[1 CPE] Has Security Awareness Been Forgotten? An Interactive Panel Discussion

  Presented by INTERFACE Advisory Council

“Just automate that process! The firewall is fine—we’ve got an AI tool watching it.”

Sound familiar? Despite significant investments in cybersecurity and advanced tools, the human element remains one of the greatest vulnerabilities in any organization. This isn’t a new problem—ransomware attacks continue to thrive due to human error.

Insider threats, whether intentional or accidental, are often at the root of security breaches. So, what proactive steps are you taking to mitigate these risks?

Join the INTERFACE Salt Lake City Advisory Council for an engaging discussion on defending against internal threats. Local IT leaders will share their strategies, lessons learned, and practical tips for minimizing human error in cybersecurity. Bring your questions and join the conversation as we explore what’s working, what’s not, and what more needs to be done to protect our networks from within.

Moderator: Bryan Wilkins, Sr Manager-Information Security, Space Dynamics Laboratory

Panelists:

  • James Duckett, Assistant Operations Director, Technology Division, City of St. George
  • Michael Hughes, Director, Information Technology, Mission Health Services
  • Mike O’Rourke, Manager, IT Operations, Tata Chemicals North America
  • Greg Pugh, Manager, COMSEC, Space Dynamics Laboratory

[1 CPE] Go Hack Yourself: More War Stories from over 150,000 Pentests

  Presented by Jake Mickley, Sr Solutions Architect • Horizon3.ai

Join Jake Mickley, Senior Solutions Architect, for an engaging session on “Offense-Driven Defense.” Jake will challenge conventional risk assessment practices and unveil how focusing on real-world exploitability and impact can revolutionize your security approach. Drawing from insights gathered across more than 150,000 autonomous pentests, he’ll share compelling stories and actionable lessons that show how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and strengthen your defenses against advanced threats. Don’t miss this opportunity to learn from a leading industry practitioner on why it’s time to “go hack yourself” and build resilience in today’s borderless threat environment.

[1 CPE] Data Security: Why Now?

  Presented by Michael ‘Fergo’ Ferguson, Principal Strategist, Security Services & Evangelist • Cyera

In an era of exponential data growth, fueled by GenAI and data democratization, the need for strong data security has never been greater. Join this session to explore how organizations can safeguard sensitive data while still driving innovation and agility, including:

  • Strategies for balancing robust data protection with business enablement in a fast-changing digital environment.
  • Approaches to tackling the unique security challenges introduced by GenAI and expanded enterprise data access.
  • Tactics for aligning key stakeholders and building consensus around data security priorities.

Michael Ferguson, known as Fergo, is the Data Security Services Strategist at Cyera. With 20 years of experience in Data, Web, Cloud, and Email Security technologies, he specializes in Data Security and Zero Trust initiatives. As the author of Netskope’s SASE Accreditation, Cyera DSPM Security Architect accreditation, Fergo has played a key role in shaping data security strategies for multinational organizations across the UK, Germany, Australia, and the USA.

[1 CPE] Taking A Data-First Approach to Cyber Risk Management

  Presented by Austin Starowicz, Director, Solutions Consulting • Mastercard Cybersecurity

Cyber Risk Management has evolved. Every new vulnerability or regulation adds further pressures on already stretched teams to predict and manage the weakest links within your internal IT infrastructure. Piling on to today’s cyber risk landscape is the ever-expanding digital supply chain, and the need to onboard, assess, and monitor third parties, fourth parties, and Nth parties.

But does it really have to be that way?

Join this session from Mastercard Cybersecurity for an exclusive presentation on how a proactive “data-first” approach to cyber risk management can help you:

  • Improve monitoring for critical vulnerabilities to determine which ones really matter
  • Identify, Prioritize and Assess affected third parties in real-time
  • Leverage objective risk data into the decision-making processes
  • Streamline workflows and scale your operations

[1 CPE] Corporate Resiliency in the Age of Ransomware

  Presented by Ritchie Blount, Lead Technical Expert, Cyber Resiliency & Security • Hitachi Vantara

Ritchie Blount is a seasoned cybersecurity professional with deep expertise in cyber resiliency, enterprise defense architecture, and security risk management. As a Lead Technical Expert, Ritchie has spent over two decades designing and implementing resilient frameworks that safeguard mission-critical systems & data structures against advanced threats.

With a career grounded in both technical innovation and strategic leadership at Microsoft, Dell, and now Hitachi, Ritchie has guided cross-functional teams in high-stakes environments, delivering scalable solutions that meet today’s evolving cyber challenges. His work bridges the gap between policy, technology, and operational effectiveness –– ensuring organizations stay secure, adaptable, and resilient.

As trusted advisor to government and industry partners alike, Ritchie brings clarity to complex security issues on topics including threat mitigation, incident response planning, and zero trust architecture.

[1 CPE] Blind Spots in Cybersecurity: Identifying Hidden Risks in Your Environment

  Presented by Tanner Harrison, Systems Engineer • Fortinet

In this session, we’ll explore where hidden risks often lurk and share practical strategies to identify, address, and prevent them. From proven techniques to close security gaps to Zero-Trust and cloud-first solutions, you’ll leave with actionable insights to strengthen your defenses and build a more resilient, proactive security posture.

Key Takeaways:

  • Pinpoint common areas where security blind spots exist in organizations
  • Proven techniques to close critical gaps and reduce exposure
  • Insights for continuously monitoring and responding to evolving threats in real time
  • Practical steps for fostering a proactive, security-first culture across your organization

[1 CPE] Securing AI Without Slowing Innovation: A Blueprint for the Future of Cybersecurity

  Presented by Yama Sadaat, Sr Solutions Engineer • Trend Micro

AI is transforming the enterprise—bringing new opportunities for efficiency, but also introducing unprecedented risks. From prompt injection and model poisoning to shadow AI and deepfakes, the attack surface is evolving faster than most IT teams can keep up. In this session, we’ll explore Trend Micro’s Security for AI Blueprint, a step-by-step framework for protecting data, models, infrastructure, and users in an AI-driven world. You’ll also see how Trend Micro leverages AI across its own cybersecurity platform, combining decades of research with modern generative AI to deliver proactive protection. Walk away with practical strategies you can apply to safeguard your organization’s AI initiatives—without putting innovation on hold.

[1 CPE] Crisis to Confidence: Enhance Your Incident Response & Recovery with Data Protection

  Presented by Zach Wood, Solutions Architect • Druva

In today’s threat landscape, resilience isn’t just about bouncing back—it’s about bouncing forward. Join us for a dynamic session that redefines how organizations approach data protection, recovery, and cyber resilience.

Discover why traditional backup is no longer enough and how modern, SaaS-native strategies can eliminate blind spots, reduce risk, and give you a real competitive edge. We’ll explore the forces reshaping security and IT teams, expose the gaps legacy tools leave behind, and walk through real-world use cases that show how leading organizations are transforming reactive recovery into proactive resilience.

Whether you’re navigating ransomware threats, managing sprawling SaaS ecosystems, or trying to do more with less, this session will equip you with a practical path to greater confidence and control.

Zach Wood is a seasoned Solutions Architect with over 25 years of experience in data protection, encompassing roles as both a customer and sales engineer. For the past four years, he has been an integral part of Druva, a leader in cloud data protection and management solutions, where he leverages his extensive expertise to assist organizations in safeguarding their critical data assets.

[1 CPE] Let’s Talk About the Realities of Security Partnerships

  Presented by Chris Reid, Cybersecurity Strategist, CISSP • MicroAge

Whether you’ve been in the security space for two months or two decades, chances are you’ve worked with a variety of partners, VARs, and resellers. Maybe you’ve followed a trusted rep to a new organization or adapted to someone new after they moved on. We’ve all been there — and there’s no right or wrong approach.

But here’s the challenge: every partner has their own agenda, preferred vendors, and frameworks. So how do you avoid getting caught in the cycle of:

  • Constantly ripping and replacing hardware and software
  • Navigating conflicting security frameworks
  • Wondering if your “experts” are truly advocating for you
  • Questioning how agnostic their recommendations really are
  • And asking yourself — are they actually listening?

Join us for a candid conversation on how to evaluate vendors, manage relationships, set clear expectations, and recognize when your needs — your budget, your time, and your company’s culture — are truly being considered.

Let’s explore how empathy, transparency, and strategy can reshape how we engage with security partners.

[1 CPE] Why Securing Active Directory and Entra ID is Critical in the Age of Escalating Cyber Threats

  Presented by Ryan Garrett, Sr Sales Engineer • Rubrik

In today’s threat landscape, identity-related attacks are rapidly increasing in both frequency and sophistication, targeting core identity engines like Active Directory and Entra ID. This presentation will explore the modern attacker’s playbook, walking through the typical kill chain and the potential impact on an organization’s environment, spanning on-premises infrastructure, cloud, and SaaS applications. We will analyze the limitations and risks associated with current protection strategies—such as relying on point solutions, exposed backup data, and the complexities of Active Directory and Entra ID restoration, which often involve multiple tools and intricate forest-level recoveries.

The session will emphasize the importance of breaking down silos between identity management, data protection, and security teams. Attendees will come away with practical recommendations for collaborative recovery planning, including the value of conducting mock exercises to ensure readiness. By understanding the evolving threats and rethinking recovery strategies, organizations can better defend their most critical digital assets.