[1 CPE] Securing the Modern Workplace with Island: A Revolutionary Enterprise Browser Solution

  Presented by Shawn Surber, Sales Engineer • Datec

In today’s rapidly evolving digital landscape, securing the modern workplace presents unprecedented challenges and complexities. Traditional security measures often fall short in addressing the sophisticated threats that enterprises face, necessitating innovative solutions that can adapt to the dynamic nature of cyber risks. This presentation is designed to introduce a groundbreaking approach to digital security through the lens of Island, an enterprise browser built from the ground up with security and productivity at its core.

We will explore how Island is redefining the standards of enterprise security by offering a comprehensive suite of features tailored to protect and enhance the digital workspace. Attendees will gain insights into how Island’s unique architecture and security-focused functionalities, including advanced data loss prevention (DLP), granular access controls, and seamless integration with existing security ecosystems, are setting a new benchmark in browser capabilities.

Through real-world use cases and success stories, we will demonstrate Island’s effectiveness in mitigating risks, ensuring compliance, and fostering a secure yet flexible work environment. By focusing on the strategic advantages of deploying an enterprise browser solution, we aim to equip security professionals, IT leaders, and business executives with the knowledge and tools necessary to navigate the complexities of modern cybersecurity.

Join us to discover how Island is empowering organizations to embrace the future of work with confidence, balancing the need for rigorous security measures with the demands for productivity and innovation in the digital age.

[1 CPE] When It Comes to Security, The Right Tools Matter

  Presented by Jason Anderson, Channel Sales Engineer, SASE • HPE Aruba Networking & Structured

When it comes to security, the right tools matter. Securing your network no matter where your users are located can be difficult and complex. Over the last year, many IT leaders have embraced a Secure Access Service Edge (SASE) framework to enable faster and more secure connectivity across their global organizations. SASE converges the functions of network and security solutions into a single, cloud-native service that delivers consistent connectivity and security from everywhere. Find out how HPE Unified SASE can help you with tools that are easy to deploy, configure, and manage.

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Liran Chen, Vice President, Sales Engineering & Technical Services • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

[1 CPE] Modern Logging & Analytics: Will Modularization Make Your SIEM Better?

  Presented by Marty McDonald, Sr Domain Security Advisor • Optiv

In this session, we will discuss trends Optiv is seeing in the SIEM market and how they may relate to your environment. We will focus on the move towards a single collection of logs and routing of those logs to multiple platforms to meet the use cases and requirements of the business and security. Once the collection of the logs is separate from the search, correlation, and analytic layers what does it mean to you?

Marty has 20 years of deep cyber security industry experience gained from a variety of value-added resellers and solutions integrators. Prior roles include Senior Consultant in Security Intelligence for Datalink, and Senior Consultant in the Technology Solutions Delivery team at Accenture. Marty is a cybersecurity professional with experience ranging over a wide variety of clients from small to Fortune 500 corporations in a multitude of industries including government, healthcare, retail, manufacturing, banking, and technology. He has delivered projects for the rationalization of technologies and reference architectures for analytics platforms. He is a subject matter expert (SME) in the design and implementation of Security Incident and Event Management (SIEM) systems and is well-versed in creating detection mechanisms that enhance Security Operation Centers (SOC) and compliance effectiveness. He possesses a unique ability to turn business needs into technology solutions in a cost-effective manner for his clients.

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Liran Chen, Vice President, Sales Engineering & Technical Services • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

[1 CPE] Zero Trust Microsegmentation: It’s Easier Than You Think

  Presented by Tony Steffe, Sr Systems Engineer, CISSP • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

Tony is a knowledgeable technical professional with 20+ years of experience developing, selling, and integrating technology for enterprise customers. He is effective in sales engineering, Internet security, project management, computer networking, and interpersonal relations. Exceptional at managing the personal and technical challenges that arise from building something new, Tony has successfully built out several high-impact IT projects.

[1 CPE] The Most Important Shift for Cybersecurity in a Generation

  Presented by Steve Riley, Field CTO • Netskope

We live in a world where everything is hybrid and the blend between personal, corporate, private, and public is ever-changing and presents us with a host of new challenges. This has increased and complicated the attack surface and the pressure to converge tools and do “more with less” is at peak levels. We must meet this watershed moment with the right team, plans, and technology.

Join this interactive session to learn:

  • How to build an effective plan for change without adding to the chaos
  • What consolidation approaches save money without sacrificing security
  • Use cases that deliver immediate value and efficiency while improving user experience

[1 CPE] Demystifying Zero Trust: Simplifying Network Security

  Presented by Tanner Harrison, Systems Engineer • Fortinet

Today’s ever-changing threat landscape challenges traditional security models. The emergence of the Zero Trust model represents a transformative approach, reshaping how organizations protect their assets. This presentation aims to demystify Zero Trust, offering a comprehensive understanding that goes beyond buzzwords. We will explore the foundational concepts of Zero Trust, emphasizing the “never trust, always verify” philosophy. By the end of this session, attendees will be equipped with the knowledge to begin their Zero Trust journey, enhancing their security posture, and protecting critical data and systems from modern threats. Whether you are a security professional, IT manager, or organizational leader, this discussion will empower you to take decisive action toward a more secure future.

[1 CPE] The Intersection of AI and Cybersecurity

  Presented by Gregory Pepper, Security Architect • Check Point

As artificial intelligence (AI) permeates our lives, it’s crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.

[1 CPE] A Review of FRSecure’s Annual Information Security Report

  Presented by Dave Tuckman, Information Security Consultant • FRSecure

FRSecure (an Information Security company located in Edina, MN) took the results of +/- 400 Validated Information Security Assessments and 55 Incident Response Engagements conducted in 2022 and created an anonymized report from the data called: The State of Information Security. Full details and access to the report are available here: https://frsecure.com/2023-annual-infosec-report/

In this presentation, FRSecure Information Security Consultant Dave Tuckman will highlight key findings in the report, and what we can learn from it.

Understand how you can mitigate risk going forward to protect your business and clients in an ever-changing threat landscape. Dave will provide additional perspective on how you can leverage this information for a better understanding of your third-party (supply, vendor, contractor) relationships.

Topics include:

  • FRSecure’s Annual State of InfoSec Report, informed by over 400 validated security assessments
  • Where organizations are getting it right vs. falling behind
  • How you can use this report to inform your own business’s security decisions
  • How you can use this report to inform your business’s Third-Party Risk Management