[1 CPE] Protect Your Applications and Data from Ransomware Threats

  Presented by Airgap Networks

Typical enterprise attack surface has dramatically increased post COVID19. Employees, contractors, and vendors have access to enterprise crown jewels over legacy and insecure VPN technology for their respective home environments. It is no wonder that we are witnessing a rapid increase in cybercrimes in the last 18 months. Is protecting your application and data your top priority? If so, please join us in the session to understand the threat landscape and various technology options to safeguard your assets.

We believe the fundamental issues faced by the organizations relate to excessive trust relationships over VLANs and VPNs. For better security, we must ensure that every transaction is authorized and authenticated, and we must make this happen without the need for a bunch of legwork.

Join us and learn more about our point of view on how you can protect your assets without forklift upgrades. Ritesh Agrawal, Co-Founder and CEO of Airgap Networks, will discuss industry leadership and provide a technology overview, addressing the following:

  • How does the modern Application Access approach compare to the traditional remote access VPN?
  • What’s the best method to deploy and operate Universal Secure Access Solution?
  • How to apply zero trust principles, especially for legacy protocols such as SSH, SMB, WMI, RDP, etc.?
  • What’s the importance of SSO/MFA authentication coupled with intent check?
  • Walkthrough (Demo) real-world use cases across private and public sectors.

Enjoy the INTERFACE event and we look forward to meeting you at the (virtual) booth.

[1 CPE] Ransomware Resilience: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Large organizations are still being forced to pay ransoms due to ransomware attacks. Disruptions to services and supply chains are putting ransomware victims in the news under a negative spotlight. Join recovery and resilience experts from Zerto to discuss best practices to minimize downtime and avoid paying ransoms by being prepared. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • What steps you can take to reduce the likelihood of attacks on your system
  • How to best choose a recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recovery quickly
  • How a company hit twice by ransomware improved recovery time from weeks to minutes by planning ahead

[1 CPE] Secure Connectivity, Delivered in the Cloud

  Presented by Optiv Security & iboss

Come learn what SASE (Secure Access Service Edge) is and understand the decisions you’ll need to make as you map out your own SASE journey.

In this session you’ll learn:

  • What is driving almost every company to consider SASE?
  • What decisions are being considered by Networking and Security teams?
  • What services can you replace with SASE?
  • Architecture matters! What are my options?
  • How do I migrate to SASE with zero downtime?

[1 CPE] Are You Prepared? A Discussion on Backups and Security

  Presented by INTERFACE Advisory Council

Since the start of the pandemic, your workflow and office structure have shifted tremendously. The way any firm operates now has adapted to the change in remote workers. While many moves have been made to allow workers to remain efficient, have you kept up with the new security threats? Having a good DR plan is always paramount. Have you tested your plan since the pandemic began?

Join the INTERFACE Advisory Council for an open discussion about these items and more. How does your BC/DR plan need to evolve now? Will your company have a large amount of staff permanently working remotely? We will discuss what controls you need to change, managing secure access, and handling a rise in security threats.

Panelists:
Peter Jurhs • Executive Director, Operations, Nampa School District
Tory Jamison • Executive Director, Cloud Services & Infrastructure, Boise State University
Jerry Hindberg • Assoc Director, Network & Cybersecurity, Lewis-Clark State College
John Stiffler • Director, Corporate IT, Boise Cascade Company

[1 CPE] Cybersecurity Resilience Through Public-Private Partnerships

  Presented by Josh Stemp • Cybersecurity Advisor, CISA

What do I do? Is this beyond my scope of expertise? Where can I get guidance?

These are questions that Cybersecurity professionals ask themselves every day. You may spend your days thinking you are alone; you are not. Join Joshua Stemp to learn how public-private partnerships can strengthen an organization’s cybersecurity posture. He will outline what the Cybersecurity and Infrastructure Security Agency (CISA) is doing to secure the nation from the never- ending barrage of cyber threats.

[1 CPE] Building a Response Strategy to Advanced Threats

  Presented by ExtraHop Networks

The SolarWinds SUNBURST attack was a rude awakening for many security teams, and it won’t be the last time Security leaders face tough questions about how an adversary evaded defenses and stayed hidden. With threats persisting inside the network for months, security teams need a new plan. In this session, CISO Jeff Costlow discusses strategies, including revising existing mental models and incident response processes, to build resilience in the fight against advanced threats.

[1 CPE] Zero Trust: From Theory to Reality in Five Steps

  Presented by Guardicore

Let’s be real. True to its name, there is zero trust about the term “zero trust.” It’s been used as marketecture since its inception. Cut through the fog with this presentation with practical insight and steps to take to ensure your organization makes the most out of ZTA.

[1 CPE] Best Practices for Dealing with the Increasing Costs of a Cyber Event

  Presented by Bradlee Frazer Esquire • Partner, Hawley Troxell

Lawyers and insurance agents are busier than ever dealing with cyber events, hacks, and data breaches! Why are such attacks increasing despite all the systemic countermeasures, consultants, and classes? What are some best practices to think defensively and prepare financially and legally for such an event?


BIO:

Bradlee Frazer is a partner with Hawley Troxell where he chairs the firm’s Internet and Intellectual Property Practice Group. In addition to emphasizing and focusing on all facets of Internet law, Intellectual Property law, and Information Technology law, he also helps clients with related transactional work and litigation.

Brad is a published novelist and has written extensively for national legal publications and law blogs. He is a frequent speaker on internet, intellectual property, and computer law topics and is a regular guest lecturer at Boise State University on those subjects.

A Boise native, Brad began his legal career in 1989 as an intellectual property attorney and commercial litigator at a Boise-based law firm. In 1997 he accepted an in-house position as Senior Intellectual Property Counsel with Fortune 1000 company, Micron Electronics, Inc., and remained there through the company’s merger with Interland, Inc. (now Web.com), then the nation’s largest Web hosting company. He eventually became Deputy General Counsel for Micron Electronics, Inc., and Interland, Inc. From June 2003 to February 2006, Mr. Frazer served as Deputy General Counsel to MPC Computers, LLC, in Nampa, Idaho.

[1 CPE] The Evolution of Physical Security

  Presented by Pine Cove Consulting & Verkada

Physical security is evolving. Security cameras can now store footage locally without NVRs or DVRs. Advanced filtering allows you to quickly find the footage you are looking for. Sharing access to live camera feeds can now be done simply via a link or SMS. Managing system health and providing using permissions is easier than ever. Access control can now integrate seamlessly into your security camera system to provide an added layer of security with real-time visibility.

Join Verkada and its preferred partner, Pine Cove Consulting, for a deep dive into the evolution of physical security systems and the transition to cloud-based physical security.

[1 CPE] Leveraging Assessment Findings to Harden Your Security Perimeter

  Presented by Fortinet

Are you regularly evaluating your network security?

Performing assessments is a tried-and-true method for improving your security posture, but they can be a daunting task for network security staff who are often short on manpower, expertise, and/or time. Regardless, the benefits of running assessments almost always outweigh any potential drawbacks. Having a security assessment in hand will increase your security situational awareness and significantly impact your organization’s risk preparedness and mitigation.

Join us as we discuss the importance of periodically validating your existing security controls and provide learnings and best practices from our experts.