[1 CPE] Co-Managed IT: The Modern MSP Relationship

  Presented by Exbabylon

A pragmatic conversation about what the modern relationship should look like between internal IT teams and external consultants, MSPs, MSSPs and VARs. As organizations embark on digital transformation journeys that require a cloud forward approach, the skills, competencies, and experience of a strategic partner who can collaborate and build initiatives becomes more apparent and important. Navigating the shifting expectations of IT Leadership as business demands evolve and change from the team that just keeps the network up to their new role as a business influencer through data intelligence, business intelligence, automation, and big data/AI.

[1 CPE] Cyber Security: A National Threat

  Presented by Arctic Wolf

When searching for vulnerable targets, cyber hackers do not care how big or small your company is. As world events continue to unfold in China and Russia, cyber warfare has become a national threat to American companies.

Join Arctic Wolf’s session to learn how IT leaders can be proactive, rather than reactive to protect their companies from cyber hackers.

[1 CPE] Protecting Your Data from Ransomware Where it Lives: Your Last Line of Defense

  Presented by Hitachi Vantara

If an attack happens and it makes it all the way to your data, then they have already broken through all of your walls. Where your data lives IS your last line of defense, which is why the Armed Forces that protects the USA trusts Hitachi to protect them. Prevention is great and all but without that last line of defense, you’re a sitting duck. Attend this session to learn how Hitachi serves as your last line of defense against ransomware attacks.

[1 CPE] Securing a Distributed Network with ZTNA and a Cybersecurity Mesh Platform

  Presented by Fortinet

Securing connected resources and the different pieces of a distributed network can be challenging. Join this session to explore the advantages of using a ZTNA architecture to provide secure, application-based access over the traditional VPN access most enterprises use today. We’ll also examine how employing Gartner’s Cybersecurity Mesh Architecture can simplify Network and Security operations.

[1 CPE] Shifting Security Left: DevSecOps

  Presented by Optiv

The ever-increasing pace and pressure for developers to ship code aren’t going to slow, and within many organizations, security is often an afterthought. The impact is products that have security bolted on at the end, impacting user experience, frustrating developers and security engineers, all while leaving security vulnerabilities open for exploiting. Organizations must find ways to meet security requirements while not causing the development teams to get bogged down and delay code delivery.

Ed Lewis, Orchestration and Automation Practice Director at Optiv, will share strategies and approaches his clients use to address common DevSecOps challenges such as poor security collaboration between siloed teams, scaling secrets management, limited automation, tool and process redundancies, and more.

[1 CPE] Hacking Like a White Hat Wizard

  Presented by Check Point

Harry Potter-themed talk track about the similarities of Magic and Hacking and some of the more magical moments from Check Point Research from 2021. Discussing companies turning a blind eye to cybercrime: “If you ignore it, if you don’t learn about it, you won’t be able to protect yourself from it.”

David Hobbs currently serves in the Office of the CTO at Check Point while also managing Security Engineering in the Pacific Northwest. With over 25 years of experience, David has served as a consultant to numerous Federal and State Agencies, including the FBI, US Army Counterintelligence, Secret Service, and many private investigation companies.

David is certified on several technology platforms including Firewalls, IPS/IDS, UTM, Malware Prevention, and Encryption technologies, and has a deep understanding of security and networking overall. In addition to his technical expertise, David served as an expert in several practice areas including exploit research, penetration testing, forensic investigation, security countermeasures, wireless and radio security, social engineering, and compliance. David has taught ethical hacking to some of the largest national organizations and has been published in many articles and publications.

[1 CPE] The InfoSec Talent Shortage That Wasn’t

  Presented by Critical Start

The experts agree: there isn’t nearly enough cyber security talent out there. But what if all the experts, news stories, conference talks, and board room conversations are wrong? What if there is more than enough cyber security talent to get organizations what they need to be successful, secure, and in a reasonable budget? In this presentation, Critical Start’s Senior Security Consultant, Alex Humphrey, will discuss ways to hire, train, and retain great cyber security talent, move business objectives forward, and keep the organization secure – all without breaking the bank.

[1 CPE] Protecting Your Data from Ransomware Where it Lives: Your Last Line of Defense

  Presented by Hitachi Vantara

If an attack happens and it makes it all the way to your data, then they have already broken through all of your walls. Where your data lives IS your last line of defense, which is why the Armed Forces that protects the USA trusts Hitachi to protect them. Prevention is great and all but without that last line of defense, you’re a sitting duck. Attend this session to learn how Hitachi serves as your last line of defense against ransomware attacks.

[1 CPE] Challenge the Threat of Ransomware: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Ransomware attacks continue to rise in volume, severity, and costs to businesses attacked while cyber criminals continue inventing new and unexpected methods to spread malware and encrypt critical data. As attacks continue to specialize, no organization is immune to ransomware. So how do you avoid being forced to pay a ransom, disruptions to services and supply chains, and damage to your brand in the news? Join recovery and data protection experts from Zerto to discuss best practices for when – not if – ransomware strikes. Be prepared to minimize downtime, data loss, and mitigate the risks of ransomware. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • Steps you can take to reduce the likelihood of attacks on your system
  • How to choose a best-in-class recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recover quickly
  • Real example of a company hit twice by ransomware and how they improved recovery time from weeks to minutes by planning ahead

[1 CPE] The Top 10 List: Ransomware Preparation

  Presented by Tonaquint Data Center

Carl Wilkins, Director of Cloud Operations for Tonaquint Data Centers provides a Top 10 list of things you can do to mitigate the risk of Ransomware affecting you. Topics will include how to protect your data, how to protect your systems and infrastructure, and situations to be aware of that might indicate the presence of Ransomware in your environment.