[1 CPE] The Rise of Secure Access Service Edge

  Presented by Bitglass

Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms are built for this exact moment.

In this presentation, you will learn:

  • The core components SASE
  • The functionality you need to secure cloud, web, and remote access use cases
  • Architectural considerations for SASE platforms

[1 CPE] How Zero-Trust Enables the Future of “Work from Anywhere” Secure Access

  Presented by Duo Security

The perimeter-focused security model of decades past is no longer adequate for securing the modern enterprise. Now, organizations must secure a mobile workforce using a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks — and this trend only accelerated during 2020’s global shift to remote work. Fortunately, a modern access strategy built on zero-trust fundamentals can defend today’s workforce while paving the way to a passwordless future. Attend this session to learn how the zero-trust access model works, reduce your reliance on passwords and risk of password-based attacks, and how to start planning and staging your zero-trust evolution today.

[1 CPE] Ransomware In Focus: How AI Surgically Contains the Threat

  Presented by Darktrace

In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom or shut down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad-ranging and destructive, with organizations taking days, weeks, or even months to recover.

But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? Join this presentation to learn how Cyber AI is helping thousands of organizations fight back against ransomware. We’ll discuss:

  • The impact of ‘double-extortion’ ransomware and ‘ransomware-as-a-service’
  • Real-world examples of ransomware detected by Cyber AI
  • How self-learning AI responds proportionately to ransomware, thanks to its deep understanding of an organization’s pattern of life

[1 CPE] Privacy in the Age of Big Data: You Want to Know What About Me?

  Presented by Steve Smith • Chief Information Officer, University of Nevada Reno

Do you know who has access to data about you? What data, where it is, how it is shared, when (if ever) it is deleted? Facial recognition and other biometric tracking capabilities may be giving rise to surveillance capitalism. We are normalizing technologies that nobody knows how they will be used in the long term. At the same time laws like the European Union General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) are imposing compliance requirements that impact how business is conducted. Learn the latest about the technologies and the policies that impact privacy and how it may impact the role of IT.

Bio:
Steve Smith is the Vice Provost for Information Technology and CIO for the University of Nevada, Reno (UNR). UNR is a Carnegie Classified R-1 research university and the land grant institution for the state of Nevada. Steve has been at UNR since 2015. Prior to that, he held similar positions at the University of Hawaii system and the University of Alaska system with over 35 years of experience in information technology in higher education. He has extensive experience in networks and large systems for research and education. He is chair of the board for the Pacific Northwest Gigapop and Co-Chair of the Schools, Health & Libraries Broadband (SHLB) Coalition Higher Education Policy Group. Steve is also a member of the Juniper Higher Education Advisory Board and the VMWare Higher Education Peer Advisory Board.

[1 CPE] Data Classification and Compliance with Secure Storage

  Presented by Hitachi Vantara

With the continuing expanse of data, many companies struggle to store, categorize, and account for all of their corporate data. Due to this intensifying challenge, companies are unable to retrieve and analyze data in a way that leads to proper data governance. As their data grows, regulatory bodies institute laws and regulations to protect consumers’ data and ensure businesses are operating ethically. Unfortunately, companies that fail to comply with these changing regulations face large fines, loss of market share, and consumer backlash.

Join us for a demo to learn how Hitachi’s solutions can help companies find and manage their data through Data Classification and Secured Storage. Also learn if your company qualifies for the complimentary $100,000 data assessment 700+ customers have benefited from over the past decade.

[1 CPE] Situational Awareness Into the Dark Web

  Presented by Check Point Software

In our journey through this session, we take you through the evolution, goals, and motivation of the Dark Web. We will share with you what and whom you can find on the platforms as well as the major conflicts individuals face while exploring this web. The session also exposes you to the syndicates and structures running on the platforms. Surprisingly, we see how those groups were among the first to embrace and implement Blockchain technology and created a major global demand for crypto currencies. This is the time to listen, learn, and be exposed to the deepest secrets of the Dark Web.

[1 CPE] Handling the “New Normal” in Security and Beyond

  Presented by Keson Khieu • Chief Information Officer, California Emergency Medical Services Authority

Now that a hybrid workforce is likely to be the standard in both public and private enterprises, IT staffs have had to adapt. There has been an increase in ransomware threats that are making headlines. Handling privacy and compliance requirements has created unique challenges.

Security leaders must now navigate in new waters. We are truly entering a new model of cybersecurity that is here to stay. Join Keson Khieu, CISSP, PMP, ITIL, for a though-provoking discussion. You will get many takeaways about how these new challenges are actually great business opportunities for your firm.

[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve & StorageCraft

IDC advises that a 3-2-1-1 strategy is the new best practice for effectively protecting customers against ransomware. The last 1 is the important piece of the puzzle, where a copy is also stored on immutable storage. The growing risk of compromise to your customers’ data – specifically via ransomware DEMANDS the most up to date and complete solutions arsenal.

[1 CPE] Ransomware: Why Does This Keep Happening?

  Presented by Arctic Wolf

Join Coy Thorp, Systems Engineer for Arctic Wolf, as he discusses the history and evolution of ransomware and why it has become so difficult to detect and mitigate. The basic premise is this: organizations spend more today than ever before to address cybersecurity risk, yet breaches are on the rise and there is no end in sight. What can your company do to prepare itself for the attack that is imminently on the horizon?

[1 CPE] What Got Us Here, Won’t Get Us to Where We’re Going…

  Presented by Aruba, a HPE Company

Over the past couple of decades, we’ve relied on a certain predictable and repeatable model of expectations from our infrastructure that has delivered. However, the demands of Digital Transformation, the pace of change, the capabilities within our teams — and of course the pandemic — have created business pressures that traditional ways of building and security infrastructure just can’t keep pace with.

The time is now to reflect, reset, and embrace a different way that will increase agility and flexibility as well as enhance performance and security. Lose the baggage of the past, travel light, and let’s chart a course for the journey ahead.