[1 CPE] The Intersection of AI and Cybersecurity

  Presented by Robbie Elliott, Head of Engineering, West & Eric Darancette, Security Engineer • Check Point

As artificial intelligence (AI) permeates our lives, it’s crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.

[1 CPE] Intelligent SSE: Secure Everything from Anywhere

  Presented by Matt Senechal, Regional Sales Manager • Netskope

This session will provide a technical overview of Security Service Edge (SSE), focused on the following topics:

  • Unintentional or unapproved data movement
  • Data protection for internal and external threats
  • Conditional and contextual access to safely enable cloud & SaaS applications
  • Protection from cloud-enabled SaaS and web threats
  • Work from anywhere with a secure, fast experience

You will walk away understanding the fundamentals of SSE and how it will benefit your business.

[1 CPE] How to Build a High Confidence Cyber Recovery Plan

  Presented by Bharath Nagaraj, Sr Technical Field Director  • Cohesity

In an era where data is both a prime asset and a target, the global cybercrime cost is expected to soar to $10.5 trillion USD by 2025, with ransomware attacks becoming more frequent. Despite this, 80% of organizations doubt their cyber resilience strategies. The importance of being prepared for “black swan” cyber events, which exploit new vulnerabilities and can cause overwhelming damage, is highlighted. Cohesity emphasizes the role of Generative AI in bolstering a company’s security by automating threat detection, ensuring compliance, and promoting collaboration across departments. This approach not only mitigates risks but also aligns with strategic IT resilience planning. In an upcoming discussion led by Cohesity’s Senior Technical Field Director, Bharath Nagaraj, insights into overcoming large organizational challenges, effective response strategies, stakeholder roles, and steps for integrating cyber resilience into IT strategies will be explored, aiming to instill confidence in recovery without succumbing to ransoms.

[1 CPE] Panel: Help is Here to Govern AI in Your Workplace!

  Presented by INTERFACE Advisory Council

Is generative AI a true hope, or is it all hype? Are you struggling to keep your end users protected from using AI tools that could cause security concerns? Is your data being protected from entering the AI space? These are just a few of the questions occupying the IT workforce today. While it may seem like a daunting task with no end in sight, there are others facing your challenges and wanting to share their experiences.

Our panel of local IT experts will share their experiences in what it takes to have a smart AI posture. We will discuss data governance, cyber security, and privacy concerns when it comes to AI in your workplace. Please bring your questions as well so you can get some guidance on the challenges you face today. Our esteemed panelists are some of the most experienced IT leaders in Hawaii and they want to share their experiences.

Panelists:

  • Rebecca Cal, Chief Data Officer, State of Hawaii
  • Randy Faatau, Vice President, Cybersecurity Architecture & Operations, First Hawaiian Bank
  • Vince Hoang, Chief Information Security Officer, State of Hawaii
  • Jodi Ito, Chief Information Security Officer, University of Hawaii

[1 CPE] Avoiding the Silver Bullet Fallacy Within Insider Threat Detection

  Presented by Damien Weiss, National Security Defense Strategist  • Splunk & Cisco

Damien Weiss is an insider threat specialist at Splunk, where he has been for the past seven years. He works to find ways for analysts to use a constellation of software tools to help find insiders faster. Over the past year, he has focused on using ML and LLMs to help identify those who are looking to harm others or themselves.

[1 CPE] Backup ≠ Cyber Recovery

  Presented by Rubrik

Legacy backups are vulnerable to attacks, can’t help you find threats, and force you to do wholesale restores that drag out recovery times. Rubrik Zero Labs found that only 5% of organizations were able to return to business continuity or normal operations within one hour of discovering a CyberAttack. A modern cyber recovery solution is critical for Security and IT teams to be cyber-resilient. Learn how you can make your data indestructible.

[1 CPE] Cybersecurity and Compliance For 2024

  Presented by Rob Wayt, Director of Governance, Risk, and Compliance • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI and security best practices. This discussion will focus on security solutions to these challenges, including penetration testing and zero trust implementations. Rob Wayt, Director of Governance, Risk, and Compliance at Structured will be the presenter.

[1 CPE] Foundations of Cybersecurity

  Presented by Mark Breunig & Troy Lofven • CISA

Cybersecurity is comprised of many aspects and fields. To build into the more advanced defenses, every organization must first develop a solid foundation in each area. This presentation will touch on the practical steps necessary to begin that approach.

Speakers:

  • Mark Breunig, Alaska Cybersecurity State Coordinator
  • Troy Lofven, Cybersecurity Advisor

Mark Breunig is the Cybersecurity State Coordinator in Alaska, representing the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). CISA serves as the nation’s risk advisor and collaborates with industry and government partners to strengthen the resilience of the nation’s critical infrastructure against cyber and physical risks. In this role, Mr. Breunig is a cybersecurity liaison between state and local government officials, critical infrastructure stakeholders, and the federal government and provides strategic planning, threat awareness, risk management advice, and incident response coordination.

Prior to joining CISA, Mr. Breunig served as the Chief Information Security Officer for the State of Alaska for two and a half years. As the Chief Information Security Officer, Mr. Breunig was responsible for strategic planning and design of the State’s cyber defense posture and operational management of the State Security Office. The State Security Office provided cyber security services for all departments within the State Executive branch. Prior to his role as the Alaska Chief Information Security Officer, Mr. Breunig was the IT Compliance Officer for the Municipality of Anchorage. He was responsible for the security of over 12,000 endpoints throughout the municipality and also oversaw the Records Management Office.

Overall, Mr. Breunig has more than two decades of professional experience in cybersecurity and information assurance in the government and private sectors.