[1 CPE] PKIaaS: Empowering Trust in a Dynamic Digital Landscape

  Presented by Matt Rose, Manager, Technical Sales Consulting • Entrust

Digital transformation accelerates at a fast pace, and organizations struggle to secure their digital identities. PKI as a Service (PKIaaS) is a game changer for security. It isn’t just about keys; it’s a blend of agility, scalability, and trust. PKIaaS will provide:

  • Quick Deployment: PKIaaS deploys and expands in minutes to secure your business use cases.
  • Cloud-Native Scalability: Growth at nearly limitless capabilities
  • Security First: Entrust manages the PKI infrastructure for you

We will also review our integration and the ease in which PKIaaS plays with MDM vendors, Microsoft Active Directory and certificate automation and how to seamlessly leverage PKI with your existing enterprise IT platform.

  • Microsoft Intune: Securely enroll devices, manages their lifecycle, and handle certificates.
  • Other MDM vendors: PKIaaS collaborates seamlessly with various MDM partners, enhancing your Zero Trust strategy.
  • Microsoft Active Directory support
  • ACMEv2 and SCEP (Simple Certificate Enrollment Protocol)

As we continue to navigate security within organizations, PKIaaS will provide the assurance that you need.

[1 CPE] Intelligent SSE: Secure Everything from Anywhere

  Presented by Travis Pinto, Regional Solutions Engineering Manager • Netskope

This session will provide a technical overview of Security Service Edge (SSE), focused on the following topics:

  • Unintentional or unapproved data movement
  • Data protection for internal and external threats
  • Conditional and contextual access to safely enable cloud & SaaS applications
  • Protection from cloud-enabled SaaS and web threats
  • Work from anywhere with a secure, fast experience

You will walk away understanding the fundamentals of SSE and how it will benefit your business.

[1 CPE] Security Trends and Predictions

  Presented by Peter Ingebrigtsen, Sr Technical Marketing Manager • Arctic Wolf

In a dynamic cybersecurity landscape and fast-paced market, organizations grapple with ever-changing threats. Uncertainty abounds as they seek to benchmark themselves against their peers and prioritize initiatives. Join Arctic Wolf Senior Technical Marketing Manager, Peter Ingebrigtsen, as he explores key areas organizations are focusing on, top threat concerns, and responses by established organizations to emerging threats. Leveraging Arctic Wolf research, Peter further presents five critical security predictions for the next 12 months.

[1 CPE] What the Hack is going on! An Offensive Look at Modern Breaches

  Presented by Tim Medin, Chief Executive Officer • Red Siege

Join this session for a comprehensive overview of modern cybersecurity threats and how breaches occur. I will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited.

[1 CPE] Views from the Porch: Tackling the Enablement of a Cybersecurity Workforce

  Presented by Ed Vasko • CISSP, Founder and CEO of s3ntry Corp

Ed Vasko has spent over 30 years leading cybersecurity companies that provide critical services and platforms to clients around the world. Now he is deeply involved in solving the national crisis of not having an effective supply of cybersecurity workers to meet our national needs. In this keynote, he will share a career perspective of how this crisis developed and methods both educators and employers can take to begin solving our needs regionally and nationally. Come be a part of this “porch conversation” and join the discussion.

Ed Vasko, CISSP, is the Founder and CEO of s3ntry Corp. Prior to founding s3ntry corp, he was the director of Boise State University’s Institute of Pervasive Cybersecurity. He is a cybersecurity leader and entrepreneur with over 33 years of experience protecting organizations from cyber adversaries. Before joining Boise State University, Edward established and was a Senior Vice President at Avertium, a leading national managed security and consulting provider. He was the co-Founder and CEO of one of the nation’s largest providers of cybersecurity advisory and managed security services, with over 2,000 active clients around the world.

Edward’s other passion is tackling the challenge of cyber workforce development. He has served on over 20 education advisory boards providing expertise around cybersecurity industry needs. He has been appointed by multiple governors to tackle statewide cybersecurity workforce issues. Most importantly though, Edward is a proud father and husband.

[1 CPE] Global Insights on Identity Security Maturity: Why it Matters? Why Now?

  Presented by Chris Tow, Solutions Engineer • CyberArk

In our global survey of 1,500 identity-related security experts, we found only 9% of organizations have the highest level of maturity. These Transformative organizations have the most mature identity security programs as they strategically focus on four key tenets: tools, integration, automation, and continuous threat detection & response. As a result, these organizations significantly outperform their competition in driving business outcomes and reducing risk. Learn how you can mature your identity security program because the future of security starts with identity.

Key Session Takeaways:

  • Top challenges for identity security
  • The four tenets of identity security
  • How to take a holistic approach to identity security
  • Key considerations in evaluating identity security providers

Chris Tow is a Strategic Solutions Engineer at CyberArk and joined the company in 2023. He has a long history in the cybersecurity space having previously worked at Lookout and Good Technology (now Blackberry). Chris holds a B.S. in Electrical Engineering and Computer Science from the University of California, Berkeley and a Master’s Degree in Computer Science from UCLA.

[1 CPE] Zero Trust Microsegmentation: It’s Easier Than You Think

  Presented by Craig Lockhart, Sr Systems Engineer • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

With over 25 years of experience in the cybersecurity industry, Craig is a seasoned expert in implementing innovative security solutions, specializing in security edge, multi-factor authentication (MFA), remote access, decryption, and Secure Access Service Edge(SASE) technologies. Craig leverages his experience to focus on finding optimum solutions to ensure technology supports business goals. His expertise has been instrumental in deploying robust security infrastructures for numerous large organizations across the western regions.

[1 CPE] Cybersecurity and Compliance For 2024

  Presented by Rob Wayt, Director of Governance, Risk, and Compliance • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI and security best practices. This discussion will focus on security solutions to these challenges, including penetration testing and zero trust implementations. Rob Wayt, Director of Governance, Risk, and Compliance at Structured will be the presenter.

[1 CPE] A Complete Security Blueprint

  Presented by Brad Nigh, Consulting Strategist • FRSecure

By analyzing your existing program, work completed, and using our categorization—foundational, developing, and mature—you should be able to place yourself and get an idea of what’s next for your security program.

Brad Nigh is a passionate information security expert with 25+ years of overall IT experience, including 15+ years of IT management and leadership experience working in 24/7 environments that required top-tier technical skills, and efficient project management. In addition, he has years of experience working in highly regulated industries that are required to comply with PCI-DSS, HIPAA, HITECH, Sarbanes-Oxley, OCC, and various state regulatory requirements. At FRSecure he leads the Consulting Services practice serving businesses of all sizes, in all industries by cooperatively solving the complex issues surrounding information security.

[1 CPE] Rise of Generative AI-Driven Attacks

  Presented by Shan Zhou, Director of Sales Engineering • Vectra AI& Structured

The rise of AI has fundamentally changed what we see, what we know, and what we do. We will delve into the negative and positive impact AI plays in information security with specific examples of the resources, platforms, and methodologies used by adversaries and defenders.