[1 CPE] Cyber Security: A National Threat

  Presented by Arctic Wolf

When searching for vulnerable targets, cyber hackers do not care how big or small your company is. As world events continue to unfold in China and Russia, cyber warfare has become a national threat to American companies.

Join Arctic Wolf’s session to learn how IT leaders can be proactive, rather than reactive to protect their companies from cyber hackers.

[1 CPE] Protecting Your Data from Ransomware Where it Lives: Your Last Line of Defense

  Presented by Hitachi Vantara

If an attack happens and it makes it all the way to your data, then they have already broken through all of your walls. Where your data lives IS your last line of defense, which is why the Armed Forces that protects the USA trusts Hitachi to protect them. Prevention is great and all but without that last line of defense, you’re a sitting duck. Attend this session to learn how Hitachi serves as your last line of defense against ransomware attacks.

[1 CPE] Shifting Security Left: DevSecOps

  Presented by Optiv

The ever-increasing pace and pressure for developers to ship code aren’t going to slow, and within many organizations, security is often an afterthought. The impact is products that have security bolted on at the end, impacting user experience, frustrating developers and security engineers, all while leaving security vulnerabilities open for exploiting. Organizations must find ways to meet security requirements while not causing the development teams to get bogged down and delay code delivery.

Ed Lewis, Orchestration and Automation Practice Director at Optiv, will share strategies and approaches his clients use to address common DevSecOps challenges such as poor security collaboration between siloed teams, scaling secrets management, limited automation, tool and process redundancies, and more.

[1 CPE] Hacking Like a White Hat Wizard

  Presented by Check Point

Harry Potter-themed talk track about the similarities of Magic and Hacking and some of the more magical moments from Check Point Research from 2021. Discussing companies turning a blind eye to cybercrime: “If you ignore it, if you don’t learn about it, you won’t be able to protect yourself from it.”

David Hobbs currently serves in the Office of the CTO at Check Point while also managing Security Engineering in the Pacific Northwest. With over 25 years of experience, David has served as a consultant to numerous Federal and State Agencies, including the FBI, US Army Counterintelligence, Secret Service, and many private investigation companies.

David is certified on several technology platforms including Firewalls, IPS/IDS, UTM, Malware Prevention, and Encryption technologies, and has a deep understanding of security and networking overall. In addition to his technical expertise, David served as an expert in several practice areas including exploit research, penetration testing, forensic investigation, security countermeasures, wireless and radio security, social engineering, and compliance. David has taught ethical hacking to some of the largest national organizations and has been published in many articles and publications.

[1 CPE] The InfoSec Talent Shortage That Wasn’t

  Presented by Critical Start

The experts agree: there isn’t nearly enough cyber security talent out there. But what if all the experts, news stories, conference talks, and board room conversations are wrong? What if there is more than enough cyber security talent to get organizations what they need to be successful, secure, and in a reasonable budget? In this presentation, Critical Start’s Senior Security Consultant, Alex Humphrey, will discuss ways to hire, train, and retain great cyber security talent, move business objectives forward, and keep the organization secure – all without breaking the bank.

[1 CPE] Protecting Your Data from Ransomware Where it Lives: Your Last Line of Defense

  Presented by Hitachi Vantara

If an attack happens and it makes it all the way to your data, then they have already broken through all of your walls. Where your data lives IS your last line of defense, which is why the Armed Forces that protects the USA trusts Hitachi to protect them. Prevention is great and all but without that last line of defense, you’re a sitting duck. Attend this session to learn how Hitachi serves as your last line of defense against ransomware attacks.

[1 CPE] Challenge the Threat of Ransomware: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Ransomware attacks continue to rise in volume, severity, and costs to businesses attacked while cyber criminals continue inventing new and unexpected methods to spread malware and encrypt critical data. As attacks continue to specialize, no organization is immune to ransomware. So how do you avoid being forced to pay a ransom, disruptions to services and supply chains, and damage to your brand in the news? Join recovery and data protection experts from Zerto to discuss best practices for when – not if – ransomware strikes. Be prepared to minimize downtime, data loss, and mitigate the risks of ransomware. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • Steps you can take to reduce the likelihood of attacks on your system
  • How to choose a best-in-class recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recover quickly
  • Real example of a company hit twice by ransomware and how they improved recovery time from weeks to minutes by planning ahead

[1 CPE] The Top 10 List: Ransomware Preparation

  Presented by Tonaquint Data Center

Carl Wilkins, Director of Cloud Operations for Tonaquint Data Centers provides a Top 10 list of things you can do to mitigate the risk of Ransomware affecting you. Topics will include how to protect your data, how to protect your systems and infrastructure, and situations to be aware of that might indicate the presence of Ransomware in your environment.

[1 CPE] Cyber Security: A National Threat

  Presented by Arctic Wolf

When searching for vulnerable targets, cyber hackers do not care how big or small your company is. As world events continue to unfold in China and Russia, cyber warfare has become a national threat to American companies.

Join Arctic Wolf’s session to learn how IT leaders can be proactive, rather than reactive to protect their companies from cyber hackers.

[1 CPE] Open-Source Developers Are Security’s New Front Line

  Presented by Sonatype

Bad actors have recognized the power of open source and are now beginning to create their own attack opportunities. This new form of assault, where OSS project credentials are compromised and malicious code is intentionally injected into open-source libraries, allows hackers to poison the well. In this session, Sonatype will explain how both security and developers must work together to stop this trend or risk losing the entire open-source ecosystem.

  • Analyze and detail the events leading to today’s “all-out” attack on the OSS industry
  • Define what the future of open source looks like in today’s new normal
  • Outline how developers can step into the role of security to protect themselves and the millions of people depending on them