[1 CPE] How to Simplify and Secure Your Network & What You Need to Know About Wi-FI 6e

  Presented by Jerry Yarborough, Sr SLED Account Executive • Extreme Networks

During the presentation, we will discuss how to simplify your network and make it more secure by using the IEEE standard 802.1aq. We explain the standard, and how it is easier to use than traditional networking and much more secure. We will demo its simplicity and what makes it secure.

We will then move into Wifi 6e and how it is changing the way we must look at wireless deployments. We will discuss all the changes that it has brought us and what we must be planning for with the higher speeds that we will be able to achieve.

[1 CPE] Seeing Your Attack Surface Through the Eyes of an Adversary

  Presented by Terry Hillis, Systems Engineering, Cortex • Palo Alto Networks

The best way to manage exposure, reduce risk, and improve your security posture is to understand your attack surface through the eyes of an attacker. We’ll demonstrate how to reduce the frequency and severity of your security incidents without additional analysts or efforts and help your organization actively discover, learn about, and respond to unknown risks in all connected systems and exposed services. Learn how you can boost your Attack Surface Management (ASM) with visibility into your on-prem and cloud-based internet-connected assets and recommendations on prioritized actions so you can better defend your organization.

In this session, you will learn about:

  • Trends influencing the modern attack surface
  • How you can build an up-to-date version of your attack surface to include both known and unknown assets
  • Streamline your Attack Surface Management (ASM) program with Unit 42 security expertise and threat intelligence
  • Reduce risk with actionable recommendations from Unit 42 Incident Response (IR) experts
  • Discover shadow IT infrastructure, identify assets vulnerable to CVEs, and gain prioritized recommendations to remediate potential threats before they are exploited

[1 CPE] ChatGPT Did NOT Write This Topic (or did it?)

  Presented by Brian Knopp, Principal Security Engineer • Arctic Wolf

Are “AI” and Machine Learning tools like ChatGPT having an impact on cybersecurity? This session will examine the top attacks looking back on 2022. We’ll define them by quantifiable impacts, like affected individuals, cost, and data breaches. We’ll also discuss key sociological and economic factors that increased vulnerabilities in 2022, identify industries that saw significant attacks, and summarize the top 5-6 data breaches and evaluate the impact of these threats on personnel retention and insurability, 2023 predictions, and the most common recommendations to improve your security posture.

[1 CPE] Zero-Trust Architectures

  Presented by Rubrik

Organizations have invested heavily in IT security, attempting to fortify their perimeter, network, endpoint, and application protections. Despite these investments, hackers are successfully penetrating these defenses and targeting enterprise data, including backup data. Ransomware is starting to specifically target online backups by encrypting or deleting them. If your organization was the target of an attack today, how do you know what data was impacted and where? Manually sifting through millions of files and comparing each snapshot consumes FTE time and prolongs recovery exponentially. Mass restores of the entire environment could mean high data loss and weeks’ worth of work down the drain. In this session, we will discuss how to protect your last line of defense, the backups. We will walk through the anatomy of a recovery, the best practices, and advanced tools to ensure you will not have to pay a ransom, and how to quickly recover your data to continue business operations.

[1 CPE] Modern Segmentation Architectures

  Presented by Tyler Conrad and Jeremy Georges • Arista Networks

In this presentation, we will explore the different network segmentation models available, including VLANs, VRFs, and group-based segmentation models.

We will begin with an overview of the different segmentation models and discuss their benefits and drawbacks. VLANs provide a simple way to segment traffic but do not scale well in larger environments. VRFs offer more robust isolation but can be complex to manage. Group-based segmentation models offer a flexible and scalable way to segment traffic based on the endpoint itself rather than the network. We will discuss the implementation and configuration of each of these models and provide examples of how they can be used in different scenarios.

Next, we will discuss how EVPN with either VXLAN or MPLS transport can be used as an attachment point to allow for segmentation to cross the network device boundary and become a network-wide policy.

Finally, we will compare the different models to help you choose the best segmentation approach for your network, as well as how to layer these together to have a more complete design. By the end of this presentation, you will have a better understanding of modern segmentation architectures and be equipped to make informed decisions for your network.

[1 CPE] Zero Trust Microsegmentation – It’s Easier Than You Think

  Presented by Sumi Gorla, Director of Systems Engineering • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

Sumi Gorla is the Director of Systems Engineering at Illumio. Her responsibilities include executing Illumio strategic product vision, field engineering enablement, and enterprise customer selling and support across US West. Prior to Illumio, Sumi has held several engineering and technical sales leadership roles in companies such as EMC, Brocade, Citrix, and BigSwitch Networks. As a sales leader, Sumi brings a unique approach to problem-solving, from both a technical and a business perspective. Sumi’s strengths are in her ability to explain how technical features can meet business requirements for all levels of audience.

[1 CPE] 40 Years in 40 Minutes – A Journey Through Cyber

  Presented by Grant Asplund, Growth Technologies Evangelist • Check Point Software

A journey through cyber – from stand-alone Apple II computers using PFS or Ashton-Tate software to today’s ubiquitous, always-on, hyper-connected, cloud-first computing. This session is a fun compilation of short stories and excerpts spanning four decades in the cyber industry. Grant will discuss the transition from single systems to networking to the internet… and how cyber security has evolved from securing virtually nothing to virtually everything. Grant will also share his thoughts on the constantly evolving threat landscape including IoT, Cloud, and the still-reigning champion, Email. Finally, Grant will offer considerations for improving your overall security posture today as well as future trends… you’ll even have a chance to win some cash.

[1 CPE] Protecting Your Data from Ransomware Where it Lives: Your Last Line of Defense

  Presented by Nik Lainus, Sr Solution Consultant • Hitachi Vantara

If an attack happens and makes it all the way to your data, then they have already broken through all your walls. Where your data lives IS your last line of defense, which is why the Armed Forces that protect the USA trust Hitachi to protect them. Prevention is great but without that last line of defense, you’re a sitting duck. Attend this session to learn how Hitachi serves as your last line of defense against ransomware attacks.

[1 CPE] Why is Critical Data Being Compromised?

  Presented by Benjamin Longuechaud, Sr Sales Engineer, Thales Cloud Security  • Thales Group

Securing critical data and information was where this industry started a long time ago, but it became more challenging with the rapid growth of enterprise data in an interconnected world. The pandemic forced organizations to support a remote workforce and expose critical systems that were once only accessible from inside the company’s network. We’ve increased the attack surface and the number of vulnerabilities which has led to more data breaches. With the technology advancements in access management, data discovery and encryption we can once again shift the focus to securing our data and information. In this presentation, we will discuss a unified data-centric security approach and strategy to protecting your most critical data and information.

Benjamin Longuechaud is a Senior Sales Engineer for Thales Cloud Security, the world-wide leader in data security, hardware and software encryption. Benjamin started his career as a Software Engineer developing Cloud-based applications before training and supporting software development teams. He recently joined Thales to focus on creating security strategies to Discover, Protect and Control data wherever it resides.