[1 CPE] Protecting Your Data From Cyber Attacks

  Presented by Technology Integration Group

Protecting your Data from Cyber Attacks focuses on the current landscape and how internal/external bad actors have taken advantage of COVID-19 to exploit security gaps within numerous industries. Edge and system-level security isn’t enough. Protecting your data from breaches and manipulation should also be top priority. Hear how to identify, prevent, detect, and recover from a cyberattack. Learn about a cyber recovery solution and how its unique off-network architecture will enhance your overall business continuity plan.

[1 CPE] Cybersecurity, the Path of Most Resistance

  Presented by Dick Wilkinson • Chief Technology Officer, Supreme Court of New Mexico

As computer users continue to expect an increasingly seamless and touchless user experience from their devices, the cybersecurity industry insists on adding more touches and more seams to keep things locked up. This disconnect from users’ expectations to how we implement security controls leads to a variety of problems. It will take the entire industry shifting course to recognize the user’s demands to overcome this disconnect.

Dick Wilkinson is the Chief Technology Officer on staff with the Supreme Court of New Mexico and the Co-founder and CTO of Proof Labs inc. He is a retired Army Warrant Officer with 20 years of experience in the intelligence and cybersecurity field. He has led diverse technical missions ranging from satellite operations and combat field digital forensics to enterprise cybersecurity and cyber research for the Secretary of Defense.

[1 CPE] 5 Steps to Building a Successful SASE Roadmap

  Presented by iboss

Millions of people shifted from working in the office to working remotely, which has resulted in lost productivity due to overloaded VPN connections slowing access to critical cloud applications. With virtually every app delivered in the cloud, why are remote workers sending traffic through the VPN, to begin with? Move your security to the cloud and allow users to connect directly to cloud apps without the VPN. Take these 5 steps when building your SASE cloud migration.

[1 CPE] Power-Boost Ransomware Incident Response with Ransomware Kill Switch

  Presented by Airgap Networks

Despite significant investments in security each year, cybercriminals are constantly developing new attack vectors to thwart existing security controls. The growth of connected devices, IoT, and an increasingly remote workforce has widened the enterprise attack surface, enabling cybercriminals to find new ways to breach enterprise perimeter defenses.

A new paradigm shift needs to occur in security to deal with the eventual breach and lateral movement of cyber-attacks. Implementing an enterprise zero-trust security model can help to block the lateral movement of cyber attackers and isolate attacks to where they originate, helping to dramatically reduce the enterprise-wide impact of a cyber-attack. Enterprises need to migrate to a Zero-Trust architecture, helping to gain back control and limit the damage done by cyber-attacks that occur each year. In this session, Ritesh Agrawal, CEO and Co-founder of Airgap Networks, will lead a detailed discussion on how to:

  • Maintain a continuous accurate inventory of enterprise assets.
  • Obtain true visibility and insight on how all devices communicate.
  • Generate zero false-positive alerts based on anomalous behavior.
  • Deploy scalable nano-segmentation of devices to stop lateral movement inside your network via devices (Ransomware Kill-Switch).
  • Implement Single-Sign-On and Multi-Factor Authentication(MFA) for legacy/private applications.
  • Achieve modern IAM/IDM authentication with Zero-Trust Isolation.

Through this discussion, Ritesh will build on these topics and emphasize how zero-trust principles can empower enterprises and achieve better control and response to emerging cyber-threats. Zero-Trust is not hype. Join us to find out more!

[1 CPE] What Got Us Here, Won’t Get Us to Where We’re Going…

  Presented by Aruba, a HPE Company

Over the past couple of decades, we’ve relied on a certain predictable and repeatable model of expectations from our infrastructure that has delivered. However, the demands of Digital Transformation, the pace of change, the capabilities within our teams — and of course the pandemic — have created business pressures that traditional ways of building and security infrastructure just can’t keep pace with.

The time is now to reflect, reset, and embrace a different way that will increase agility and flexibility as well as enhance performance and security. Lose the baggage of the past, travel light, and let’s chart a course for the journey ahead.

[1CPE] Insider Threat: Education and Awareness

  Presented by InfraGard

Not all organizations have an Insider Threat Program, but they may educate on themes to report on specific behavior. If you see a threat, should you contact law enforcement? Not all insider threats are malicious in intent. Your systems and policies may have vulnerabilities you are not even aware of. Join InfraGard Kansas City for a comprehensive background, as their panel of security awareness professionals provide a range of perspectives on how to deliver messaging to your audiences on Insider Threats. They will also present tips to give you the edge needed to save time when a threat comes your way.


Moderator:

Donna Gomez • Security Risk and Compliance Analyst, Johnson County Government


Panelists:


Theresa Bentch • Director of Physical Security, Garmin
Marc Vasquez • Assistant VP/Security Awareness, UMB Bank
Dr. Cheryl Cooper • Cyber Security Risk Manager, TMobile
Jared Oakden • Regional Security Officer, American Family Insurance
Nick O’Neil • Information Security Administrator, Columbia Insurance Group

[1 CPE] Get the Most Out of SD-WAN Without Over-Investing

  Presented by iboss

Understanding your drivers allows you to expand your bandwidth, maximize scalability, reduce your back-hall data, and simplify and reduce traffic on your network, providing a more efficient, secure experience for your end-users. In this presentation, learn how to integrate seamlessly with SD-WAN solutions to provide cloud-based internet security.

[1 CPE] How Zero-Trust Enables the Future of “Work from Anywhere” Secure Access

  Presented by Duo Security

The perimeter-focused security model of decades past is no longer adequate for securing the modern enterprise. Now, organizations must secure a mobile workforce using a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks — and this trend only accelerated during 2020’s global shift to remote work. Fortunately, a modern access strategy built on zero-trust fundamentals can defend today’s workforce while paving the way to a passwordless future. Attend this session to learn how the zero-trust access model works, reduce your reliance on passwords and risk of password-based attacks, and how to start planning and staging your zero-trust evolution today.

[1 CPE] Security vs. Compliance: Turning InfoSec Success into Audit Wins

  Presented by Tripwire

Security and compliance teams both strive to design, establish, and enforce controls to protect an organization. But even with shared goals in place, security and compliance teams often manage business risk in relative isolation. So how can these teams set aside tension and work better together to create a winning alliance?

In this session, we explore the key differences between security and compliance initiatives. It’s crucial to understand that being fully compliant doesn’t necessarily mean an organization is fundamentally secure. We’ll cover how the two initiatives complement each other when it comes to minimizing risk and how both teams can collaborate to create efficiencies. Attendees will learn how to leverage compliance policies to set the foundation to a robust information security program, while providing true visibility and coverage, consolidating toolsets, and reducing costs. Lastly, we’ll discuss how to ensure that a successful security program can help organizations prepare for an upcoming audit to ultimately achieve and maintain continuous compliance.

[1 CPE] The Rise of Secure Access Service Edge

  Presented by Bitglass

Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms are built for this exact moment.

In this presentation, you will learn:

  • The core components SASE
  • The functionality you need to secure cloud, web, and remote access use cases
  • Architectural considerations for SASE platforms