[1 CPE] Scaling Network Infrastructure: From the Remote Employee to The Corporate Office

  Presented by Pine Cove Consulting

In the world we live in, employees are now working from home. However, that does not mean they do not need adequate network infrastructure, so their workday runs smoothly. During this presentation, we will talk about how to implement network devices like servers, on a very small scale like a home office, and how networking technology changes when scaling up to fit a larger space and more employees, like the corporate office.

[1 CPE] Securing Layer 8

  Presented by Synack

One of the most difficult challenges globally is securing the human element and as such, it tends to be neglected. The current solution of training with “gotcha” emails is not successful and tends to cause unintended negative consequences. We will investigate a more global approach to securing businesses by taking on the “business of hacking.” We’ll show how we can harden the human element and expand our footprint by using a better way to learn and widening our defenses. The key is to ensure we also harden society to help drive the ROI for attackers up enough that business is no longer profitable, forcing them into the technology fight in which, as an industry, security professionals have much more secure footing.

[1 CPE] Securing a Distributed Network with ZTNA and a Cybersecurity Mesh Platform

  Presented by Fortinet

Securing connected resources and the different pieces of a distributed network can be challenging. Join this session to explore the advantages of using a ZTNA architecture to provide secure, application-based access over the traditional VPN access most enterprises use today. We’ll also examine how employing Gartner’s Cybersecurity Mesh Architecture can simplify Network and Security operations.

[1 CPE] Who’s Attacking You?

  Presented by Critical Insight

One of the most common questions from IT Leaders and Executives is: Who would attack our organization and why?

In this panel discussion, we’ll examine the most common cyberattack perpetrators and their methods. From hostile Nation-States to teenagers to some threat actors you might not expect. We will discuss the methods these attackers are using to gain access to your networks, be it unpatched systems, newly found zero days, as well as other avenues into your network. Also covered will be the intent of these attacks, whether it is to steal your intellectual property, extort your cryptocurrency, or to disrupt your operation to meet strategic goals. Most importantly, we will discuss how to tell the difference, and how to protect yourself.

[1 CPE] Why Smart Cities Are Safer Cities Thanks to Real-Time Data and AI

  Presented by iT1 Source & Wireless Guardian

Intelligent technology helps public safety organizations gain a holistic understanding of their cities, deepen public confidence and strengthen community connections. This session will explain the relationship the using Real-Time Data and Artificial Intelligence to create safer, more resilient communities. As part of the discussion, the presenter will explain the following:

  • Data and AI are helpful in real-time response
  • Data and AI are also reshaping long-term public safety processes
  • How smart safety technologies aid in environmental monitoring, emergency management and other situations
  • How smart technology pulls in signals from an array of sources across cities

The presenter will also stress public safety isn’t a top-down hierarchy. It’s actually a collective effort that prioritizes the needs of the community and depends on strong relationships. By realizing the future of public safety, smart city technology transforms the ability to serve local communities.

[1 CPE] Mental Malware: Social Platforms and the Dawn of the Disinformation Age

  Presented by Michael Manrod • Chief Information Security Officer, Grand Canyon Education

In recent years, we have seen our world reshaped dramatically as technology has worked its way deeper into our daily lives. As mobility and social platforms reshape how we interact, the speed of information has accelerated, all while the overall trustworthiness of information has deteriorated. In this talk, we will examine human processing flaws that can be exploited via disinformation campaigns (Mental Malware), along with ways such campaigns may be interrupted.

Mike Manrod presently serves as the Chief Information Security Officer for Grand Canyon Education, responsible for leading the security team and formulating the vision and strategy for protecting students, staff, and information assets across the enterprise. Previous experiences include serving as a threat prevention engineer for Check Point and working as a consultant and analyst for other organizations.

Mike is also a co-author/contributor for the joint book project Understanding New Security Threats published by Routledge in 2019, along with multiple articles and whitepapers. When he’s not working, he spends time playing video games with his kids or doing projects around the farm.

[1 CPE] The Future of Observability

  Presented by Cribl

Digital transformations, cloud migrations, and persistent security threats turned observability from a niche concern to an essential capability in today’s organizations. We’re still in the early days of observability maturity, but early stumbles point to where observability must go in the future. This talk discusses where observability is today and the three critical areas necessary for observability to deliver on its promises throughout the enterprise.

[1 CPE] Chasing Cloud Security Maturity Amid Constant Headwinds of Change

  Presented by Check Point

Covid and the push to accelerated ‘remote first’ strategies have forced organizations to leverage on-demand cloud infrastructure, often without the proper design, architecture, and security strategy in place to scale safely. In addition, infrastructure as a service providers are innovating very quickly and building high-value services for us to leverage in our application architectures. Lastly, we are challenged more than ever by a lack of mature cloud skillsets available to hire. These factors add up decisions with resources, identities, and access that put our most sensitive secrets at risk. As new and innovative cloud capabilities are introduced, so too are security innovations, both in technology and process.

Grant Asplund, Growth Technologies Evangelist, will discuss the evolution of Cloud security including headwinds, issues, challenges, and concerns companies can expect to be confronted with as they pursue reaching security maturity in the Cloud.

[1 CPE] Infrastructure Modernization: Your Foundation for Innovation and Business Agility

  Presented by Hitachi Vantara

Today’s infrastructure must be engineered to support digital innovation, such as accelerating your cloud, applications, and data. The agility, efficiency, and resilience required for new workloads, applications, and requirements are needed for a modernized infrastructure. Join us as we guide you on your infrastructure, application, and data modernization journey so that you can make smart modernization decisions and build Your Cloud, Your Way.

[1 CPE] Infrastructure Modernization: Your Foundation for Innovation and Business Agility

  Presented by Hitachi Vantara

Today’s infrastructure must be engineered to support digital innovation, such as accelerating your cloud, applications, and data. The agility, efficiency, and resilience required for new workloads, applications, and requirements are needed for a modernized infrastructure. Join us as we guide you on your infrastructure, application, and data modernization journey so that you can make smart modernization decisions and build Your Cloud, Your Way.