[1 CPE] Zero Trust: From Theory to Reality in Five Steps

  Presented by Guardicore

Let’s be real. True to its name, there is zero trust about the term “zero trust.” It’s been used as marketecture since its inception. Cut through the fog with this presentation with practical insight and steps to take to ensure your organization makes the most out of ZTA.

[1 CPE] Addressing America’s Cyber Dilemma in the Wake of Cyber Disarray

  Presented by Frank J. Grimmelmann • President & CEO for ACTRA

In the wake of the Colonial Pipeline Ransomware Attack, the Solarwinds compromise, and the Microsoft Breach, it’s easy to lose focus on the big picture and how our institutions are responding to the increasingly hostile threat landscape and capable adversaries! This session will briefly highlight significant trends in the threat landscape driving response, explore the team put in place by Washington’s new administration to address the threat, reveal the policy foundation and current execution roadmap, and evaluate the balance between Active Defense and Privacy/Cybersecurity considerations. This session will engage you and leave you with several questions to consider in shaping your own priorities in response to our country’s direction in responding to the ‘clear and apparent cyber danger’ that evidences itself daily.

Mr. Frank J. Grimmelmann serves as President & CEO for the Arizona Cyber Threat Response Alliance (ACTRA), a non-profit entity, that was developed collaboratively with the FBI’s Arizona InfraGard Program and independently launched in 2013 to enable its private/public sector members to enable themselves to respond to the escalating national cybersecurity threat.

Mr. Grimmelmann Co-Chairs Governor Ducey’s AZ Cybersecurity Team (‘ACT’) and is a Founding Member of President Obama’s National ISAO Leadership Group at the University of Texas at San Antonio (UTSA). As ACTRA’s leader, Mr. Grimmelmann was the first private sector representative in the Arizona Counter Terrorism Information Center (ACTIC) on its Executive Board. He has held C-level positions in Finance, healthcare, and government, focusing on cybersecurity in response to 9/11. He holds an MBA in Finance/International Business from UC Berkeley and a BA in Operations with a Business Law minor from the University of South Florida.

[1 CPE] What Got Us Here, Won’t Get Us to Where We’re Going…

  Presented by Aruba, a HPE Company

Over the past couple of decades, we’ve relied on a certain predictable and repeatable model of expectations from our infrastructure that has delivered. However, the demands of Digital Transformation, the pace of change, the capabilities within our teams — and of course the pandemic — have created business pressures that traditional ways of building and security infrastructure just can’t keep pace with.

The time is now to reflect, reset, and embrace a different way that will increase agility and flexibility as well as enhance performance and security. Lose the baggage of the past, travel light, and let’s chart a course for the journey ahead.

[1 CPE] Ransomware In Focus: How AI Surgically Contains the Threat

  Presented by Darktrace

In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom or shut down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad-ranging and destructive, with organizations taking days, weeks, or even months to recover.

But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? Join this presentation to learn how Cyber AI is helping thousands of organizations fight back against ransomware. We’ll discuss:

  • The impact of ‘double-extortion’ ransomware and ‘ransomware-as-a-service’
  • Real-world examples of ransomware detected by Cyber AI
  • How self-learning AI responds proportionately to ransomware, thanks to its deep understanding of an organization’s pattern of life

[1 CPE] Back to Basics: Where Technology and Security Intersect to Protect Against Ransomware

  Presented by INTERFACE Advisory Council

After years of being at the periphery of society, ransomware and cyber threats are now taking center stage as they begin to impact the lives of the broader population. As increased attention begins to turn toward protecting against these attacks, it becomes obvious that throwing new advanced solutions at each aspect of the problem can only take us so far. It is necessary to circle back to foundational elements of our security posture and combine the old with new for elevated levels of protection.

Speakers:
Mike Manrod • Chief Information Security Officer, Grand Canyon Education
Christian Taillon • Threat Response Engineer, Grand Canyon Education

Mike Manrod presently serves as the Chief Information Security Officer for Grand Canyon Education, responsible for leading the security team and formulating the vision and strategy for protecting students, staff, and information assets across the enterprise. Previous experiences include serving as a threat prevention expert for Check Point and working as a consultant and analyst for other organizations.

He is also a co-author/contributor for the joint book project, Understanding New Security Threats published by Routledge in 2019, along with multiple articles/whitepapers. When not working, he spends time playing video games with his kids, practicing martial arts, and doing anything outdoors.

Christian Taillon contributes to Grand Canyon Education’s IT Security team as an Engineer. His efforts focus primarily on improving the Security Operations team’s capability to efficiently detect and effectively respond to threats through work primarily relating to Splunk, EDR, and an evolving Threat Intelligence program. He enjoys contributing to the larger community via various Threat Intelligence Content Development efforts and open-source projects. He leads the Global Watch Center operations at ACTRA and contributes to SPORTS-ISAO under the Cyber Resilience Institute as a Solutions Architect. When away from the keyboard, he enjoys camping, kayak, and hiking with his wife.

[1 CPE] The Rise of Secure Access Service Edge

  Presented by Bitglass

Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms are built for this exact moment.

In this presentation, you will learn:

  • The core components SASE
  • The functionality you need to secure cloud, web, and remote access use cases
  • Architectural considerations for SASE platforms

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

[1 CPE] How Zero-Trust Enables the Future of “Work from Anywhere” Secure Access

  Presented by Duo Security

The perimeter-focused security model of decades past is no longer adequate for securing the modern enterprise. Now, organizations must secure a mobile workforce using a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks — and this trend only accelerated during 2020’s global shift to remote work. Fortunately, a modern access strategy built on zero-trust fundamentals can defend today’s workforce while paving the way to a passwordless future. Attend this session to learn how the zero-trust access model works, reduce your reliance on passwords and risk of password-based attacks, and how to start planning and staging your zero-trust evolution today.

[1 CPE] Leveraging Assessment Findings to Harden Your Security Perimeter

  Presented by Fortinet

Are you regularly evaluating your network security?

Performing assessments is a tried-and-true method for improving your security posture, but they can be a daunting task for network security staff who are often short on manpower, expertise, and/or time. Regardless, the benefits of running assessments almost always outweigh any potential drawbacks. Having a security assessment in hand will increase your security situational awareness and significantly impact your organization’s risk preparedness and mitigation.

Join us as we discuss the importance of periodically validating your existing security controls and provide learnings and best practices from our experts.