[1 CPE] Cyber Crisis Retrospective: Learning from a Ransomware Attack

  Presented by Jeremy Pierson, Director of Cybersecurity, and Rainer Engel, Executive Director of Strategic Partnerships • CompuNet

Join us for a real-world analysis of a recent ransomware attack, where we will explore both the human and technical challenges that were faced. This session will delve into the techniques employed by the attackers and organizational roadblocks encountered during the incident. We will also discuss how consultants played an important role in discovering the incident and accelerating the remediation process. Attendees will gain valuable insights into the multifaceted nature of ransomware attacks and learn practical approaches to fortify their defenses and respond effectively to future threats.

[1 CPE] Top-Down Security: Aligning Security with Business Objectives

  Presented by Ben Mayo, Manager of IT & Security • Vision Net, Inc.

Is your organization’s security viewed merely as a cost center, a necessary expense of doing business? Do you face challenges in securing funding for your security initiatives? It’s time to shift the perception and prove that security is not just a cost, but a strategic enabler of business success. This presentation will explore methods to transform your security program into a key business asset, demonstrating tangible value. Learn strategies to align security with business goals and effectively communicate with the C-Suite and board members to gain their support and advocacy for your security initiatives.

[1 CPE] A Small Business Journey to the NIST Cybersecurity Framework 2.0

  Presented by Daniel Eliot • National Institute of Standards and Technology

The NIST Cybersecurity Framework (CSF) 2.0 is here! This is the first major revision of the globally recognized framework since its initial publication in 2014. If that wasn’t exciting enough, NIST also published the CSF 2.0 Small Business Quick Start Guide along with it. As a supplement to the CSF 2.0, the new Small Business Quick Start Guide provides small-to medium-sized businesses (SMB) with resources and considerations to kick-start their cybersecurity risk management strategy using the CSF 2.0. During this talk Daniel Eliot, NIST’s Lead for Small Business Engagement, will provide an overview of updates to the NIST Cybersecurity Framework 2.0 and will showcase the new CSF 2.0 SMB Quick Start Guide and other free NIST small business cybersecurity resources. Eliot will also spend time sharing various ways organizations can get more engaged with NIST’s cybersecurity and privacy work.

Daniel Eliot is the lead for small business engagement within the National Institute of Standards and Technology’s Applied Cybersecurity Division. In this role, he works across NIST’s cybersecurity and privacy program to advise and support development of cybersecurity resources, communication materials, and collateral tailored for use by small businesses. He also regularly works directly with the small business community and their advocates through external outreach and engagement. Immediately prior to joining NIST, Daniel worked within MITRE Corporation’s Center for Securing the Homeland, serving as the chief communications strategist at the NIST National Cybersecurity Center of Excellence. In prior roles he has also served as the director of education for the National Cybersecurity Alliance and manager of technology business development for the University of Delaware Office of Economic Innovation and Partnerships.

[1 CPE] Enhancing Cyber Resilience: Integrating AI Strategies

  Presented by Dr. Cheryl Cooper, CISSP, President, & Naeem Babri, Vice President • WiCyS Kansas City

The convergence of business continuity, information security, and organizational resilience forms the cornerstone of cyber resilience, enabling entities to prevent, endure, and recover from cyber threats. This presentation delves into the enhancement of ransomware resilience, with a spotlight on fortifying the Lockheed Martin Cyber Kill Chain. Amidst the escalating prevalence of ransomware, which inflicts substantial financial and operational harm, the presentation will outline strategies to strengthen defenses. The emphasis will be on preemptive actions and incident management, covering backups, recovery processes, containment, and the imperative of employee training on phishing and secure password practices.

Looking ahead, the session will explore the emerging threat of AI-driven ransomware attacks and discuss strategies for future-proofing networks against these sophisticated threats.

There will be three main deliverables:

  1. A comprehensive guide to implementing the Lockheed Martin Cyber Kill Chain for ransomware threat mitigation.
  2. A strategic playbook for integrating artificial intelligence in cyber defense mechanisms.
  3. An actionable framework for employee education and incident response to enhance organizational cyber resilience.

Dr. Cheryl Cooper has over 25 years of experience within the technology and cybersecurity industries, and on top of that, Dr. Cooper served in the U.S. Navy as a Telecom Technology Controller. Under her belt, she holds a doctorate in Computer Science with a concentration in Information Assurance, a Master’s of Science in Criminal Justice with a Specialization in Cybercrime, and multiple certifications– Information System Security Professional (CISSP) under the governing body of the International Information Systems Security Certification Consortium (ISC2), a Certified Data Privacy Solution Engineer (CDPSE) under the governing body ISACA, and a Certified Information Systems Security Auditor (CISSA).

[1 CPE] Navigating the Post-Quantum Encryption Landscape in Data Management Technologies

  Presented by Mauricio Daher, Technical Expert, Data Intelligence and Content Solutions • Hitachi Vantara

Post Quantum Encryption, and how products need to adapt in this brave new world. There is a lot of talk about Generative AI, LLMs, GTP, but if we cannot secure our data – confidentiality, integrity, and availability – perimeter, then nothing else matters. This session will dive into security topics relevant to the landscape of data management technologies we have on-hand today from the top storage solution companies. The challenges for the next five years will require game-changing innovation to keep up with an exponentially expanding threat surface. The winner will be the one to secure the future for the rest until the next bubble comes along.

Currently, Mauricio is a Technical Expert for Data Intelligence and Content: A technical leader in support of Hitachi Vantara’s content business for the Americas. This involves providing technical guidance, and solutions crafting to the sales teams across the organization, working hand in hand with the solution sales specialists.

Before joining HDS, Mauricio was the Regional Solutions Advisor for Dell in the Northeast, focusing on Compellent and EqualLogic storage solutions, and supporting 5 systems engineers from a knowledge management, measurement, and orientation perspective. Prior to Dell, Mauricio was AVP of Data Protection for RBS Citizens Bank based in Rhode Island where he provided strategic leadership in the bank’s data protection architecture and the creation of a service catalog and storage economics model for production storage and BURA. Before RBS Citizens, Mauricio was a Principal Consultant with Glass House during which time he delivered some two dozen strategic engagements in storage and data protection to companies spanning segments like government, airlines, healthcare as well as financial institutions. Before Glass House, Mauricio ran a delivery practice at McData that implemented SAN-based storage and tape virtualization solutions to a variety of enterprise clients such as Wells Fargo, Bank of New York, and a dozen smaller companies.

Mauricio holds an S.M. in Civil and Environmental Engineering with a focus on Information Systems from M.I.T. and a B.S. in Mechanical Engineering from Boston University.

[1 CPE] Global Insights on Identity Security Maturity: Why it Matters? Why Now?

  Presented by Jed Knopf, Solutions Architect • CyberArk

In our global survey of 1,500 identity-related security experts, we found only 9% of organizations have the highest level of maturity. These Transformative organizations have the most mature identity security programs as they strategically focus on four key tenets: tools, integration, automation, and continuous threat detection & response. As a result, these organizations significantly outperform their competition in driving business outcomes and reducing risk. Learn how you can mature your identity security program because the future of security starts with identity.

Key Session Takeaways:

  • Top challenges for identity security
  • The four tenets of identity security
  • How to take a holistic approach to identity security
  • Key considerations in evaluating identity security providers

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Todd Bertchume, Technical Marketing Engineer • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Todd Bertchume is a Technical Marketing Engineer at Forescout. He brings over 23 years of experience in the networking industry working on the partner, customer, and manufacturer side of the business. He holds many industry certifications in networking and security. Over the years, he has helped many customers building data centers and spent the last few years specializing in securing assets in the health care industry.

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Todd Bertchume, Technical Marketing Engineer • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Todd Bertchume is a Technical Marketing Engineer at Forescout. He brings over 23 years of experience in the networking industry working on the partner, customer, and manufacturer side of the business. He holds many industry certifications in networking and security. Over the years, he has helped many customers building data centers and spent the last few years specializing in securing assets in the health care industry.

[1 CPE] Cybersecurity and Compliance For 2024

  Presented by Rob Wayt, Director of Governance, Risk, and Compliance • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI and security best practices. This discussion will focus on security solutions to these challenges, including penetration testing and zero trust implementations. Rob Wayt, Director of Governance, Risk, and Compliance at Structured will be the presenter.

[1 CPE] How AZ’s Collective Public/Private Defense Benefits Your Organization & the AZ Ecosystem

  Presented by Ryan Murray •  AZ DHS and Frank Grimmelmann • ACTRA

ACTRA, and the State of Arizona Department of Homeland Security, will share the objective evidence of how the entire State of Arizona, public sector, and private industry, is coming together to raise the bar for the collective defense of the community. Trust-driven collaborative integration of people, processes, and technology demonstrates the advances to be shared!

We’ll focus on the work being done to deploy defensive tools to ensure cybersecurity readiness, the sharing of actionable intelligence to ensure we all have visibility of the threats impacting our organizations, and even developing the cybersecurity workforce of tomorrow. Become part of the conversation and join us in the collaborative communication to better secure the entire state!

Speakers:
Ryan Murray, Deputy Director, Arizona Department of Homeland Security & CISO State of Arizona
Frank J. Grimmelmann, President & CEO, Arizona Cyber Threat Response Alliance, Inc. (ACTRA)

Ryan Murray joined the Arizona Department of Homeland Security in July 2021 and currently serves as the Deputy Director over Cyber Command and as the Interim Chief Information Security Officer for the State. He also previously served as the Chief Information Security Officer for the Arizona Department of Revenue for three and a half years. In his current role, Deputy Director Murray provides tactical and operational leadership for Cyber Command, and strategic planning, facilitation, and coordination of cybersecurity efforts throughout the State.

Frank J. Grimmelmann serves as President & CEO for the Arizona Cyber Threat Response Alliance (ACTRA), a non-profit entity that was developed collaboratively with the Arizona InfraGard Program, the FBI, USDHS, and law enforcement, and independently launched in 2013 to enable its private/public sector member organizations across all critical sectors to enable themselves to respond to the escalating national cybersecurity threat.