[1 CPE] The InfoSec Talent Shortage That Wasn’t

  Presented by Critical Start

The experts agree: there isn’t nearly enough cyber security talent out there. But what if all the experts, news stories, conference talks, and board room conversations are wrong? What if there is more than enough cyber security talent to get organizations what they need to be successful, secure, and in a reasonable budget? In this presentation, Critical Start’s Senior Security Consultant, Alex Humphrey, will discuss ways to hire, train, and retain great cyber security talent, move business objectives forward, and keep the organization secure – all without breaking the bank.

[1 CPE] Let Policy Guide Your Team

  Presented by CompuNet

This discussion will cover a set of policies that will address the necessary functions to implement a standard Information Security Management System (ISMS) which aligns with the National Institute of Standards and Technology (NIST) Framework for Cybersecurity and provides for compliance with most statutory requirements.

[1 CPE] Protecting Your Data from Ransomware Where it Lives: Your Last Line of Defense

  Presented by HItachi Vantara

If an attack happens and it makes it all the way to your data, then they have already broken through all of your walls. Where your data lives IS your last line of defense, which is why the Armed Forces that protects the USA trusts Hitachi to protect them. Prevention is great and all but without that last line of defense, you’re a sitting duck. Attend this session to learn how Hitachi serves as your last line of defense against ransomware attacks.

[1 CPE] How AI Powered Solutions Improve End User Network Experience

  Presented by Structured & Aruba Networks

User Experience Insights: Organizations of all sizes are increasingly focused on improving line-of-business and end-user experience. Managing distributed or remote locations adds complexity and can quickly consume resources. Continuous growth of mobility, IoT and cloud apps highlights the importance of operating your network with the most complete view possible. This session will introduce new tools to help engineers, managers and CTOs understand the experience that people are having on their network. Join us to learn how User Experience Sensors can be deployed in minutes, have a low entry cost and work on any vendor’s network.

[1 CPE] Practice Good Cyber Hygiene: Adopt a Framework to Protect Your Enterprise

  Presented by CompuNet

A cybersecurity framework helps businesses develop a structured approach to securing their systems. This session will focus on the practical implementation of security measures; how to prioritize and get the maximum benefit from your resources. The discussion will be framed around the Center for Internet Security’s Critical Controls, although several frameworks will be briefly discussed. The focus will be on protecting against ransomware while still taking a holistic approach. The discussion will be directed from the management or IT governance direction rather than from an engineering or systems approach.

[1 CPE] Challenge the Threat of Ransomware: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Ransomware attacks continue to rise in volume, severity, and costs to businesses attacked while cyber criminals continue inventing new and unexpected methods to spread malware and encrypt critical data. As attacks continue to specialize, no organization is immune to ransomware. So how do you avoid being forced to pay a ransom, disruptions to services and supply chains, and damage to your brand in the news? Join recovery and data protection experts from Zerto to discuss best practices for when – not if – ransomware strikes. Be prepared to minimize downtime, data loss, and mitigate the risks of ransomware. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • Steps you can take to reduce the likelihood of attacks on your system
  • How to choose a best-in-class recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recover quickly
  • Real example of a company hit twice by ransomware and how they improved recovery time from weeks to minutes by planning ahead

[1 CPE] Is DDoS a Crime?

  Presented by Radware

2022 has a serious “DDoS is a not a crime” vibe. A little over two months ago, performing Distributed Denial-of-Service (DDoS) attacks was not without consequences. Today, because of recent escalations in conflict, a more significant percentage of the general public believes that DDoS attacks are not a crime if they are morally aligned and part of a socially acceptable operation. But is this true? ….and what led to this current perception?

[1 CPE] Pure SOC Fury: The Cybersecurity Book of Bad Decisions

  Presented by Arctic Wolf

Join this presentation for insights taken from the frontlines of security operations. The session will draw on experiences and observations from real-world incidents and interesting SOC data points and trends. There are four broad bad decisions that we see being played out, time and again, across cybersecurity and from which everyone can and should learn. Arctic Wolf will show how a focus on Security Operations aligned with outcomes that matter to you will position you to start your journey toward ending your cyber risk.

[1 CPE] Active Defense: Be the Hunter, not the Prey

  Presented by AQUILA

In this session, we’ll discuss Active Defense and why it’s a critical part of any mature security program. Active Defense requires continuous monitoring, threat hunting, and incident response. We will focus specifically on internal threat hunting and monitoring of the dark web. Join to gain an understanding of what active defense is, what threat hunting is, and the wealth of intelligence that can be found on the dark web.

[1 CPE] Stopping Attacks, Not Your Business: AI & Autonomous Response

  Presented by Darktrace

With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join this session to explore the benefits of Autonomous Response as a must-have that goes beyond ‘defense,’ including real-world threat finds and attack scenarios.