[1 CPE] The Montana Cybersecurity Report

  Presented by Pine Cove Consulting & Sophos

Each year, Pine Cove Consulting analyzes data reported to the Montana Department of Justice. This report shows how many Montanans fell victim to a data breach, how many organizations fell victim to a data breach that affected Montanans, and the average length of data breaches in Montana. In this presentation, we will share our findings and compare the statistics we have observed year over year to find trends. This is the only report produced that analyzes Montana-specific cybersecurity statistics. If you are an IT leader, business executive, or educator, we strongly recommend attending our breakout session so you can be aware of the cyber-threats right here in our backyard.

We will also be joined by Sophos Security who will share how these statistics relate to national and worldwide cybersecurity trends.

[1 CPE] How Zero-Trust Enables the Future of “Work from Anywhere” Secure Access

  Presented by Duo Security

The perimeter-focused security model of decades past is no longer adequate for securing the modern enterprise. Now, organizations must secure a mobile workforce using a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks — and this trend only accelerated during 2020’s global shift to remote work. Fortunately, a modern access strategy built on zero-trust fundamentals can defend today’s workforce while paving the way to a passwordless future. Attend this session to learn how the zero-trust access model works, reduce your reliance on passwords and risk of password-based attacks, and how to start planning and staging your zero-trust evolution today.

[1 CPE] What Got Us Here, Won’t Get Us to Where We’re Going…

  Presented by Aruba, a HPE Company

Over the past couple of decades, we’ve relied on a certain predictable and repeatable model of expectations from our infrastructure that has delivered. However, the demands of Digital Transformation, the pace of change, the capabilities within our teams — and of course the pandemic — have created business pressures that traditional ways of building and security infrastructure just can’t keep pace with.

The time is now to reflect, reset, and embrace a different way that will increase agility and flexibility as well as enhance performance and security. Lose the baggage of the past, travel light, and let’s chart a course for the journey ahead.

[1 CPE] Situational Awareness Into the Dark Web

  Presented by Check Point Software

In our journey through this session, we take you through the evolution, goals, and motivation of the Dark Web. We will share with you what and whom you can find on the platforms as well as the major conflicts individuals face while exploring this web. The session also exposes you to the syndicates and structures running on the platforms. Surprisingly, we see how those groups were among the first to embrace and implement Blockchain technology and created a major global demand for crypto currencies. This is the time to listen, learn, and be exposed to the deepest secrets of the Dark Web.

[1 CPE] Ransomware In Focus: How AI Surgically Contains the Threat

  Presented by Darktrace

In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom or shut down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad-ranging and destructive, with organizations taking days, weeks, or even months to recover.

But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? Join this presentation to learn how Cyber AI is helping thousands of organizations fight back against ransomware. We’ll discuss:

  • The impact of ‘double-extortion’ ransomware and ‘ransomware-as-a-service’
  • Real-world examples of ransomware detected by Cyber AI
  • How self-learning AI responds proportionately to ransomware, thanks to its deep understanding of an organization’s pattern of life

[1 CPE] What Got Us Here, Won’t Get Us to Where We’re Going…

  Presented by Aruba, a HPE Company

Over the past couple of decades, we’ve relied on a certain predictable and repeatable model of expectations from our infrastructure that has delivered. However, the demands of Digital Transformation, the pace of change, the capabilities within our teams — and of course the pandemic — have created business pressures that traditional ways of building and security infrastructure just can’t keep pace with.

The time is now to reflect, reset, and embrace a different way that will increase agility and flexibility as well as enhance performance and security. Lose the baggage of the past, travel light, and let’s chart a course for the journey ahead.

[1 CPE] Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak & Aruba, a HPE Company

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, we’ll discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations

[1 CPE] Protecting Your Data From Cyber Attacks

  Presented by Technology Integration Group

Protecting your Data from Cyber Attacks focuses on the current landscape and how internal/external bad actors have taken advantage of COVID-19 to exploit security gaps within numerous industries. Edge and system-level security isn’t enough. Protecting your data from breaches and manipulation should also be top priority. Hear how to identify, prevent, detect, and recover from a cyberattack. Learn about a cyber recovery solution and how its unique off-network architecture will enhance your overall business continuity plan.

[1 CPE] Cybersecurity, the Path of Most Resistance

  Presented by Dick Wilkinson • Chief Technology Officer, Supreme Court of New Mexico

As computer users continue to expect an increasingly seamless and touchless user experience from their devices, the cybersecurity industry insists on adding more touches and more seams to keep things locked up. This disconnect from users’ expectations to how we implement security controls leads to a variety of problems. It will take the entire industry shifting course to recognize the user’s demands to overcome this disconnect.

Dick Wilkinson is the Chief Technology Officer on staff with the Supreme Court of New Mexico and the Co-founder and CTO of Proof Labs inc. He is a retired Army Warrant Officer with 20 years of experience in the intelligence and cybersecurity field. He has led diverse technical missions ranging from satellite operations and combat field digital forensics to enterprise cybersecurity and cyber research for the Secretary of Defense.

[1 CPE] 5 Steps to Building a Successful SASE Roadmap

  Presented by iboss

Millions of people shifted from working in the office to working remotely, which has resulted in lost productivity due to overloaded VPN connections slowing access to critical cloud applications. With virtually every app delivered in the cloud, why are remote workers sending traffic through the VPN, to begin with? Move your security to the cloud and allow users to connect directly to cloud apps without the VPN. Take these 5 steps when building your SASE cloud migration.