[1 CPE] Securing AI Without Slowing Innovation: A Blueprint for the Future of Cybersecurity

  Presented by Alex Ruff, Principal Solutions Engineer • Trend Micro

AI is transforming the enterprise—bringing new opportunities for efficiency, but also introducing unprecedented risks. From prompt injection and model poisoning to shadow AI and deepfakes, the attack surface is evolving faster than most IT teams can keep up. In this session, we’ll explore Trend Micro’s Security for AI Blueprint, a step-by-step framework for protecting data, models, infrastructure, and users in an AI-driven world. You’ll also see how Trend Micro leverages AI across its own cybersecurity platform, combining decades of research with modern generative AI to deliver proactive protection. Walk away with practical strategies you can apply to safeguard your organization’s AI initiatives—without putting innovation on hold.

[1 CPE] From Chaos to Control: How Zero-Trust Networks Run Themselves

  Presented by Sukesh Garg, Vice President of Products • Nile

Many organizations still manage and secure their campus and branch networks based on a trust model designed for days past — a fragile web of switches, controllers, and security tools stitched together, never designed to secure IoT, sophisticated malware, and evolving AI threats.

The result is operational chaos, well-known vulnerabilities, and the constant feeling that something is missing. In this session, we’ll outline how leading enterprises are shifting to a Network-as-a-Service (NaaS) with completely re-designed architecture that’s built on top of modern Zero Trust Fabric — where Zero Trust security is delivered on day one. No complexity, add-ons, or legacy vulnerabilities.

With Nile, every user and device is isolated by design, micro-segmentation and granular policies provide enhanced identity-based enforcement — without the cost, complexity, and traditional risk.

Key Takeaways:

  • Traditional network security no longer meets today’s evolving security and compliance demands.
  • Zero-Trust compliance is within reach, without years of integration projects and missed timelines.
  • Reducing incidents and regaining operational control starts with a modern approach that aligns network and security requirements.

[1 CPE] Real-Time Threat Mitigation with AI-Driven SASE: A Practical Approach

  Presented by Joe Fontes, Sales Engineer, PNW • Cato Networks

This discussion highlights the current threat landscape associated with current AI tools and how those same foundational technologies can be used to automate threat responses. We will delve into an understanding of current adversaries, an overview of existing defenses, and strategies on extending current defense postures.

[1 CPE] Bridging Zero Trust and SASE: A Unified Approach to Modern Cybersecurity

  Presented by Fortinet

This will be a panel discussion on how organizations can effectively bridge Zero Trust and SASE to create a unified, adaptive cybersecurity architecture that meets the demands of today’s hybrid workforce and threat landscape.

Key Takeaways:

  • Understand the core principles of Zero Trust and SASE, and how they complement each other.
  • Learn practical strategies for implementing a unified approach without adding complexity or disrupting operations.
  • Gain insights into real-world use cases and lessons learned from organizations successfully integrating these frameworks.

Speakers:

  • Joel Robnett, Director of Sales, Tech Heads, Inc.
  • Steve Sims, Owner, Cruxial Technology Group
  • Michael Lippman, Regional Channel SE US, Fortinet
  • Eric Foster, Systems Engineer, Fortinet

[1 CPE] Modernizing the SOC: Transforming your Security Operations

  Presented by JR Silverthorne, Partner Solutions Consultant, West • Palo Alto Networks

So many industry players want to speak to and about tool consolidation and a platformization play in the cybersecurity space. We want to examine the classical SOC model and turn it on its head and reveal how a suite of capabilities enable root cause analysis, risk context, correlation, and automation across an open platform that accepts the widest and largest variety of data sources from the endpoint to the data center to the cloud. Our approach –– Xtended Security Intelligence Automation Management.

If your interest is in achieving the lowest MTTR and MTTD, if you want to detect security incidents and remediate faster, then your path forward has to unify workflows, utilize embedded intelligence, and provide automated responses. Let us show you how Palo Alto with 20,000 employees operates their SOC with just 15 people.

[1 CPE] From Frameworks to Firewalls: A Practical Guide to AI Security

  Presented by Collin Miller • Director, Cloud Security, Structured

As organizations accelerate AI adoption, the security landscape is evolving just as quickly. This presentation explores the foundations of AI security, starting with an overview of emerging AI-specific threats and the importance of structured defense approaches. We will examine leading frameworks—MITRE ATLAS and the NIST AI Risk Management Framework—and how they guide organizations in identifying, assessing, and mitigating AI risks.

We will then focus on Microsoft 365 Copilot, outlining its security architecture and built-in protections, followed by a technical case study on the Echo Leak vulnerability, demonstrating real-world exploitation risks. s a bonus, we will also take a look at the recent SalesDrift vulnerability, and the growing attack surface around LLM chatbot integration and supply chain risks.

Finally, we will provide an overview of Structured’s AI security service offerings. Attendees will gain both strategic insights and practical approaches to securing AI systems, preparing them to meet the challenges of an AI-powered future.

Collin Miller has over two decades of experience in networking and IT security — installing and supporting various types of security software and hardware. He has demonstrated skills in project management, evaluating new security technologies, testing, troubleshooting, and developing procedures and policies for new systems and technology. His past areas of focus include Mobile Device Management and Security, Data Loss Prevention, Zero Trust Network Access, Next-Generation Firewall, and Security Event and Information Management. His current area of focus is Cloud Security

[1 CPE] Threat Detection: Intelligence Insights from the Front Lines

  Presented by David Pier, Sr Sales Engineer • Zscaler

In 2024, Red Canary detected nearly 93,000 threats—an increase of more than a third from the previous year—driven by expanded visibility into cloud and identity infrastructure. For the seventh year, our Threat Detection Report analyzes the most prevalent cyber threats, evolving attack techniques, and the incidents we help customers resolve.

This session will highlight key trends, including email threats, infostealers, and LLM hijacking in the cloud, while breaking down the top 10 MITRE ATT&CK® techniques and most prevalent threats in customer environments. Attendees will gain actionable insights into detection, testing, and prevention strategies to enhance their security posture against today’s evolving threats.

[1 CPE] AI in the Eyes of the Threat Actors vs. the Cyber Defense Line

  Presented by Kelly Brazil, Sr Director, Security Architects • Juniper Networks

In today’s cybersecurity world, AI is making fast moves to improve the defense line, but adversaries are also using AI to build attacks faster and be more precise in entering the victim. Social Engineering, targeted phishing attacks where the text is generated by GenAI engines – make it even simpler to get in.

To overcome what is offered as Attacks as a Service, the Security barrier needs fully meshed security policies, in-line Malware detection powered by AI, and effective ways to identify and mitigate Zero Day Attacks. The goal is to defend an Enterprise faster than the adversaries are moving and mitigate potential breaches by real-time/in-line defense.

Kelly Brazil runs the global Security Specialist Architects team at HPE Juniper Networks. Kelly has 25+ years of experience in cybersecurity and has previously held technical leadership roles at Palo Alto Networks, Fortinet, and various successful security startups. He has traveled the globe as a public speaker evangelizing the latest trends in cybersecurity. Kelly is also active in the Open-Source Software (OSS) community and has developed DevOps automation tools in use by developers, systems administrators, and security practitioners around the world.

[1 CPE] Achieving Ransomware Resilience and Disaster Recovery in a Multi-Cloud World

  Presented by Mike Dusche, DR & Cyber Resilience Specialist • HPE

Discover how to achieve an always-on 24/7 business, ensuring that customers and stakeholders can expect uninterrupted access to their data and applications. Learn how to solve for Ransomware Resilience, Disaster Recovery, and Multi-Cloud mobility for virtualized environments, with continuous data protection (CDP) for any app, any cloud, and any threat. With the right solutions in place, your organization can seamlessly protect critical data and applications, mitigate the risk of ransomware attacks, and maintain business continuity.

Explore strategies for achieving ransomware resilience, automated disaster recovery planning and testing, and flexible hybrid-cloud capabilities that allow you to move applications and scale capacity on demand. By integrating comprehensive data protection measures, you can ensure compliance with regulatory mandates and provide robust resilience against evolving cyber threats. This approach empowers your IT team to focus on strategic initiatives by reducing the burden of manual recovery processes and ensuring rapid restoration of operations.

[1 CPE] Enhancing Cyber Resilience for Active Directory (and Entra ID)

  Presented by Rob Ingenthron, Sr Solution Engineer • Semperis

Cyberattackers are adept at finding ways through your defenses and into identity systems like Active Directory. Many organizations use Active Directory as the primary identity service, and Active Directory is typically tied into almost everything, including Entra ID. From there, they can move laterally, escalate privileges, access sensitive resources, and inject malware or ransomware. Implementing a layered defense that includes identity threat detection and response (ITDR) is key to protecting your operational resilience.

Join Rob Ingenthron, Sr Solution Engineer, to learn:

  • How layered defense has changed over time
  • Why ITDR is now an essential part of a robust layered defense strategy
  • The continuing importance of hygiene and auditing for Active Directory
  • How a layered defense can help you combat attacks that are designed to bypass traditional methods of defense
  • Which best practices lead to a strong layered defense