[1 CPE] What the Hack is going on! An Offensive Look at Modern Breaches

  Presented by Tim Medin, Chief Executive Officer • Red Siege

Join this session for a comprehensive overview of modern cybersecurity threats and how breaches occur. I will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited.

[1 CPE] Views from the Porch: Tackling the Enablement of a Cybersecurity Workforce

  Presented by Ed Vasko • CISSP, Founder and CEO of s3ntry Corp

Ed Vasko has spent over 30 years leading cybersecurity companies that provide critical services and platforms to clients around the world. Now he is deeply involved in solving the national crisis of not having an effective supply of cybersecurity workers to meet our national needs. In this keynote, he will share a career perspective of how this crisis developed and methods both educators and employers can take to begin solving our needs regionally and nationally. Come be a part of this “porch conversation” and join the discussion.

Ed Vasko, CISSP, is the Founder and CEO of s3ntry Corp. Prior to founding s3ntry corp, he was the director of Boise State University’s Institute of Pervasive Cybersecurity. He is a cybersecurity leader and entrepreneur with over 33 years of experience protecting organizations from cyber adversaries. Before joining Boise State University, Edward established and was a Senior Vice President at Avertium, a leading national managed security and consulting provider. He was the co-Founder and CEO of one of the nation’s largest providers of cybersecurity advisory and managed security services, with over 2,000 active clients around the world.

Edward’s other passion is tackling the challenge of cyber workforce development. He has served on over 20 education advisory boards providing expertise around cybersecurity industry needs. He has been appointed by multiple governors to tackle statewide cybersecurity workforce issues. Most importantly though, Edward is a proud father and husband.

[1 CPE] Global Insights on Identity Security Maturity: Why it Matters? Why Now?

  Presented by Chris Tow, Solutions Engineer • CyberArk

In our global survey of 1,500 identity-related security experts, we found only 9% of organizations have the highest level of maturity. These Transformative organizations have the most mature identity security programs as they strategically focus on four key tenets: tools, integration, automation, and continuous threat detection & response. As a result, these organizations significantly outperform their competition in driving business outcomes and reducing risk. Learn how you can mature your identity security program because the future of security starts with identity.

Key Session Takeaways:

  • Top challenges for identity security
  • The four tenets of identity security
  • How to take a holistic approach to identity security
  • Key considerations in evaluating identity security providers

Chris Tow is a Strategic Solutions Engineer at CyberArk and joined the company in 2023. He has a long history in the cybersecurity space having previously worked at Lookout and Good Technology (now Blackberry). Chris holds a B.S. in Electrical Engineering and Computer Science from the University of California, Berkeley and a Master’s Degree in Computer Science from UCLA.

[1 CPE] Zero Trust Microsegmentation: It’s Easier Than You Think

  Presented by Craig Lockhart, Sr Systems Engineer • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

With over 25 years of experience in the cybersecurity industry, Craig is a seasoned expert in implementing innovative security solutions, specializing in security edge, multi-factor authentication (MFA), remote access, decryption, and Secure Access Service Edge(SASE) technologies. Craig leverages his experience to focus on finding optimum solutions to ensure technology supports business goals. His expertise has been instrumental in deploying robust security infrastructures for numerous large organizations across the western regions.

[1 CPE] Cybersecurity and Compliance For 2024

  Presented by Rob Wayt, Director of Governance, Risk, and Compliance • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI and security best practices. This discussion will focus on security solutions to these challenges, including penetration testing and zero trust implementations. Rob Wayt, Director of Governance, Risk, and Compliance at Structured will be the presenter.

[1 CPE] A Complete Security Blueprint

  Presented by Brad Nigh, Consulting Strategist • FRSecure

By analyzing your existing program, work completed, and using our categorization—foundational, developing, and mature—you should be able to place yourself and get an idea of what’s next for your security program.

Brad Nigh is a passionate information security expert with 25+ years of overall IT experience, including 15+ years of IT management and leadership experience working in 24/7 environments that required top-tier technical skills, and efficient project management. In addition, he has years of experience working in highly regulated industries that are required to comply with PCI-DSS, HIPAA, HITECH, Sarbanes-Oxley, OCC, and various state regulatory requirements. At FRSecure he leads the Consulting Services practice serving businesses of all sizes, in all industries by cooperatively solving the complex issues surrounding information security.

[1 CPE] Penetration Testing War Stories

  Presented by Jamie Maguire, Sr Security Engineer • High Point Networks

Penetration testing, often referred to as pen testing, is the practice of testing a computer system, network, or web application to find vulnerabilities that an attacker could exploit. It involves simulating cyberattacks to identify and fix security issues before they can be exploited by malicious actors. In this session, we will review penetration tests performed by High Point Networks and discuss the specific vulnerabilities exploited, and how to remediate them.

[1 CPE] Demystifying Zero Trust: Simplifying Network Security

  Presented by Tanner Harrison, Systems Engineer • Fortinet

Today’s ever-changing threat landscape challenges traditional security models. The emergence of the Zero Trust model represents a transformative approach, reshaping how organizations protect their assets. This presentation aims to demystify Zero Trust, offering a comprehensive understanding that goes beyond buzzwords. We will explore the foundational concepts of Zero Trust, emphasizing the “never trust, always verify” philosophy. By the end of this session, attendees will be equipped with the knowledge to begin their Zero Trust journey, enhancing their security posture, and protecting critical data and systems from modern threats. Whether you are a security professional, IT manager, or organizational leader, this discussion will empower you to take decisive action toward a more secure future.

[1 CPE] A Review of FRSecure’s Annual Information Security Report

  Presented by John Harmon, Chief Executive Officer • FRSecure

FRSecure (an Information Security company located in Edina, MN) took the results of +/- 400 Validated Information Security Assessments and 55 Incident Response Engagements conducted in 2022 and created an anonymized report from the data called: The State of Information Security. Full details and access to the report are available here: https://frsecure.com/2023-annual-infosec-report/

In this presentation, FRSecure Information Security Consultant Dave Tuckman will highlight key findings in the report, and what we can learn from it.

Understand how you can mitigate risk going forward to protect your business and clients in an ever-changing threat landscape. Dave will provide additional perspective on how you can leverage this information for a better understanding of your third-party (supply, vendor, contractor) relationships.

Topics include:

  • FRSecure’s Annual State of InfoSec Report, informed by over 400 validated security assessments
  • Where organizations are getting it right vs. falling behind
  • How you can use this report to inform your own business’s security decisions
  • How you can use this report to inform your business’s Third-Party Risk Management

[1 CPE] AI and Social Engineering: The New Frontier of Cybersecurity

  Presented by Sherri Davidoff • Chief Executive Officer, LMG Security

Artificial intelligence is transforming the cyber battlefield. Hackers now use voice cloning, deep fakes, and AI-generated phishing attacks to steal funds, infiltrate cloud systems, and deploy malware. Join us in this cutting-edge keynote to witness the latest attack trends, including:

  • Voice Cloning: See a live demo and discover how scammers manipulate this technology.
  • Dark Web AI: View the latest AI hacker tools up for sale.
  • Text and QR Code Attacks: Learn how mobile threats can slip past traditional security.

Cybersecurity is all about people. We’ll wrap up with top strategies for cybersecurity training and staffing, showing you how to create a “human firewall” to safeguard your organization against these evolving threats.

Sherri Davidoff is the CEO of LMG Security and the author of three books, including “Ransomware and Cyber Extortion” and “Data Breaches: Crisis and Opportunity.” As a recognized expert in cybersecurity, she has been called a “security badass” by The New York Times. Sherri is a GIAC-certified forensic analyst (GCFA) and penetration tester (GPEN) and received her degree in computer science and electrical engineering from MIT.