[1 CPE] Security vs. Compliance: Turning InfoSec Success into Audit Wins

  Presented by Tripwire

Security and compliance teams both strive to design, establish, and enforce controls to protect an organization. But even with shared goals in place, security and compliance teams often manage business risk in relative isolation. So how can these teams set aside tension and work better together to create a winning alliance?

In this session, we explore the key differences between security and compliance initiatives. It’s crucial to understand that being fully compliant doesn’t necessarily mean an organization is fundamentally secure. We’ll cover how the two initiatives complement each other when it comes to minimizing risk and how both teams can collaborate to create efficiencies. Attendees will learn how to leverage compliance policies to set the foundation to a robust information security program, while providing true visibility and coverage, consolidating toolsets, and reducing costs. Lastly, we’ll discuss how to ensure that a successful security program can help organizations prepare for an upcoming audit to ultimately achieve and maintain continuous compliance.

[1 CPE] The Top 10 List: Ransomware Preparation

  Presented by Tonaquint Data Center

Carl Wilkins, Director of Cloud Operations for Tonaquint Data Centers provides a Top 10 list of things you can do to mitigate the risk of Ransomware affecting you. Topics will include how to protect your data, how to protect your systems and infrastructure, and situations to be aware of that might indicate the presence of Ransomware in your environment.

[1 CPE] 2021 State of Malware

  Presented by Malwarebytes

Over the past year, the tools and tactics of cybercrime and cybersecurity adapted against a backdrop of enormous changes to our lives and businesses.

Join us to learn how cybercrime evolved in 2020 and identify ways to safeguard your organization against what’s out there.

We’ll explore:

  • Top threats for businesses and consumers
  • Emerging cybercrime trends and tactics
  • Solutions you can employ to thwart future attacks

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

[1 CPE] Privacy is Coming and It’s Going to Change Everything!

  Presented by Howard Loos • Chief Information Privacy Officer, Brigham Young University

Security is the most important concern for your data, right? This is true, however, the focus on data privacy has become much more relevant over the last couple of years. Join Howard Loos, for a high-level overview of the current US privacy landscape and how current laws protect specific types of Personally Identifiable Information (PII). Howard will discuss how GDPR and other growing “general” privacy laws will change how information is viewed by the business and managed by IT.

You will get a summary of the nine guiding principles to help comply with the new privacy environment. This presentation will be a good starting point for all IT professionals to get a better handle on the changing Data Privacy landscape.

Howard Loos, CRM, IGP, CIPP/US has more than 25 years of experience in the governance of information, focusing on Data Privacy and Records & Information Management. During most of those years, Howard worked as a consultant, working in the Financial, Manufacturing, Oil & Gas, and Technology industries, as well as Education and Federal Government. His specialties include reducing an organization’s information related risk, strategy & program development, organizational governance, requirements gathering, and vendor selection.

Howard attended the University of North Dakota, where he received his bachelor’s degree, majoring in both Business Administration and Records and Information Management. He later received an MBA from the same university.

Howard is a Certified Records Manager, Information Governance Professional, Certified Information Privacy Professional, and Certified Change Practitioner. He currently works at Brigham Young University as the Chief Information Privacy Officer & Director of Information Management.

[1 CPE] Modern Applications and Creative Attackers: Application Security in Flux

  Presented by Imperva

The rise of ransom DDoS attacks is just one indication that application security attacks are more complex and targeted than ever. Attacks are now targeting business logic via APIs and microservices, leveraging malicious bots to steal your customers’ accounts. Application security that only protects against the OWASP top 10 attacks delivers insufficient protection in today’s threat landscape. Join our CTO, Kunal Anand, as he explores these challenges and offers insight into what you can be doing today to help protect your tomorrow.

[1 CPE] Automating the Analyst

  Presented by Darktrace

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks are rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms. Join Darktrace as we discuss the Cyber AI Analyst in action.

[1 CPE] Incredible Ways to Hack Email & How to Stop the Bad Guys

  Presented by KnowBe4

Email is still a top attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join us as we explore some of the ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. We will also share a special treat – a (pre-recorded) hacking demo by Kevin Mitnick.

You will learn:

  • How silent malware launches, remote password hash capture, and how rogue rules work.
  • Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective.
  • Details behind clickjacking and web beacons.
  • Actionable steps on how to defend against them all.

If all you were worried about were phishing attempts, think again!

[1 CPE] How Zero-Trust Enables the Future of “Work from Anywhere” Secure Access

  Presented by Cisco & Duo Security

The perimeter-focused security model of decades past is no longer adequate for securing the modern enterprise. Now, organizations must secure a mobile workforce using a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks — and this trend only accelerated during 2020’s global shift to remote work. Fortunately, a modern access strategy built on zero-trust fundamentals can defend today’s workforce while paving the way to a passwordless future. Attend this session to learn how the zero-trust access model works, reduce your reliance on passwords and risk of password-based attacks, and how to start planning and staging your zero-trust evolution today.