[1 CPE] What Got Us Here, Won’t Get Us to Where We’re Going…

  Presented by Aruba, a HPE Company

Over the past couple of decades, we’ve relied on a certain predictable and repeatable model of expectations from our infrastructure that has delivered. However, the demands of Digital Transformation, the pace of change, the capabilities within our teams — and of course the pandemic — have created business pressures that traditional ways of building and security infrastructure just can’t keep pace with.

The time is now to reflect, reset, and embrace a different way that will increase agility and flexibility as well as enhance performance and security. Lose the baggage of the past, travel light, and let’s chart a course for the journey ahead.

[1CPE] Insider Threat: Education and Awareness

  Presented by InfraGard

Not all organizations have an Insider Threat Program, but they may educate on themes to report on specific behavior. If you see a threat, should you contact law enforcement? Not all insider threats are malicious in intent. Your systems and policies may have vulnerabilities you are not even aware of. Join InfraGard Kansas City for a comprehensive background, as their panel of security awareness professionals provide a range of perspectives on how to deliver messaging to your audiences on Insider Threats. They will also present tips to give you the edge needed to save time when a threat comes your way.


Moderator:

Donna Gomez • Security Risk and Compliance Analyst, Johnson County Government


Panelists:


Theresa Bentch • Director of Physical Security, Garmin
Marc Vasquez • Assistant VP/Security Awareness, UMB Bank
Dr. Cheryl Cooper • Cyber Security Risk Manager, TMobile
Jared Oakden • Regional Security Officer, American Family Insurance
Nick O’Neil • Information Security Administrator, Columbia Insurance Group

[1 CPE] Get the Most Out of SD-WAN Without Over-Investing

  Presented by iboss

Understanding your drivers allows you to expand your bandwidth, maximize scalability, reduce your back-hall data, and simplify and reduce traffic on your network, providing a more efficient, secure experience for your end-users. In this presentation, learn how to integrate seamlessly with SD-WAN solutions to provide cloud-based internet security.

[1 CPE] How Zero-Trust Enables the Future of “Work from Anywhere” Secure Access

  Presented by Duo Security

The perimeter-focused security model of decades past is no longer adequate for securing the modern enterprise. Now, organizations must secure a mobile workforce using a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks — and this trend only accelerated during 2020’s global shift to remote work. Fortunately, a modern access strategy built on zero-trust fundamentals can defend today’s workforce while paving the way to a passwordless future. Attend this session to learn how the zero-trust access model works, reduce your reliance on passwords and risk of password-based attacks, and how to start planning and staging your zero-trust evolution today.

[1 CPE] Security vs. Compliance: Turning InfoSec Success into Audit Wins

  Presented by Tripwire

Security and compliance teams both strive to design, establish, and enforce controls to protect an organization. But even with shared goals in place, security and compliance teams often manage business risk in relative isolation. So how can these teams set aside tension and work better together to create a winning alliance?

In this session, we explore the key differences between security and compliance initiatives. It’s crucial to understand that being fully compliant doesn’t necessarily mean an organization is fundamentally secure. We’ll cover how the two initiatives complement each other when it comes to minimizing risk and how both teams can collaborate to create efficiencies. Attendees will learn how to leverage compliance policies to set the foundation to a robust information security program, while providing true visibility and coverage, consolidating toolsets, and reducing costs. Lastly, we’ll discuss how to ensure that a successful security program can help organizations prepare for an upcoming audit to ultimately achieve and maintain continuous compliance.

[1 CPE] The Rise of Secure Access Service Edge

  Presented by Bitglass

Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms are built for this exact moment.

In this presentation, you will learn:

  • The core components SASE
  • The functionality you need to secure cloud, web, and remote access use cases
  • Architectural considerations for SASE platforms

[1 CPE] Zero Trust: From Theory to Reality in Five Steps

  Presented by Guardicore

Let’s be real. True to its name, there is zero trust about the term “zero trust.” It’s been used as marketecture since its inception. Cut through the fog with this presentation with practical insight and steps to take to ensure your organization makes the most out of ZTA.

[1 CPE] Addressing America’s Cyber Dilemma in the Wake of Cyber Disarray

  Presented by Frank J. Grimmelmann • President & CEO for ACTRA

In the wake of the Colonial Pipeline Ransomware Attack, the Solarwinds compromise, and the Microsoft Breach, it’s easy to lose focus on the big picture and how our institutions are responding to the increasingly hostile threat landscape and capable adversaries! This session will briefly highlight significant trends in the threat landscape driving response, explore the team put in place by Washington’s new administration to address the threat, reveal the policy foundation and current execution roadmap, and evaluate the balance between Active Defense and Privacy/Cybersecurity considerations. This session will engage you and leave you with several questions to consider in shaping your own priorities in response to our country’s direction in responding to the ‘clear and apparent cyber danger’ that evidences itself daily.

Mr. Frank J. Grimmelmann serves as President & CEO for the Arizona Cyber Threat Response Alliance (ACTRA), a non-profit entity, that was developed collaboratively with the FBI’s Arizona InfraGard Program and independently launched in 2013 to enable its private/public sector members to enable themselves to respond to the escalating national cybersecurity threat.

Mr. Grimmelmann Co-Chairs Governor Ducey’s AZ Cybersecurity Team (‘ACT’) and is a Founding Member of President Obama’s National ISAO Leadership Group at the University of Texas at San Antonio (UTSA). As ACTRA’s leader, Mr. Grimmelmann was the first private sector representative in the Arizona Counter Terrorism Information Center (ACTIC) on its Executive Board. He has held C-level positions in Finance, healthcare, and government, focusing on cybersecurity in response to 9/11. He holds an MBA in Finance/International Business from UC Berkeley and a BA in Operations with a Business Law minor from the University of South Florida.

[1 CPE] What Got Us Here, Won’t Get Us to Where We’re Going…

  Presented by Aruba, a HPE Company

Over the past couple of decades, we’ve relied on a certain predictable and repeatable model of expectations from our infrastructure that has delivered. However, the demands of Digital Transformation, the pace of change, the capabilities within our teams — and of course the pandemic — have created business pressures that traditional ways of building and security infrastructure just can’t keep pace with.

The time is now to reflect, reset, and embrace a different way that will increase agility and flexibility as well as enhance performance and security. Lose the baggage of the past, travel light, and let’s chart a course for the journey ahead.

[1 CPE] Ransomware In Focus: How AI Surgically Contains the Threat

  Presented by Darktrace

In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom or shut down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad-ranging and destructive, with organizations taking days, weeks, or even months to recover.

But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? Join this presentation to learn how Cyber AI is helping thousands of organizations fight back against ransomware. We’ll discuss:

  • The impact of ‘double-extortion’ ransomware and ‘ransomware-as-a-service’
  • Real-world examples of ransomware detected by Cyber AI
  • How self-learning AI responds proportionately to ransomware, thanks to its deep understanding of an organization’s pattern of life