[1 CPE] Taking A Data-First Approach to Cyber Risk Management

  Presented by Austin Starowicz, Director, Solutions Consulting • Mastercard Cybersecurity

Cyber Risk Management has evolved. Every new vulnerability or regulation adds further pressures on already stretched teams to predict and manage the weakest links within your internal IT infrastructure. Piling on to today’s cyber risk landscape is the ever-expanding digital supply chain, and the need to onboard, assess, and monitor third parties, fourth parties, and Nth parties.

But does it really have to be that way?

Join this session from Mastercard Cybersecurity for an exclusive presentation on how a proactive “data-first” approach to cyber risk management can help you:

  • Improve monitoring for critical vulnerabilities to determine which ones really matter
  • Identify, Prioritize and Assess affected third parties in real-time
  • Leverage objective risk data into the decision-making processes
  • Streamline workflows and scale your operations

[1 CPE] Go Hack Yourself: War Stories from over 170,000 Pentests

  Presented by Tony Taylor, Sr Solutions Architect • Horizon3.ai

Join Tony Taylor, Senior Solutions Architect, for an engaging session on “Offense-Driven Defense.” Raakish will challenge conventional risk assessment practices and unveil how focusing on real-world exploitability and impact can revolutionize your security approach. Drawing from insights gathered across more than 170,000 autonomous pentests, he’ll share compelling stories and actionable lessons that show how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and strengthen your defenses against advanced threats. Don’t miss this opportunity to learn from a leading industry practitioner on why it’s time to “go hack yourself” and build resilience in today’s borderless threat environment.

[1 CPE] Bridging Zero Trust and SASE: A Unified Approach to Modern Cybersecurity

  Presented by Fortinet

This will be a panel discussion on how organizations can effectively bridge Zero Trust and SASE to create a unified, adaptive cybersecurity architecture that meets the demands of today’s hybrid workforce and threat landscape.

Key Takeaways:

  • Understand the core principles of Zero Trust and SASE, and how they complement each other.
  • Learn practical strategies for implementing a unified approach without adding complexity or disrupting operations.
  • Gain insights into real-world use cases and lessons learned from organizations successfully integrating these frameworks.

Moderator: Michael Lippman, Regional Channel Systems Engineer, Fortinet

Speakers:

  • Brahma Moholkar, Systems Engineer, Fortinet
  • Christian Ruediger, Account Manager, Fortinet
  • Greg Still, CEO, Xiologix

[1 CPE] Identity for Today and Tomorrow

  Presented by Jim Gerken, Director of Identity Services • Novacoast

What is the minimum for an Identity Program that will meet today’s needs and continue working tomorrow? You may be part way there; you may have all the tools and use them wrong; you may have no tools, but all the right processes. We haven’t met anybody who doesn’t have problems…

Learn about the core services you need to put in place, whether process or tool, to secure your identities and, since “Identity is the New Perimeter,” secure all of your resources and data. Learn what changes are coming in the Identity space so you can improve the future viability of your core Identity Services and protect those investments.

[1 CPE] Latest Data Breaches, Quantum Computing, External Key Management in the Cloud

  Presented by Steven Gautier, Principal Solutions Architect • Thales

Welcome to our session on modern data threats and protection strategies. As cyber risks evolve, securing sensitive information is more critical than ever. We’ll explore how encryption and key management can help protect your most valuable assets, especially in cloud environments.

We’ll highlight the benefits of external key management, offering greater control and compliance. Additionally, we’ll touch on the growing impact of quantum computing—and why it’s vital to start preparing now.

Join us to discover the latest advancements in data security and learn how to stay ahead of emerging threats.

[1 CPE] Real-Time Threat Mitigation with AI-Driven SASE: A Practical Approach

  Presented by Cato Networks

In this session, we’ll explore how a converged SASE platform combined with AI and machine learning (ML) enables real-time threat detection and mitigation, transforming network security from a reactive to a proactive model. The focus will be on how AI-driven solutions within the SASE framework can identify, analyze, and neutralize security threats in real-time across distributed environments.

[1 CPE] Beyond MFA: Architecting True Identity Resilience for the Modern Enterprise

  Presented by Rubrik

In the interconnected digital landscape, identity is the new perimeter. Yet, organizations frequently struggle to move beyond basic multi-factor authentication (MFA) and effectively solve the fundamental challenge of Identity Resilience—the ability to maintain business continuity and security even when identity systems or accounts are inevitably compromised.

This forward-looking session is tailored for CISOs and security architects ready to transition from traditional identity management to a proactive resilience model. We will dissect the modern identity threat landscape, driven by supply chain risks and large-scale PII exposure, and provide tangible frameworks for securing the enterprise.

[1 CPE] Don’t Panic: A Blueprint for Securing Your Data in the Age of AI

  Presented by Palo Alto Networks

It’s a fact: AI can unintentionally expose sensitive data. From customer engagement to back-office automation, intelligent systems are being deployed at such a rate that it’s not a matter of “if my data is exposed,” but “when.” In recent conversations with practitioners, it’s clear that security has shifted from an afterthought to a board-level priority. Organizations are standing up AI governance boards, drafting usage policies, and in some cases even blocking applications altogether to prevent potential data leakage.

Effective protection against AI data leakage starts with visibility. Organizations need the ability to inspect both the prompts entering an AI system and the responses coming back, so that sensitive information can be detected and stopped in real time before it leaves the enterprise. In this session, we’ll guide you through a blueprint that can help ensure your AI applications are secure, compliant, and trustworthy.

[1 CPE] Securing AI Without Slowing Innovation: A Blueprint for the Future of Cybersecurity

  Presented by Scarlett Menendez, Solutions Engineer • Trend Micro

AI is transforming the enterprise—bringing new opportunities for efficiency, but also introducing unprecedented risks. From prompt injection and model poisoning to shadow AI and deepfakes, the attack surface is evolving faster than most IT teams can keep up. In this session, we’ll explore Trend Micro’s Security for AI Blueprint, a step-by-step framework for protecting data, models, infrastructure, and users in an AI-driven world. You’ll also see how Trend Micro leverages AI across its own cybersecurity platform, combining decades of research with modern generative AI to deliver proactive protection. Walk away with practical strategies you can apply to safeguard your organization’s AI initiatives—without putting innovation on hold.

[1 CPE] Cybersecurity: Emerging Threats & Defenses

  Presented by Jim Ambrosini, Director of Advisory Services • CompassMSP

In this session, cybersecurity expert Jim Ambrosini will cover critical topics, including the evolving nature of cybersecurity threats, emerging defenses against these threats, and the role of senior management in enhancing cybersecurity. You will learn about recent high-profile breaches, the factors contributing to increased risks, and practical strategies for identifying vulnerabilities and responding to incidents effectively. This session will delve into the implications of artificial intelligence on cybersecurity, threats such as ransomware and deepfakes, and the importance of robust cybersecurity governance. Case studies will provide real-world insight into breach responses, highlighting effective measures and mistakes made while emphasizing the need for continuous monitoring and proactive risk management.