How to Accelerate to the Cloud with Data Protection

  Presented by Clumio & Structured

Customers have a cloud-first mandate and SaaS is the easy button. Backup-as-a-Service is the easy button for Data Protection. To get to the cloud, you need seamless migration and a solid data protection strategy. In this session, we’ll talk about the challenges with current data protection approaches and why they can’t be used to protect your data in the cloud. You’ll learn how SaaS data protection that is built for the cloud replaces the cost and limitations of existing solutions helps customers overcome those challenges. With one agile, scalable and simple service, you can protect multiple datasources across clouds- on-premises, public cloud and SaaS.

Master the Edge: How to Achieve Context-Aware, Zero Trust Network Access

  Presented by Aruba & Structured

Have you been tasked with implementing Zero Trust Network Access but are unsure of how to go about it? Are you confused about how to achieve “minimum access”? Are you struggling with employing “continuous adaptive risk & trust assessment” on your network? If so, attend this session. Learn how to deploy an open, multi-vendor Enterprise security framework that gives security and IT teams an integrated way to gain visibility, control, and advanced threat defense. See how security prioritization and machine learning helps organizations leverage existing third-party solutions to better protect investments and implement proactive risk controls.

It Ain’t Done ‘Til It’s Automated: Security at the Speed of DevOps

  Presented by Check Point

Companies are rapidly migrating applications and workloads to the cloud. For many this is a Software as a Service for a first option, with migration to public cloud second, and only if necessary will workloads be deployed inside of the legacy data center. This is further complicated by the desire to accelerate the development lifecycle allowing devops to drive the IT migration. InfoSec is playing catchup to the business and devops constant acceleration.

In this session, you will learn strategies and best practices for allowing SecOps to keep up with the Speed of DevOps, as well as fundamental security knowledge applicable for any workload migration to any cloud provider.

You’ve Got Mail

  Presented by LGIT

Cyber threats in email are still a useful tool from malicious groups. In this session, we will discuss how to forensically analyze emails from head to foot and everything in between. You will learn how to spot suspicious email and confidently determine if it is malicious. Join the LGIT group for a practical discussion on dealing with threats.

Speakers:
Zach Tielking • Information Security Analyst, State of Montana
Trever Hass • Information Security Analyst, State of Montana

Cyber-Threats in Montana and Worldwide

  Presented by Pine Cove Consulting

In this presentation we will share our findings on the current outlook of cyber-attacks in Montana including the number of organizations that have suffered a data breach that has affected Montanans, the number of Montanans that have been affected by data breaches, and the average length of data breaches. We will also analyze the three-year trend for each of these statistics. Sophos Security will join us and give us a nation and worldwide state of affairs for cyber-threats and ransomware.

You can’t protect your organization if you aren’t educated on the threats. Join our presentation to get a better view of the current threat landscape to organizations in Montana, the United States, and worldwide. We will also share tips and best practices for securing your organization against these threats.

Office 365 Security Best Practices: At the Office, at Home, and on the Road

  Presented by Mimecast

Cyber-hygiene has become a source of great concern of late. And while the Office 365 suite has helped communication and collaboration from multiple location points (at the office, at home, and on the road) there are still security concerns that must be mitigated. In this presentation, we will hear best practice suggestions for remaining safe while using Office 365. First, we’ll talk about security attitudes, then review CISA concerns with Office 365, and finally offer best practice suggestions and thought leadership. This presentation will be driven by J. Peter Bruzzese… cyber-security advisor and 8x awarded Microsoft MVP (Exchange/Office 365).

Cyber AI and Geopolitics: Managing Tomorrow’s Cyber Risk

  Presented by Darktrace

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher. Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and Americas CISO, JR Tietsort to discuss this new era of cyber-threat and how Cyber AI can help defenders regain the upper hand.

This speaking session will include a Q&A with our experts, and explore:

  • How nation-state attacks are changing
  • How organizations can respond to the classic balance of security and productivity
  • How organizational maturity in risk management is maintained whilst ensuring cyber defense

The State of Cybersecurity

  Presented by Andy Hanks • Chief Information Security Officer, State of Montana

Join the State of Montana’s Chief Information Security Officer, Andy Hanks, on an imaginative journey that utilizes real cybersecurity concepts, frameworks, and resources that State, Local, Tribal, and Territorial (SLTT) governments can use to enhance their cybersecurity posture. Andy discusses the current state of cybersecurity by conceptualizing a State of Cybersecurity that must protect it’s data in a rapidly evolving threat environment where hackers leverage sophisticated tools to launch persistent attacks.

Andy Hanks is a business-driven cybersecurity executive with over 25 years of experience in information technology, a Master of Science in Information Systems, and multiple cybersecurity certifications. As Chief Information Security Officer for the State of Montana, Andy’s mission is to protect citizen’s data. Andy partners with state and federal agencies to identify threats, mitigate vulnerabilities, and reduce risks; and he collaborates with cybersecurity leaders across the nation to develop and implement best practices.

Andy represents Montana’s cybersecurity interests in the State Legislature, State Information Technology Manager’s Council, and the State Information Technology Board. He is chair of the Montana Information Security Advisory Council, a member of the Multi-State Information Sharing and Analysis Center Executive Committee, and a member of the State, Local, Tribal, and Territorial Government Coordinating Council. Andy enjoys backpacking, watching football, and riding his motorcycle.

Infoblox Threat Intelligence Report: July – September 2020

  Presented by Infoblox

This session will dive into recent Threat Intelligence Research including new malware variants and trends that were prominent over the July-September 2020 timeframe. We will examine specific Ransomware, Infostealers, Trojans, and RATS! attacks that surfaced over the last 90 days. Discover tips to improve your defenses and defeat these types of treats.

It Ain’t Done ‘Til It’s Automated: Security at the Speed of DevOps

  Presented by Check Point

Companies are rapidly migrating applications and workloads to the cloud. For many this is a Software as a Service for a first option, with migration to public cloud second, and only if necessary will workloads be deployed inside of the legacy data center. This is further complicated by the desire to accelerate the development lifecycle allowing devops to drive the IT migration. InfoSec is playing catchup to the business and devops constant acceleration.

In this session, you will learn strategies and best practices for allowing SecOps to keep up with the Speed of DevOps, as well as fundamental security knowledge applicable for any workload migration to any cloud provider.