[1 CPE] Threat Detection: Intelligence Insights from the Front Lines

  Presented by David Pier, Sr Sales Engineer • Red Canary

In 2024, Red Canary detected nearly 93,000 threats—an increase of more than a third from the previous year—driven by expanded visibility into cloud and identity infrastructure. For the seventh year, our Threat Detection Report analyzes the most prevalent cyber threats, evolving attack techniques, and the incidents we help customers resolve.

This session will highlight key trends, including email threats, infostealers, and LLM hijacking in the cloud, while breaking down the top 10 MITRE ATT&CK® techniques and most prevalent threats in customer environments. Attendees will gain actionable insights into detection, testing, and prevention strategies to enhance their security posture against today’s evolving threats.

[1 CPE] From Frameworks to Firewalls: A Practical Guide to AI Security

  Presented by Collin Miller, Director of Cloud Security, and Alex Owen, AI Solutions Engineer • Structured

As organizations accelerate AI adoption, the security landscape is evolving just as quickly. This presentation explores the foundations of AI security, starting with an overview of emerging AI-specific threats and the importance of structured defense approaches. We will examine leading frameworks—MITRE ATLAS and the NIST AI Risk Management Framework—and how they guide organizations in identifying, assessing, and mitigating AI risks.

We will then focus on Microsoft 365 Copilot, outlining its security architecture and built-in protections, followed by a technical case study on the Echo Leak vulnerability, demonstrating real-world exploitation risks.

Finally, we will provide an overview of Structured’s AI security service offerings. Attendees will gain both strategic insights and practical approaches to securing AI systems, preparing them to meet the challenges of an AI-powered future.

[1 CPE] Modern Security: Quantum Computing, AI, and External Key Management in the Cloud

  Presented by Steven Gautier, Principal Solutions Architect • Thales

In this presentation, we will explore the emerging data threats posed by quantum computing and artificial intelligence and discuss their implications for data security. We will also delve into the advantages of external key management for cloud data, examining various strategies for protection, including encryption.

Join us to gain insights into the latest advancements in data security and learn how to safeguard your data against evolving threats.

[1 CPE] A Complete Security Blueprint

  Presented by Chad Spoden, Solutions Architect Manager • FRSecure

In an era of increasingly sophisticated and relentless cyber threats, organizations must take a strategic and structured approach to security. This blueprint offers a comprehensive roadmap for building and maturing a security program—from establishing a solid foundation to addressing advanced threats and ensuring long-term resilience. Designed to be practical and accessible, it emphasizes clarity, prioritization, and continuous improvement. Whether you’re launching a new initiative or refining an existing program, this guide highlights key considerations and provides actionable insights to strengthen your security posture and stay ahead of evolving risks.

[1 CPE] Building a Fortress: Why Allowlisting Traffic is Key to Secure Networks

  Presented by Charles Killmer, Sr Security Analyst and Solution Architect • FRSecure

In this presentation, we’ll explore the critical role of allowlisting in enhancing network security. By focusing on controlling both ingress and egress traffic, allowlisting ensures that only trusted traffic is permitted, reducing the attack surface and minimizing vulnerabilities. Learn how adopting a comprehensive allowlisting strategy can help build a secure, resilient network fortress, protecting your systems from malicious threats and unauthorized access. Whether you’re implementing it for the first time or refining your approach, this session will highlight best practices and common pitfalls.

[1 CPE] Cyber Risk Associated with Quantum Computing

  Presented by BJ Deonarain, Global Alliance Cybersecurity Solutions Director • Hitachi Vantara

Quantum computers can break today’s standard encryption algorithms (RSA, ECC) in minutes relative to time using Shor’s/Grover algorithm. “Harvest Now, Decrypt Later” attacks allow adversaries to steal encrypted data now and crack it when quantum computers mature. Quantum systems themselves are vulnerable to new attack vectors, quantum hacking (side-channel, noise-based), quantum malware, and manipulation of qubit stability. Supply chain attacks targeting quantum hardware, proprietary algorithms, and insider threats are rising as nation-states and cybercriminals escalate espionage efforts. Urgent need for quantum-resistant cryptography and robust quantum cybersecurity measures as quantum adoption accelerates.

BJ Deonarain is a globally focused cybersecurity executive responsible for driving cyber security and cyber resiliency strategy at Hitachi Vantara. With a career spanning technical innovation, client solutions, and cross-functional leadership, BJ combines deep technical expertise with a client-centric approach to mitigate risk and elevate organizational security postures.

[1 CPE] Beyond Cybersecurity: Assembling Resiliency for the Inevitable Breach

  Presented by BJ Deonarain, Global Alliance Cybersecurity Solutions Director • Hitachi Vantara

The Imperative for Resiliency, 100% cyber security is unachievable; breaches are inevitable, where modern threats demand a shift from reactive defense to proactive resilience. Resilience requires mindset and culture change, not just new technology, while focus can sustain operations and limit damage when security fails.

Assembling the resiliency strategic pillars and actions:

  • Risk Assessment: continuous evaluation of assets and vulnerabilities
  • Incident Response: develop, test, and update comprehensive crisis plans
  • Employee Training: ongoing education to make staff the first line of defense
  • Systems Testing: regular audits, penetration tests, and vulnerability scans
  • Partnerships: collaborate with industry experts for knowledge sharing
  • Culture: embed resiliency throughout the organization at every level

BJ Deonarain is a globally focused cybersecurity executive responsible for driving cyber security and cyber resiliency strategy at Hitachi Vantara. With a career spanning technical innovation, client solutions, and cross-functional leadership, BJ combines deep technical expertise with a client-centric approach to mitigate risk and elevate organizational security postures.

[1 CPE] What the Hack is Going On?

  Presented by Tim Medin, Chief Executive Officer • Red Siege

A comprehensive overview of modern cybersecurity threats and how breaches occur. We will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited. There are a lot of vulnerabilities in the wild, and IT administrators and security professionals often focus on the wrong issues because they are easier to monitor or measure. By the end of the presentation, you will have gained valuable insights into the latest cybersecurity threats and how to protect against them.

[1 CPE] Safeguarding Kansas: A Strategic Update on Cybersecurity and Resilience

  Presented by John Godfrey • Chief Information Security Officer, State of Kansas

Join Kansas State CISO, John Godfrey, for an in-depth look at Kansas’ cybersecurity landscape, key threats, and ongoing initiatives to strengthen cyber resilience. This session will highlight recent advancements in security frameworks, interagency collaboration, and strategies to combat emerging risks, such as deepfakes and social engineering. Attendees will gain insights into policy updates, incident response improvements, and future priorities aimed at safeguarding Kansas’ digital infrastructure.

A seasoned cybersecurity executive and entrepreneurial dynamo with 18 years of rich experience, John Godfrey excels in delivering cutting-edge technology and information security strategies. Godfrey has a knack for transforming organizations through modern digital solutions, spurring business enablement, and fostering talent elevation. His unique blend of action-oriented leadership and influential communication has consistently steered executives and boards through periods of organizational metamorphosis.

Demystifying complex technology and making it comprehensible is one of his key strengths. Known for my fervor and transformative leadership, he has spoken at numerous local and national conferences, moderated sessions, featured as a podcast guest, and contributed articles to various magazines and publications.

Presently, he holds pivotal roles as a board member and advisor to boards of directors. Godfrey is actively engaged with the information security community, holding memberships in premier organizations like ISC2, ISSA, ISACA, InfraGard, and more. His academic arsenal includes several industry certifications and is currently pursuing a Doctorate in Cybersecurity with a focus on executive leadership.

[1 CPE] Has Security Awareness Been Forgotten? An Interactive Panel Discussion

  Presented by INTERFACE Advisory Council

“Just automate that process! The firewall is fine—we’ve got an AI tool watching it.”

Sound familiar? Despite significant investments in cybersecurity and advanced tools, the human element remains one of the greatest vulnerabilities in any organization. This isn’t a new problem—ransomware attacks continue to thrive due to human error.

Insider threats, whether intentional or accidental, are often at the root of security breaches. So, what proactive steps are you taking to mitigate these risks?

Join the INTERFACE Kansas City Advisory Council for an engaging discussion on defending against internal threats. Local IT leaders will share their strategies, lessons learned, and practical tips for minimizing human error in cybersecurity. Bring your questions and join the conversation as we explore what’s working, what’s not, and what more needs to be done to protect our networks from within.

Moderator: Holly Giammanco, Director of Information Security, Greater Kansas City Community Foundation

Panelists:

  • Amy Botts, Manager, Information Security Risk, Hallmark Cards, Inc.
  • Bill Kim, Chief Information Security Officer, Security Bank of Kansas City
  • Chris Smalley, Director, Information Technology, Hoefer Welker
  • Melissa Spicer, Director, Cybersecurity, Evergy