[1 CPE] Zero Trust—Let’s Dive into Security

  Presented by Kevin Heide, Director of Enterprise Networking • Cerium Networks

Spend the morning with us while we explore the world of Zero Trust Architecture—but with a twist. Instead of a high-level overview of this strategic cybersecurity approach, we’ll get hands-on and show you practical examples using tools and environments that most of us are already familiar with.

Buckle up and join us on this exciting journey as we learn how to integrate different elements and policies across our organizations. We’ll also focus on optimizing our policies and enhancing threat protection.

[1 CPE] Beyond the Backup: A Guide to Resiliency Program Development

  Presented by CompuNet

If you follow the news, it is easy to see – disruptive events affecting critical business operations are becoming more prevalent. In this presentation, our guests from CompuNet will step through a comprehensive framework for Business Continuity & IT Disaster Recovery Program development, highlighting methodology that integrates with cybersecurity risk management and builds upon the capabilities of an organization’s backup strategy. For context, CompuNet’s presenters will examine the technical and non-technical challenges organizations may face during cybersecurity events and how resiliency planning can help mitigate those challenges..

[1 CPE] The Trek Toward Zero Trust

  Presented by Travis Light • Cybersecurity Advisor, CISA

You have heard the buzz phrase “zero trust”, but what exactly is it? Join Travis Light for a breakdown of zero trust using a case study that highlights the pitfalls of the traditional “castle-and-moat” perimeter approach to network design. He’ll also discuss CISA’s zero-trust Maturity Model (ZTMM) 2.0. The ZTMM is a roadmap that organizations can follow as they transition towards a zero-trust architecture.

Travis Light serves as a Cybersecurity Advisor (CSA) in Montana for the Integrated Operations Division (IOD) of the Cybersecurity and Infrastructure Security Agency (CISA). He supports the CISA mission of strengthening the security and resilience of the nation’s critical infrastructure in Region VIII. His daily responsibilities include coordinating cyber preparedness information sharing and collaboration, developing risk mitigation strategies, responding to cyber incidents, and providing cyber security resources including conducting strategic and technical assessments.

Before joining CISA in January 2023, Travis spent nine years as a federal employee with the Montana Army National Guard (MTARNG) in a variety of technical positions covering network administration, enterprise architecture, telecommunications infrastructure, database administration, and information systems security for classified and unclassified enclaves in the Regional Network Enterprise Center and the state’s Data Processing Center.

Travis holds numerous professional industry certifications including GIAC Security Leadership Certification (GSLC), GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Examiner (GCFE), Cisco Certified Network Associate (CCNA), Cisco Certified Design Associate (CCDA), ITIL 4 Foundation, CompTIA Secure Infrastructure Specialist, and CompTIA Project+. He has earned a Bachelor of Science in Network Operations and Security from Western Governors University.

[1 CPE] Don’t Pay the Ransom

  Presented by Rubrik

The Rubrik team will provide an overview of what they are seeing in the market. What questions data protection teams and IT leaders are being asked concerning the uptick in cyber events. We will pull back the curtain to explain how Rubrik detects ransomware, identifies sensitive data, and searches for indicators of compromise with threat hunting. If time allows, we will dive into the Rubrik interface and show you how we accomplish this in a single secure interface.

[1 CPE] Create a Safe Security Culture

  Presented by Lynn Soeth, Service Manager, Security Services • High Point Networks

You have a company-wide security culture. Is it a positive one? A safe security culture includes practices, policies, and attitude that prioritize the protection of sensitive information and the well-being of team members. It involves creating a positive environment where everyone feels empowered to ask questions and report potential security incidents. Using real world situations, let’s look at how you can actively participate in and grow a safe security culture at work and home.

[1 CPE] Supply Chain Attacks: Who’s at Risk and How Can You Stop Them

  Presented by EverFast & High Wire Networks

Supply chain attacks are increasingly in the news as more businesses are impacted by third-party vendors being used to circumvent the businesses’ defenses to propagate ransomware and digital extortion. Most companies today leverage some type of third-party software for business operations. Join us as we discuss the risk of supply chain attacks, recent breaches and how you can defend your enterprise.

  • What is a Supply Chain attack?
  • How do they work – postmortem
  • Who is at risk?
  • What’s the current threat condition?
  • How can you stop supply chain attacks from impacting your business?

[1 CPE] The Ransomware Recovery Puzzle

  Presented by Peter Martinson, Sr Security Engineer • Sanity Solutions

We all hear about ransomware on the news but are we prepared to deal with it? Join us as we talk through real-life case studies of companies that have gone through ransomware attacks and learn how the process works.

  • Timeline of an attack
  • Recovery of Systems
  • To pay or not to pay
  • Legal concerns
  • Cyber Insurance

We will look at all the pieces of the puzzle and see if we can’t form a picture.

[1 CPE] Building a Ransomware Resilience Strategy

  Presented by 11:11 Systems & Zerto

Ransomware attacks are affecting every industry and every size organization with the threats of downtime, data loss, reputation damage, and more. You can protect your organization from these threats by building ransomware resilience into your IT infrastructure. As ransomware threats evolve, so do the available technologies to protect your organization, and having a ransomware resilience strategy is more important than ever. In this session, we will discuss how:

  • The threat of ransomware has become systemic in data recovery planning
  • Prevention alone is not enough, and recovery alone is not enough
  • A ransomware resilience strategy relies on early detection to be effective
  • Air-gapped and isolated recovery are critical for ransomware resilience
  • Speed of recovery and minimal data loss recovery prevent ransom payments

[1 CPE] 2023: The Year AI Went Mainstream

  Presented by Randy Lariar, Practice Director, Big Data & Analytics • Optiv

AI is accelerating the risk of fraud, but it can also be used to prevent and detect fraud. Companies need to be aware of both the risks and the benefits of AI and develop an offensive and defensive strategy to protect themselves from fraud. During the talk, we’ll touch on:

  • The recent history and latest developments in Generative AI, Large Language Models, ChatGPT, GPT-4, Google Bard, and more
  • How AI is increasing Risk already
  • How AI introduces new kinds of Risk
  • How AI can help solve some of the problems AI creates
  • Approaches for building an offensive & defensive Data and AI strategy

[1 CPE] Defend Today, Secure Tomorrow

  Presented by John Bryant • Cybersecurity Advisor, CISA

Join John Bryant, CISA Cybersecurity Advisor, for a discussion of the evolution of Ransomware, beginning with the first reported incident to the present. Bryant will provide a high-level overview of one incident followed by a look at the lessons learned. Learn about the Department of Homeland Security’s (DHS) youngest agency, the Cybersecurity and Infrastructure Security Agency (CISA), and resources available at “no cost” to State, Local, Tribal, and Territorial governments and organizations with critical infrastructure.

John Bryant serves as a Cybersecurity Advisor for Region 7 (IA, KS, MO, and NE) for CISA in the Integrated Operations Division. Based in Kansas City, Missouri he supports the Department of Homeland Security’s mission of partnering with industry and government to understand and manage risk, strengthening the security and resilience of the nation’s critical infrastructure. He is the lead in Region 7 for DHS/CISA’s K12 cybersecurity working group. Mr. Bryant provides Cybersecurity resource briefings, Cybersecurity assessments, and Incident Response planning to the nation’s sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities.

Bryant holds a Master of Business Administration with an emphasis in Organizational Development and a Bachelor of Science in Computer Information Technology from Upper Iowa University. He is a member of (ISC)2 and is a Certified Information System Security Professional (CISSP) in good standing for the past 10 years.