[1 CPE] Looking to the Future: Threat and Security Trends for 2023

  Presented by Christopher Fielder, Field Chief Technology Officer • Arctic Wolf

According to global leaders, last year’s concerns are still top of mind, but forward progress is being made. The skill shortage is still a present pain point for most, while cloud security continues to be a major source of concern and the number of breaches pace steadily upwards.

Worry has now become action as organizations evaluate their weaknesses, increase budget plans, and proactively work against rising cyber threats. Join Arctic Wolf Field CTO Christopher Fielder as we review our research into the top threats and security trends businesses are facing along with predictions and guidance for the future.

[1 CPE] Open Source Developers Are Security’s New Front Line

  Presented by Neel Thakkar, Sales Engineer • Sonatype

Bad actors have recognized the power of open source and are now beginning to create their own attack opportunities. This new form of assault allows hackers to poison the well, where OSS project credentials are compromised, and malicious code is intentionally injected into open source libraries. In this session, Sonatype will explain how both security and developers must work together to stop this trend or risk losing the entire open source ecosystem.

  • Analyze and detail the events leading to today’s “all-out” attack on the OSS industry.
  • Define the future of open source in today’s new normal.
  • Outline how developers can step into the role of security to protect themselves and the millions of people depending on them.

[1 CPE] Panel: Has Security Awareness Been Forgotten?

  Presented by INTERFACE Advisory Council

With all the challenges of the last few years, IT departments have been tasked with keeping remote workers productive, protecting data, safeguarding networks, and many other tasks. Now that companies have solidified their in-office and remote working setups, security awareness needs to be revisited.

As we frequently see, many security issues come from insider threats. Whether intentional or accidental, network users still present a major security issue. Join the INTERFACE Salt Lake City Advisory Council for a discussion to offer some of the best tips to better protect from human errors. Local IT leaders will discuss their approaches, shares success stories, and discuss what else needs to be addressed. Bring your questions for an open conversation to try and help everyone better secure their network from internal threats.

Panelists:

  • Greg Pugh, Information System Security Officer/COMSEC Engineer, Space Dynamics Laboratory
  • Paul Tew, Information Security Officer, Snow College
  • Danny Yeo, Information Technology Director, Brigham Young University Life Sciences

[1 CPE] Zero Trust Microsegmentation – It’s Easier Than You Think

  Presented by Sumi Gorla, Director of Systems Engineering • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

Sumi Gorla is the Director of Systems Engineering at Illumio. Her responsibilities include executing Illumio strategic product vision, field engineering enablement, and enterprise customer selling and support across US West. Prior to Illumio, Sumi has held several engineering and technical sales leadership roles in companies such as EMC, Brocade, Citrix, and BigSwitch Networks. As a sales leader, Sumi brings a unique approach to problem-solving, from both a technical and a business perspective. Sumi’s strengths are in her ability to explain how technical features can meet business requirements for all levels of audience.

[1 CPE] The Ransomware Recovery Puzzle

  Presented by Peter Martinson, Sr Security Engineer • Sanity Solutions

We all hear about ransomware on the news but are we prepared to deal with it? Join us as we talk through real-life case studies of companies that have gone through ransomware attacks and learn how the process works.

  • Timeline of an attack
  • Recovery of Systems
  • To pay or not to pay
  • Legal concerns
  • Cyber Insurance

We will look at all the pieces of the puzzle and see if we can’t form a picture.

[1 CPE] Backup ≠ Cyber Recovery

  Presented by Rubrik

Legacy backups are vulnerable to attacks, can’t help you find threats, and force you to do wholesale restores that drag out recovery times. Rubrik Zero Labs found that only 5% of organizations were able to return to business continuity or normal operations within one hour of discovering a CyberAttack. A modern cyber recovery solution is critical for Security and IT teams to be cyber-resilient. Learn how you can make your data indestructible.

[1 CPE] Protecting Your Data from Ransomware Where it Lives: Your Last Line of Defense

  Presented by Spencer Tidwell, Hybrid Cloud Enterprise Architect • Hitachi Vantara

If an attack happens and makes it all the way to your data, then they have already broken through all your walls. Where your data lives IS your last line of defense, which is why the Armed Forces that protect the USA trust Hitachi to protect them. Prevention is great but without that last line of defense, you’re a sitting duck. Attend this session to learn how Hitachi serves as your last line of defense against ransomware attacks.

[1 CPE] Law Enforcement and Cyber Incident Response: How We Can Be Allies

  Presented by Kevin Hinrichs • FBI Special Agent, Cyber Squad

To successfully build a plan for addressing cyber threats, organizations need to know when and how to engage law enforcement. Oftentimes addressing law enforcement is seen as a barrier or a complication for incident handling. Law enforcement should be viewed as an asset and ally in the fight against cyber threats. For companies looking for insight into exactly what they are facing, this cooperation can fill a crucial need. The presentation aims to shed light on what it really means to work with law enforcement, and how that work can be mutually beneficial to both parties.

Special Agent Kevin Hinrichs is a 12-year Alaska resident who spent 13 years in the control system industry as a software developer before joining the FBI. He previously worked as lead developer for a software suite focused on critical condition management across a vast array of ICS/SCADA platforms. Since pivoting to work for the FBI, Special Agent Hinrichs has been assigned to the Cyber Squad in Anchorage where he works on a range of cyber issues including BEC, insider threat, hacktivism, nation-state threats, and has extensively focused on the ransomware threat, specifically enterprise ransomware. Special Agent Hinrichs has a Bachelor’s Degree from the University of Houston in Computer Science and Mathematics. Among the roles Special Agent Hinrichs fulfills for the FBI Anchorage office are the InfraGard Coordinator position for the Alaska InfraGard Chapter, the primary point of contact for ICS/SCADA issues, and the subject matter expert for cryptocurrency.

[1 CPE] How to Simplify and Secure Your Network & What You Need to Know About Wi-FI 6e

  Presented by Jerry Yarborough, Sr SLED Account Executive • Extreme Networks

During the presentation, we will discuss how to simplify your network and make it more secure by using the IEEE standard 802.1aq. We explain the standard, and how it is easier to use than traditional networking and much more secure. We will demo its simplicity and what makes it secure.

We will then move into Wifi 6e and how it is changing the way we must look at wireless deployments. We will discuss all the changes that it has brought us and what we must be planning for with the higher speeds that we will be able to achieve.