[1 CPE] AI in Cybersecurity: Navigating the Double-Edged Sword

  Presented by Johan Bloomhart, Principal Sales Engineer • WatchGuard & BlackPoint IT

The rise of Artificial Intelligence (AI) has introduced both transformative opportunities and unprecedented risks to the cybersecurity landscape. While AI is a powerful tool for automating threat detection and enhancing security protocols, it also presents new avenues for cybercriminals to launch more sophisticated attacks. In AI in Cybersecurity: Navigating the Double-Edged Sword, we’ll explore AI’s dual impact—empowering both defenders and attackers—and discuss how to harness AI responsibly to protect against emerging threats.

This session will cover:

  • An overview of AI’s evolution and its prominence in the modern business world.
  • How malicious actors exploit AI for nefarious purposes, and the vulnerabilities that arise.
  • How cybersecurity professionals use AI to fortify defenses, identify threats, and mitigate risks.
  • Predictions for AI’s long-term influence on the security industry.
  • The latest technological tools and techniques that can mitigate the risks posed by AI.

We’ll also offer guidance on developing an artificial intelligence policy that allows your organization to leverage AI’s productivity benefits while minimizing risks to data security. Participants will walk away with actionable insights into how to implement AI securely in their business, staying ahead of both competitors and cyber threats.

[1 CPE] Moving to Agile at Gonzaga: Lessons Learned

  Presented by Borre Ulrichsen • Chief Information Officer, Gonzaga University

Gonzaga is seeing an increasing need for flexibility and agility in implementing and supporting information technology in a higher education environment that is constantly evolving. In this session, Borre Ulrichsen, Chief Information Officer, will cover the drivers behind Gonzaga’s transition to agile, how information technology worked with the community during the transition, and some of the benefits the university is reaping from this new way of working.

Borre Ulrichsen has served as the Chief Information Officer at Gonzaga University since August 2016. From 2011 to 2016 he was the Chief Information Officer and Associate Vice President for IT Services at California State University, East Bay. From 2002 to 2011, he was the Director of Information Systems Projects at San Francisco State University. Previous to that he held various IT leadership roles in the private sector. Borre completed his MBA at the Haas School of Business at UC Berkeley. He also earned a master’s degree in engineering from the Norwegian University of Science and Technology.

[1 CPE] Proactive Threat Mitigation Through East/West Traffic Isolation

  Presented by HPE Aruba Networking & Structured

Ransomware and targeted cyber security threats are on the rise. A proactive prevention strategy should use both tried and proven methodologies as well as new and emerging technologies. East West traffic identification and isolation is key in preventing malicious content from spreading, both in the Data Center and at the Campus Edge of the network. We will focus on innovative approaches to address the security compliance, performance, agility, and scalability demands of today’s highly distributed, hybrid, network environments.

[1 CPE] Demystifying Zero Trust: Simplifying Network Security

  Presented by Tanner Harrison, Systems Engineer • Fortinet

Today’s ever-changing threat landscape challenges traditional security models. The emergence of the Zero Trust model represents a transformative approach, reshaping how organizations protect their assets. This presentation aims to demystify Zero Trust, offering a comprehensive understanding that goes beyond buzzwords. We will explore the foundational concepts of Zero Trust, emphasizing the “never trust, always verify” philosophy. By the end of this session, attendees will be equipped with the knowledge to begin their Zero Trust journey, enhancing their security posture, and protecting critical data and systems from modern threats. Whether you are a security professional, IT manager, or organizational leader, this discussion will empower you to take decisive action toward a more secure future.

[1 CPE] The Intersection of AI and Cybersecurity

  Presented by Gregory Pepper, Security Architect • Check Point

As artificial intelligence (AI) permeates our lives, it’s crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.

[1 CPE] SLED Challenges: Budgets, Compliance, E-Rate

  Presented by Michael Townsend, Solutions Architect, & Robert Gherbaz, vCIO • Barracuda & BlackPoint IT

SLED (State/Local Government, Education) customers face unique challenges when adopting new technologies, such as limited budgets, lengthy approval processes, and outdated infrastructure. With over 30 years of experience in the K-12 education sector, Michael understands these hurdles firsthand. His deep insight into the constraints faced by SLED organizations enables him to guide decision-makers through the complexities of implementing new solutions.

In the cybersecurity space, where threats evolve rapidly, Michael helps SLED customers navigate the landscape while working within the confines of limited resources and procedural barriers. His “been there, done that” experience ensures that SLED clients overcome challenges and adopt essential technologies.

[1 CPE] Sprung a Leak! Unit 42’s 2024 Leak Site Analysis

  Presented by Palo Alto Networks & Structured

Unit 42 monitors ransomware and extortion leak sites closely to keep tabs on threat activity and monitors data from dedicated leak sites (DLS) that are often only accessible through the dark web. Throughout our analysis, we compare activity results so that we are accounting for any seasonal fluctuations that can occur due to annual holidays, travel seasons and other recurring events that may impact threat activity. Here we will take a dive into those key leak site trends impacting the state of cybersecurity.

[1 CPE] The Cybersecurity Threat Landscape

  Presented by Andrew Buschbom, Cybersecurity State Coordinator • CISA

In this session, Andrew Buschbom, the Cybersecurity State Coordinator for New Mexico for the Cybersecurity and Infrastructure Security Agency (CISA), will present an overview of the current cybersecurity threat landscape. He will also provide several resources that are available at no cost from CISA. These cybersecurity resources can be added to your tool kit right now.

Andrew Buschbom is a Cybersecurity Specialist with 20 years of experience in Information Security. He previously worked for the State of New Mexico and the Federal Reserve where he had hands-on experience mitigating large, high-profile breaches and dealing with highly motivated global threat actors.

[1 CPE] Cybersecurity Crisis: Generative AI Increasing Threats to Critical Infrastructure

  Presented by Kristen Lucero, Manager, Infosec Cyber Operations and Engineering, PNM Resources • ISACA New Mexico

Cyber threats are on the rise impacting critical infrastructure not only at local and state levels but all across the globe. With the use of generative AI, threat actors are creating sophisticated phishing and social engineering campaigns at record speed. There has been a 30% increase in attacks on critical infrastructure since 2023. According to KnowBe4 that equates to 13 attacks per second.

Critical infrastructure or assets are so crucial to our livelihood that their destruction would have a serious impact from public health to national security. Some of these assets include transportation, supply chain, utilities, and government agencies. All these systems are interconnected starting at the local level. A disruption in one can cause a domino effect on the others.

How are threat actors using generative AI and are organizations developing resilient cybersecurity programs? Are organizations implementing generative AI in their security stack? Developing a strong security culture starts with the basics: training and assessments. Integrating these and other practices into your cybersecurity program will develop a strong security culture to increase resiliency and protection against an evolving threat landscape.

[1 CPE] Challenges and Solutions with Digital Public Services

  Presented by Mark Leech • Director of Technology and Innovation, City of Albuquerque

Local governments continue to face increasing needs for security while meeting expectations to expand digital public services. Strategies must keep up with modern standards for municipalities of greater transparency, growing digital toolsets, and increased mobility for workforce. This session will discuss how these and other solutions shape the digital landscape at the City of Albuquerque.

Mark Leech became the Deputy Director of the Department of Technology and Innovation at the City of Albuquerque in 2019. Before then, he managed the Albuquerque Police Department Technical Services Unit. Between 2008 and 2016, Leech led the City’s efforts in open data, transparency and innovation. As a software developer, he has worked extensively in both public and private sectors.

Director Leech moved from England to New Mexico in 2002 and holds an MSc. in Information Systems Engineering from the University of Wolverhampton, England.

Director Leech continues to support all departments and divisions at City Hall with innovative solutions to keep the City at the forefront of current tech needs, overseeing core city systems, networks, and applications to ensure the operations of City services.