[1 CPE] The State of the Cyber Insurance Market: How to Plan for Uncertain Future

  Presented by Arctic Wolf

Organizations have come to rely on cyber insurance to mitigate the impact of increasingly sophisticated, disruptive, and widespread cyber-attacks. As a result, insurers are issuing more policies, and the amounts of protection available are increasing. In 2020, the global insurance community saw the first cyber insurance program that exceeded $1 billion in coverage.

Join this session to hear why:

  • Insurers are rethinking cyber coverage and claims in the wake of increasingly aggressive cyber-attacks.
  • Businesses are likely to see their cyber insurance premiums increase, or even see some cyber security coverage dropped entirely.
  • Leaders should consider risks and mitigation strategies as they assess their readiness and liability when it comes to breaches or attacks.

[1 CPE] Navigating Today’s Threat Landscape: A Current State of Cybersecurity

  Presented by Fortinet

Join this session for a comprehensive look at the current state of cybersecurity. Today’s ever-evolving threat landscape requires an integrated, automated approach to security. Learn how you can mitigate risk in your organization, optimize your security team’s operations, and gain best practices to integrate and consolidate your security tools; whether you’ve taken a multi-vendor or single-vendor approach.

[1 CPE] Educating Your Guesses: How to Quantify Risk and Uncertainty

  Presented by Novacoast

Asking for a budget and justifying spending in cybersecurity departments can be a difficult task due to limited data and high uncertainty of future events. This talk will dive into quantitative risk analysis as it relates to cybersecurity: how to model uncertain events and understand financial risk. Attendees will see a first-hand demonstration of how quantitative modeling can be used to communicate risk and understand ROI. Attendees will walk away with the tools needed to present cyber risk as a dollar amount that can be easily understood by other business decision-makers at their company.

[1 CPE] 2022 Threat Review

  Presented by Malwarebytes

The Malwarebytes 2022 Threat Review is an annual report on the latest threats, attack trends, and privacy breaches impacting individuals, organizations, and national security. Researchers detail threat intelligence across operating systems and examine how privacy has shifted and the ways that cybercriminals and crimes are evolving. With a stronger understanding of the threat landscape, organizations and individuals can make more informed security and cyber-protection decisions.

[1 CPE] Digital Transformation is Built on a Foundation of APIs – But are Your APIs Secure?

  Presented by 42Crunch

APIs are the core building block of every enterprise’s digital strategy, yet they are also the number one attack surface for hackers. Traditional security and management approaches are failing every day as the scale and reach of API attacks increase. The time is now right for enterprises to consider a new end-to-end continuous approach to protecting their APIs. In this talk, you will learn how Global 2500 enterprises are embracing a positive security model combining shift-left and shield-right methodologies to protect their APIs throughout the API lifecycle.

[1 CPE] Building a Modern Cyber Security Program: Zero Trust

  Presented by Sanity Solutions

Join Chad Schamberger, Director of Cyber Security at Sanity Solutions, to discuss key guidelines for incorporating Zero Trust into your existing security posture. In this session, you’ll learn about enabling controls that follow the 7 disciplines of a Modern Cyber Security Program that will establish a Zero Trust Security Model.

[1 CPE] Visibility is Key: What You Need to Know About Cloud Migrations and Security

  Presented by ReliaQuest

The pace of cloud technologies adoption has left security operations teams scrambling to keep up with the change. Many teams are unsure how best to protect their business as sensitive data and assets move beyond the traditional enterprise perimeter.

Is cloud security different from traditional on-premises security and if so, what should you be aware of? How best should you approach it?

We address these questions and more on how best to secure your cloud environment. We will explore recommendations on how best to secure the world’s top cloud platforms and providers including Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, and multi-cloud environments.

[1 CPE] Accidentally Zero Trust

  Presented by Zscaler

Zero Trust is the latest buzz phrase in the industry that promises to be the panacea for the malware and ransomware challenges faced by enterprises today. Shifting to a Zero Trust Architecture strategy, however, can have major business operations benefits that go far beyond information security.

Join Brett James, Director of Transformation Strategy at Zscaler, as he recalls “accidentally” delivering a Zero Trust Architecture strategy for a global engineering and construction company that started life simply as a way to reduce capital expenditure and start using cloud.

[1 CPE] Zero-Trust Architectures

  Presented by Rubrik

Organizations have invested heavily in IT security, attempting to fortify their perimeter, network, endpoint, and application protections. Despite these investments, hackers are successfully penetrating these defenses and targeting enterprise data, including backup data. Ransomware is starting to specifically target online backups by encrypting or deleting them. If your organization was the target of an attack today, how do you know what data was impacted and where? Manually sifting through millions of files and comparing each snapshot consumes FTE time and prolongs recovery exponentially. Mass restores of the entire environment could mean high data loss and weeks’ worth of work down the drain. In this session, we will discuss how to protect your last line of defense, the backups. We will walk through the anatomy of a recovery, the best practices, and advanced tools to ensure you will not have to pay a ransom, and how to quickly recover your data to continue business operations.

[1 CPE] Leveraging Actionable Threat Intelligence to Improve Your Security Posture

  Presented by Fortinet

Dealing with advanced threats requires a strategic, proactive approach, and every network security strategy is only as good as the threat intelligence it is based on. Learn how actionable global threat intelligence data can enable your organization to move toward a proactive security posture. Strategically leveraging local traffic data analyzed with AI and Machine Learning, coupled with other key cybersecurity tools is essential for building a proactive approach. Join us to learn why organizations of all sizes require an integrated security architecture, to reduce the very real risks to business continuity, brand reputation, and operational disruption.