unmanaged assets. Security practitioners can only be as good as the data they have, so having a strong foundation of continuous discovery and monitoring ensures you can keep up with modern, dynamic attack surfaces in order to find, prioritize, and mitigate exposures as they arise.

[1 CPE] 40 Years in 40 Minutes – A Journey Through Cyber

  Presented by Grant Asplund, Growth Technologies Evangelist • Check Point Software

A journey through cyber – from stand-alone Apple II computers using PFS or Ashton-Tate software to today’s ubiquitous, always-on, hyper-connected, cloud-first computing. This session is a fun compilation of short stories and excerpts spanning four decades in the cyber industry. Grant will discuss the transition from single systems to networking to the internet… and how cyber security has evolved from securing virtually nothing to virtually everything. Grant will also share his thoughts on the constantly evolving threat landscape including IoT, Cloud, and the still-reigning champion, Email. Finally, Grant will offer considerations for improving your overall security posture today as well as future trends… you’ll even have a chance to win some cash.

[1 CPE] Cybersecurity Trends for 2023

  Presented by Jeff Simpson, Sr Sales Executive, Cybersecurity Solutions • AT&T Alaska

With Cybersecurity compliance mandates increasing, and attacks on vulnerable supply chains and endpoints on the rise, it has never been more important to assess and take proactive measures to secure your network. This presentation pulls together information from many different analysts and digests their views on which Cybersecurity priorities your organization may face this year, along with the top eight cybersecurity trends for 2023, such as Supply Chain Resilience, Security Architecture Modernization and Data-Centric Transformation.

[1 CPE] Law Enforcement and Cyber Incident Response: How We Can Be Allies

  Presented by Kevin Hinrichs • FBI Special Agent, Cyber Squad

To successfully build a plan for addressing cyber threats, organizations need to know when and how to engage law enforcement. Oftentimes addressing law enforcement is seen as a barrier or a complication for incident handling. Law enforcement should be viewed as an asset and ally in the fight against cyber threats. For companies looking for insight into exactly what they are facing, this cooperation can fill a crucial need. The presentation aims to shed light on what it really means to work with law enforcement, and how that work can be mutually beneficial to both parties.

Special Agent Kevin Hinrichs is a 12-year Alaska resident who spent 13 years in the control system industry as a software developer before joining the FBI. He previously worked as lead developer for a software suite focused on critical condition management across a vast array of ICS/SCADA platforms. Since pivoting to work for the FBI, Special Agent Hinrichs has been assigned to the Cyber Squad in Anchorage where he works on a range of cyber issues including BEC, insider threat, hacktivism, nation-state threats, and has extensively focused on the ransomware threat, specifically enterprise ransomware. Special Agent Hinrichs has a Bachelor’s Degree from the University of Houston in Computer Science and Mathematics. Among the roles Special Agent Hinrichs fulfills for the FBI Anchorage office are the InfraGard Coordinator position for the Alaska InfraGard Chapter, the primary point of contact for ICS/SCADA issues, and the subject matter expert for cryptocurrency.

[1 CPE] How to Simplify and Secure Your Network & What You Need to Know About Wi-FI 6e

  Presented by Jerry Yarborough, Sr SLED Account Executive • Extreme Networks

During the presentation, we will discuss how to simplify your network and make it more secure by using the IEEE standard 802.1aq. We explain the standard, and how it is easier to use than traditional networking and much more secure. We will demo its simplicity and what makes it secure.

We will then move into Wifi 6e and how it is changing the way we must look at wireless deployments. We will discuss all the changes that it has brought us and what we must be planning for with the higher speeds that we will be able to achieve.