[1 CPE] Are You Prepared? A Discussion on Backups and Security

  Presented by INTERFACE Advisory Council

Since the start of the pandemic, your workflow and office structure have shifted tremendously. The way any firm operates now has adapted to the change in remote workers. While many moves have been made to allow workers to remain efficient, have you kept up with the new security threats? Having a good DR plan is always paramount. Have you tested your plan since the pandemic began?

Join the INTERFACE Advisory Council for an open discussion about these items and more. How does your BC/DR plan need to evolve now? Will your company have a large amount of staff permanently working remotely? We will discuss what controls you need to change, managing secure access, and handling a rise in security threats.

Panelists:
Peter Jurhs • Executive Director, Operations, Nampa School District
Tory Jamison • Executive Director, Cloud Services & Infrastructure, Boise State University
Jerry Hindberg • Assoc Director, Network & Cybersecurity, Lewis-Clark State College
John Stiffler • Director, Corporate IT, Boise Cascade Company

[1 CPE] Cybersecurity Resilience Through Public-Private Partnerships

  Presented by Josh Stemp • Cybersecurity Advisor, CISA

What do I do? Is this beyond my scope of expertise? Where can I get guidance?

These are questions that Cybersecurity professionals ask themselves every day. You may spend your days thinking you are alone; you are not. Join Joshua Stemp to learn how public-private partnerships can strengthen an organization’s cybersecurity posture. He will outline what the Cybersecurity and Infrastructure Security Agency (CISA) is doing to secure the nation from the never- ending barrage of cyber threats.

[1 CPE] Building a Response Strategy to Advanced Threats

  Presented by ExtraHop Networks

The SolarWinds SUNBURST attack was a rude awakening for many security teams, and it won’t be the last time Security leaders face tough questions about how an adversary evaded defenses and stayed hidden. With threats persisting inside the network for months, security teams need a new plan. In this session, CISO Jeff Costlow discusses strategies, including revising existing mental models and incident response processes, to build resilience in the fight against advanced threats.

[1 CPE] Zero Trust: From Theory to Reality in Five Steps

  Presented by Guardicore

Let’s be real. True to its name, there is zero trust about the term “zero trust.” It’s been used as marketecture since its inception. Cut through the fog with this presentation with practical insight and steps to take to ensure your organization makes the most out of ZTA.

[1 CPE] Best Practices for Dealing with the Increasing Costs of a Cyber Event

  Presented by Bradlee Frazer Esquire • Partner, Hawley Troxell

Lawyers and insurance agents are busier than ever dealing with cyber events, hacks, and data breaches! Why are such attacks increasing despite all the systemic countermeasures, consultants, and classes? What are some best practices to think defensively and prepare financially and legally for such an event?


BIO:

Bradlee Frazer is a partner with Hawley Troxell where he chairs the firm’s Internet and Intellectual Property Practice Group. In addition to emphasizing and focusing on all facets of Internet law, Intellectual Property law, and Information Technology law, he also helps clients with related transactional work and litigation.

Brad is a published novelist and has written extensively for national legal publications and law blogs. He is a frequent speaker on internet, intellectual property, and computer law topics and is a regular guest lecturer at Boise State University on those subjects.

A Boise native, Brad began his legal career in 1989 as an intellectual property attorney and commercial litigator at a Boise-based law firm. In 1997 he accepted an in-house position as Senior Intellectual Property Counsel with Fortune 1000 company, Micron Electronics, Inc., and remained there through the company’s merger with Interland, Inc. (now Web.com), then the nation’s largest Web hosting company. He eventually became Deputy General Counsel for Micron Electronics, Inc., and Interland, Inc. From June 2003 to February 2006, Mr. Frazer served as Deputy General Counsel to MPC Computers, LLC, in Nampa, Idaho.

[1 CPE] The Evolution of Physical Security

  Presented by Pine Cove Consulting & Verkada

Physical security is evolving. Security cameras can now store footage locally without NVRs or DVRs. Advanced filtering allows you to quickly find the footage you are looking for. Sharing access to live camera feeds can now be done simply via a link or SMS. Managing system health and providing using permissions is easier than ever. Access control can now integrate seamlessly into your security camera system to provide an added layer of security with real-time visibility.

Join Verkada and its preferred partner, Pine Cove Consulting, for a deep dive into the evolution of physical security systems and the transition to cloud-based physical security.

[1 CPE] Leveraging Assessment Findings to Harden Your Security Perimeter

  Presented by Fortinet

Are you regularly evaluating your network security?

Performing assessments is a tried-and-true method for improving your security posture, but they can be a daunting task for network security staff who are often short on manpower, expertise, and/or time. Regardless, the benefits of running assessments almost always outweigh any potential drawbacks. Having a security assessment in hand will increase your security situational awareness and significantly impact your organization’s risk preparedness and mitigation.

Join us as we discuss the importance of periodically validating your existing security controls and provide learnings and best practices from our experts.

[1 CPE] 2021 State of Malware

  Presented by Malwarebytes

Over the past year, the tools and tactics of cybercrime and cybersecurity adapted against a backdrop of enormous changes to our lives and businesses.

Join us to learn how cybercrime evolved in 2020 and identify ways to safeguard your organization against what’s out there.

We’ll explore:

  • Top threats for businesses and consumers
  • Emerging cybercrime trends and tactics
  • Solutions you can employ to thwart future attacks

[1 CPE] How True Zero-Trust Accelerates Digital Transformation: Customer Cases

  Presented by WootCloud

As the IoT, WFH, and 5G megatrends make traditional network-centric security inadequate, new tools and processes to truly enable zero-trust best practices are essential to achieve secure digital transformation.

On top of this, teams are being asked to automate, analyze, and secure more with existing tools and manual processes. Users and their devices need intelligent access controls baselined on behavior, assets requested, and roles, whether they are corporate-managed or unmanaged.

We are excited to share how tech-forward organizations in education, healthcare, utilities, and more get 100% device and infrastructure visibility across RF or networks with intelligent analysis and remediation to help save their teams time and money to spend on important projects while achieving true Zero-Trust, all at IoT scale.

[1 CPE] Security Operations Center: Build Your Own or SOCaaS

  Presented by High Point Networks

Learn how Security Operations as a Service (SOCaaS) may be a good option for your business. In this session, we will compare and contrast many non-product specific aspects of SOCaaS and traditional Security Information and Events Management (SIEM’s) systems using first- hand real-world examples; the good, bad, and ugly. The purpose of this presentation is to equip the audience with enough knowledge so they can make a more informed decision regarding a traditional SIEM/SOC approach, or SOCaaS approach, when building a Security Operations Center. Presenter Dean Sheley recently lead an initiative to build a Central Security Operations Center for a statewide multi-university educational system while CISO for that state-wide university system.