[1 CPE] The Human Factor: Quantifying Human Risk

  Presented by Sara Anstey, Director of Data Analytics and Risk  • Novacoast

This talk will explore the growing field of human risk management and quantification, diving into the next step in an organization’s risk journey: quantifying people. We will discuss where the market is, how people are adopting it, and what organizations can gain from human risk management.

Join this session on the emerging and evolving field of human risk quantification, which aims to apply quantitative methods to assign risk scores to every employee at a company based on their actions and access. This space is very similar to where cyber risk quantification was about 4 years ago when there were a few start-ups in the market and a few active voices on LinkedIn advocating for the adoption of these practices. Now, human risk quantification is an organizational priority. Having done extensive research into where the players in the market are and how companies utilize these strategies, human risk quantification has become the next step of a risk journey for many companies. Over 80% of breaches involve the human element –– if organizations want to stop them, they need to understand how the people they employ affect their security posture.

[1 CPE] Zero Trust for More than a More Secure Future

  Presented by Chad Haskell, Sr Solutions Architect • Barracuda & BlackPoint IT

Like many relatively new technologies, Zero Trust has a reputation for being complex, and difficult to configure and manage. But it’s clearly gaining traction. Gartner predicts that more than 60% of organizations will embrace zero trust as a starting place for security by 2025. Attend this information-packed session and get answers to all your questions about how it works, why you need it, and how many of you are already implementing it in one way or another. We’ll cover the stages of a successful Zero Trust implementation — seed, sprout, and bloom — and how easily you can use it to secure access to all your network resources, data, and applications.

[1 CPE] Zero Trust Microsegmentation: It’s Easier Than You Think

  Presented by Ben Collar, Senior Systems Engineer • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

[1 CPE] Rapid Growth of Unstructured Data Across Industries and the Challenge of Protecting It

  Presented by Paul Swanson, Account Executive, PLS NAS • Rubrik & Structured

In today’s digital economy, nearly every industry is finding that data is becoming increasingly critical to its core business success. Data enables innovation and discovery, powers advances in artificial intelligence and machine learning, and drives medical and earth-science breakthroughs. Most of the collective data fueling today’s technological and scientific advances consists of unstructured data files – trillions of them. For effective stewardship of both infrastructure and data, IT needs to have insight into the depth and breadth of your organization’s unstructured datasets and the workflows that use them. Join this session for a discussion of the rapid growth of unstructured data across industries and the challenge of protecting it.

[1 CPE] Intelligent SSE: Secure Everything from Anywhere

  Presented by Matt Senechal, Regional Sales Manager • Netskope

This session will provide a technical overview of Security Service Edge (SSE), focused on the following topics:

  • Unintentional or unapproved data movement
  • Data protection for internal and external threats
  • Conditional and contextual access to safely enable cloud & SaaS applications
  • Protection from cloud-enabled SaaS and web threats
  • Work from anywhere with a secure, fast experience

You will walk away understanding the fundamentals of SSE and how it will benefit your business.

[1 CPE] How to Build a High Confidence Cyber Recovery Plan

  Presented by Bharath Nagaraj, Sr Technical Field Director  • Cohesity

In an era where data is both a prime asset and a target, the global cybercrime cost is expected to soar to $10.5 trillion USD by 2025, with ransomware attacks becoming more frequent. Despite this, 80% of organizations doubt their cyber resilience strategies. The importance of being prepared for “black swan” cyber events, which exploit new vulnerabilities and can cause overwhelming damage, is highlighted. Cohesity emphasizes the role of Generative AI in bolstering a company’s security by automating threat detection, ensuring compliance, and promoting collaboration across departments. This approach not only mitigates risks but also aligns with strategic IT resilience planning. In an upcoming discussion led by Cohesity’s Senior Technical Field Director, Bharath Nagaraj, insights into overcoming large organizational challenges, effective response strategies, stakeholder roles, and steps for integrating cyber resilience into IT strategies will be explored, aiming to instill confidence in recovery without succumbing to ransoms.

[1 CPE] Panel: Help is Here to Govern AI in Your Workplace!

  Presented by INTERFACE Advisory Council

Is generative AI a true hope, or is it all hype? Are you struggling to keep your end users protected from using AI tools that could cause security concerns? Is your data being protected from entering the AI space? These are just a few of the questions occupying the IT workforce today. While it may seem like a daunting task with no end in sight, there are others facing your challenges and wanting to share their experiences.

Our panel of local IT experts will share their experiences in what it takes to have a smart AI posture. We will discuss data governance, cyber security, and privacy concerns when it comes to AI in your workplace. Please bring your questions as well so you can get some guidance on the challenges you face today. Our esteemed panelists are some of the most experienced IT leaders in Hawaii and they want to share their experiences.

Panelists:

  • Rebecca Cal, Chief Data Officer, State of Hawaii
  • Randy Faatau, Vice President, Cybersecurity Architecture & Operations, First Hawaiian Bank
  • Vince Hoang, Chief Information Security Officer, State of Hawaii
  • Jodi Ito, Chief Information Security Officer, University of Hawaii

[1 CPE] Avoiding the Silver Bullet Fallacy Within Insider Threat Detection

  Presented by Damien Weiss, National Security Defense Strategist  • Splunk & Cisco

Damien Weiss is an insider threat specialist at Splunk, where he has been for the past seven years. He works to find ways for analysts to use a constellation of software tools to help find insiders faster. Over the past year, he has focused on using ML and LLMs to help identify those who are looking to harm others or themselves.

[1 CPE] Backup ≠ Cyber Recovery

  Presented by Rubrik

Legacy backups are vulnerable to attacks, can’t help you find threats, and force you to do wholesale restores that drag out recovery times. Rubrik Zero Labs found that only 5% of organizations were able to return to business continuity or normal operations within one hour of discovering a CyberAttack. A modern cyber recovery solution is critical for Security and IT teams to be cyber-resilient. Learn how you can make your data indestructible.

[1 CPE] Adversaries for Hire!

  Presented by Steven Massey, Regional Sales Manager • Secureworks & Dell

By exploring modern threat tactics, tooling, and anonymized cases from Healthcare, Critical Infrastructure, and Finance sectors, this talk aims to equip participants with insights into how adversaries operate, enhancing their ability to secure their organizations against breaches and cyber-attacks.

By incorporating various skillsets from active operations, Secureworks has amassed a wealth of offensive knowledge and tradecraft that allows our operators to perform complex offensive security engagements and provide remediation advice and controls to businesses of all types and technologies.