[1 CPE] Rethink Incident Response: From Hourly Guesswork to Guaranteed Outcomes

  Presented by John McLaughlin, Principal Sales Engineer, PNW & Gary Quinn, Sr Sales Engineer, Enterprise US • Arctic Wolf

Traditional incident response often leaves organizations reacting under pressure, navigating uncertain costs, inconsistent coverage, and slow recovery. In this session, we’ll examine strategies for making incident response more predictable and outcome-focused. Participants will explore how structured response models—emphasizing planning, rapid containment, and coordinated recovery—can reduce operational risk, minimize downtime, and support business continuity. Attendees will gain practical insights into aligning incident response practices with organizational goals, enabling IT, risk, and executive teams to make more informed decisions and improve overall cyber resilience.

[1 CPE] Cyber Risk Associated with Quantum Computing

  Presented by BJ Deonarain, Global Alliance Cybersecurity Solutions Director • Hitachi Vantara

Quantum computers can break today’s standard encryption algorithms (RSA, ECC) in minutes relative to time using Shor’s/Grover algorithm. “Harvest Now, Decrypt Later” attacks allow adversaries to steal encrypted data now and crack it when quantum computers mature. Quantum systems themselves are vulnerable to new attack vectors, quantum hacking (side-channel, noise-based), quantum malware, and manipulation of qubit stability. Supply chain attacks targeting quantum hardware, proprietary algorithms, and insider threats are rising as nation-states and cybercriminals escalate espionage efforts. Urgent need for quantum-resistant cryptography and robust quantum cybersecurity measures as quantum adoption accelerates.

BJ Deonarain is a globally focused cybersecurity executive responsible for driving cyber security and cyber resiliency strategy at Hitachi Vantara. With a career spanning technical innovation, client solutions, and cross-functional leadership, BJ combines deep technical expertise with a client-centric approach to mitigate risk and elevate organizational security postures.

[1 CPE] Adapting Detection & Response: MDR vs SOC Partnership in Evolving Threat Environments

  Presented by James Podziomek, Solutions Engineer, Marco Technologies & Ryan LaBarre, Account Executive, Arctic Wolf

Join us for a strategic deep dive into today’s evolving cybersecurity threat landscape. We’ll explore the distinct advantages of Managed Detection and Response (MDR) versus traditional Security Operations Center (SOC) partnerships, and provide actionable insights to help organizations strengthen their defenses. This session highlights Marco’s collaboration with Arctic Wolf to deliver advanced, cost-effective security operations and incident response—tailored to dynamic risk profiles, regulatory demands, and the realities of modern IT environments.

[1 CPE] Has Security Awareness Been Forgotten? An Interactive Panel Discussion

  Presented by INTERFACE Advisory Council

“Just automate that process! The firewall is fine—we’ve got an AI tool watching it.”

Sound familiar? Despite significant investments in cybersecurity and advanced tools, the human element remains one of the greatest vulnerabilities in any organization. This isn’t a new problem—ransomware attacks continue to thrive due to human error.

Insider threats, whether intentional or accidental, are often at the root of security breaches. So, what proactive steps are you taking to mitigate these risks?

Join the INTERFACE Omaha Advisory Council for an engaging discussion on defending against internal threats. Local IT leaders will share their strategies, lessons learned, and practical tips for minimizing human error in cybersecurity. Bring your questions and join the conversation as we explore what’s working, what’s not, and what more needs to be done to protect our networks from within.

Panelists:

  • Rob LaMagna-Reiter, Chief information Security Officer, Woodman Life
  • Dr. Lisa McKee, Assistant Professor Cybersecurity, Bellevue University
  • Memory Trosper, Sr Director, Technology Services, Gothenburg Health
  • Dana Turner, Chief Information Security Officer, Union Bank and Trust

[1 CPE] Beyond Cybersecurity: Assembling Resiliency for the Inevitable Breach

  Presented by BJ Deonarain, Global Alliance Cybersecurity Solutions Director • Hitachi Vantara

The Imperative for Resiliency, 100% cyber security is unachievable; breaches are inevitable, where modern threats demand a shift from reactive defense to proactive resilience. Resilience requires mindset and culture change, not just new technology, while focus can sustain operations and limit damage when security fails.

Assembling the resiliency strategic pillars and actions:

  • Risk Assessment: continuous evaluation of assets and vulnerabilities
  • Incident Response: develop, test, and update comprehensive crisis plans
  • Employee Training: ongoing education to make staff the first line of defense
  • Systems Testing: regular audits, penetration tests, and vulnerability scans
  • Partnerships: collaborate with industry experts for knowledge sharing
  • Culture: embed resiliency throughout the organization at every level

BJ Deonarain is a globally focused cybersecurity executive responsible for driving cyber security and cyber resiliency strategy at Hitachi Vantara. With a career spanning technical innovation, client solutions, and cross-functional leadership, BJ combines deep technical expertise with a client-centric approach to mitigate risk and elevate organizational security postures.

[1 CPE] Cyber Threat Landscape for H1 2025: Insights from ESET Telemetry

  Presented by Matt Moss, Sr Sales Engineer • ESET

Explore the key cybersecurity trends shaping H1 2025 in North America. This session covers headline threats including fake error scams (ClickFix), evolving ransomware tactics, and the rise of NFC malware. Gain actionable insights to strengthen your security posture.

[1 CPE] Beyond the Checkbox: Building Security Beyond Compliance Frameworks

  Presented by Matthew Ziegler, Director of Advisory and Success, MBA, CISSP, CISA  • Novacoast

Too often, organizations see governance and compliance as a means to an end: passing an audit, gaining a certification, or filing a report. Really, these are just the start of the Information Security journey. In this session, we’ll explore how leaders can move beyond “checkbox compliance” by aligning governance with real-world risk, embedding security into culture, and using frameworks like PCI DSS, ISO 27001, NIST CSF 2.0, and CMMC as foundations for continuous improvement rather than static achievements. Drawing from real-world experience leading global SOCs, audits, and board-level risk programs, I’ll share strategies for changing direction from compliance-driven to resilience-focused, and how to communicate these strategies to executives, regulators, and staff.

[1 CPE] Enhancing Cyber Resilience for Active Directory (and Entra ID)

  Presented by Rob Ingenthron, Sr Solution Engineer • Semperis

Cyberattackers are adept at finding ways through your defenses and into identity systems like Active Directory. Many organizations use Active Directory as the primary identity service, and Active Directory is typically tied into almost everything, including Entra ID. From there, they can move laterally, escalate privileges, access sensitive resources, and inject malware or ransomware. Implementing a layered defense that includes identity threat detection and response (ITDR) is key to protecting your operational resilience.

Join Rob Ingenthron, Sr Solution Engineer, to learn:

  • How layered defense has changed over time
  • Why ITDR is now an essential part of a robust layered defense strategy
  • The continuing importance of hygiene and auditing for Active Directory
  • How a layered defense can help you combat attacks that are designed to bypass traditional methods of defense
  • Which best practices lead to a strong layered defense

[1 CPE] New Era of Deception: AI, Deep Fakes, and the Dark Web

  Presented by Morgan Trust, Associate Penetration Tester • FRSecure

Explore how artificial intelligence is fueling a new wave of cyber deception through deep fakes, social engineering, and dark web activity. In this session, Morgan Trust, Associate Penetration Tester at FRSecure, will uncover real-world examples and emerging threats while offering strategies to spot and defend against them. Gain the knowledge you need to navigate this evolving landscape with confidence.

As an Associate Penetration Tester at FRSecure, Morgan brings five years of experience and holds both the eLearnSecurity Junior Penetration Tester and CompTIA Security+ SY0-601 certifications to the table. Morgan is an extremely valuable asset to the team who works directly on the front lines with FRSecure’s clients. In his free time, Morgan enjoys Capture the Flag competitions, weightlifting, cooking/baking, dancing, listening to music at max volume, hiking, thrifting, and spending time with family.

[1 CPE] Go Hack Yourself: War Stories from over 170,000 Pentests

  Presented by Tony Taylor, Sr Solutions Architect • Horizon3.ai

Join Tony Taylor, Senior Solutions Architect, for an engaging session on “Offense-Driven Defense.” Tony will challenge conventional risk assessment practices and unveil how focusing on real-world exploitability and impact can revolutionize your security approach. Drawing from insights gathered across more than 170,000 autonomous pentests, he’ll share compelling stories and actionable lessons that show how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and strengthen your defenses against advanced threats. Don’t miss this opportunity to learn from a leading industry practitioner on why it’s time to “go hack yourself” and build resilience in today’s borderless threat environment.