[1 CPE] Maximize Your Investment in Technology

  Presented by Dave Carlson, President • Summit Technology

Our company is consistently growing by 40% per year. We are doing this not by adding any additional people, but by maximizing the capabilities of the technology we are already paying for. In this session, we’ll show you the tools and techniques that we are using as well as some demos on how to do the same in your organization.

[1 CPE] Views from the Porch: Tackling the Enablement of a Cybersecurity Workforce

  Presented by Ed Vasko • CISSP, Founder and CEO of s3ntry Corp

Ed Vasko has spent over 30 years leading cybersecurity companies that provide critical services and platforms to clients around the world. Now he is deeply involved in solving the national crisis of not having an effective supply of cybersecurity workers to meet our national needs. In this keynote, he will share a career perspective of how this crisis developed and methods both educators and employers can take to begin solving our needs regionally and nationally. Come be a part of this “porch conversation” and join the discussion.

Ed Vasko, CISSP, is the Founder and CEO of s3ntry Corp. Prior to founding s3ntry corp, he was the director of Boise State University’s Institute of Pervasive Cybersecurity. He is a cybersecurity leader and entrepreneur with over 33 years of experience protecting organizations from cyber adversaries. Before joining Boise State University, Edward established and was a Senior Vice President at Avertium, a leading national managed security and consulting provider. He was the co-Founder and CEO of one of the nation’s largest providers of cybersecurity advisory and managed security services, with over 2,000 active clients around the world.

Edward’s other passion is tackling the challenge of cyber workforce development. He has served on over 20 education advisory boards providing expertise around cybersecurity industry needs. He has been appointed by multiple governors to tackle statewide cybersecurity workforce issues. Most importantly though, Edward is a proud father and husband.

[1 CPE] Panel: How to Build a Successful Relationship with Your Resellers

  Presented by INTERFACE Advisory Council

A value-added reseller (VAR) can have a tremendous impact on the efficiency of how your IT department functions. Budgets can be a challenge to navigate to ensure your needs are met. A good way to make sure you are getting the most out of your IT purchases is to develop the correct strategic relationship with your VARs.

Join this panel discussion for industry tips on improving communication and learning to be proactive in your approach to solving problems. A quality reseller relationship will not only save you financially, but it can also allow you to have a better performance within your IT department. The knowledge and experience that your reseller’s team has can be a great asset to your own team. Bring your questions about cultivating this relationship and maximizing your long-term value.

Moderator:

  • Greg Pugh, Information System Security Officer, Space Dynamics Laboratory

Panelists:

  • David Clark, Director of Information Technology, Utah State Bar
  • Stephen Grigg, Sr Manager, Information Systems, Space Dynamics Laboratory
  • Matt Snow, Account Executive, CompuNet
  • Shawn Young, Director of Cybersecurity, Barnes Group, Inc.

[1 CPE] Building a Strong Team Culture in a Remote Working World

  Presented by INTERFACE Advisory Council

Building a good team culture presents a multitude of challenges for any manager to navigate in the traditional office work environment. Different personalities can impact many elements of the day-to-day dynamic and bring both positive and negative changes to your culture. Some team members welcome praise for a job well done, while others prefer to not be recognized publicly. These hurdles were all in place well before remote working became prevalent.

With so many IT departments dealing with hybrid or fully remote workforces, how do you build bonds among your team members today? Has your company’s vision been set? Are expectations clear? Answering some of these basic questions can help build a good culture. However, more is needed to have a truly effective team.

Join the INTERFACE Montana Advisory Council for an open discussion about how to improve communication in your company. We will offer advice on what has worked well and what didn’t go as expected. We welcome your questions on how to create a positive work environment, no matter where your team members work from each day.

Speakers:

  • Jason Emery, Director of Cyber Security Advisory Services, Center for Internet Security
  • Ryan Knutson, Chief Information Officer, VP, IT, Montana State University
  • Peter Martinson, Strategic IT Managing Director, Montana State University
  • Andy Metroka, Chief Information Officer, Kampgrounds of America, Inc.

[1 CPE] AI and Social Engineering: The New Frontier of Cybersecurity

  Presented by Sherri Davidoff • Chief Executive Officer, LMG Security

Artificial intelligence is transforming the cyber battlefield. Hackers now use voice cloning, deep fakes, and AI-generated phishing attacks to steal funds, infiltrate cloud systems, and deploy malware. Join us in this cutting-edge keynote to witness the latest attack trends, including:

  • Voice Cloning: See a live demo and discover how scammers manipulate this technology.
  • Dark Web AI: View the latest AI hacker tools up for sale.
  • Text and QR Code Attacks: Learn how mobile threats can slip past traditional security.

Cybersecurity is all about people. We’ll wrap up with top strategies for cybersecurity training and staffing, showing you how to create a “human firewall” to safeguard your organization against these evolving threats.

Sherri Davidoff is the CEO of LMG Security and the author of three books, including “Ransomware and Cyber Extortion” and “Data Breaches: Crisis and Opportunity.” As a recognized expert in cybersecurity, she has been called a “security badass” by The New York Times. Sherri is a GIAC-certified forensic analyst (GCFA) and penetration tester (GPEN) and received her degree in computer science and electrical engineering from MIT.

[1 CPE] A Small Business Journey to the NIST Cybersecurity Framework 2.0

  Presented by Daniel Eliot • National Institute of Standards and Technology

The NIST Cybersecurity Framework (CSF) 2.0 is here! This is the first major revision of the globally recognized framework since its initial publication in 2014. If that wasn’t exciting enough, NIST also published the CSF 2.0 Small Business Quick Start Guide along with it. As a supplement to the CSF 2.0, the new Small Business Quick Start Guide provides small-to medium-sized businesses (SMB) with resources and considerations to kick-start their cybersecurity risk management strategy using the CSF 2.0. During this talk Daniel Eliot, NIST’s Lead for Small Business Engagement, will provide an overview of updates to the NIST Cybersecurity Framework 2.0 and will showcase the new CSF 2.0 SMB Quick Start Guide and other free NIST small business cybersecurity resources. Eliot will also spend time sharing various ways organizations can get more engaged with NIST’s cybersecurity and privacy work.

Daniel Eliot is the lead for small business engagement within the National Institute of Standards and Technology’s Applied Cybersecurity Division. In this role, he works across NIST’s cybersecurity and privacy program to advise and support development of cybersecurity resources, communication materials, and collateral tailored for use by small businesses. He also regularly works directly with the small business community and their advocates through external outreach and engagement. Immediately prior to joining NIST, Daniel worked within MITRE Corporation’s Center for Securing the Homeland, serving as the chief communications strategist at the NIST National Cybersecurity Center of Excellence. In prior roles he has also served as the director of education for the National Cybersecurity Alliance and manager of technology business development for the University of Delaware Office of Economic Innovation and Partnerships.

[1 CPE] The Decarbonization of the Data Center

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Balancing the need for substantial data infrastructure with more eco-friendly policies should be top of all organizational to-do lists. Rather than a competition between corporations, these initiatives should be focused on the larger benefit of a healthier world. That’s why creating a specific data center decarbonization strategy will be key. This will range from improving the visibility and measurement of power usage, to actually reducing the carbon footprint of each operational layer. But where should organizations begin?

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

[1 CPE] The Human Factor: Quantifying Human Risk

  Presented by Sara Anstey, Director of Data Analytics and Risk  • Novacoast

This talk will explore the growing field of human risk management and quantification, diving into the next step in an organization’s risk journey: quantifying people. We will discuss where the market is, how people are adopting it, and what organizations can gain from human risk management.

Join this session on the emerging and evolving field of human risk quantification, which aims to apply quantitative methods to assign risk scores to every employee at a company based on their actions and access. This space is very similar to where cyber risk quantification was about 4 years ago when there were a few start-ups in the market and a few active voices on LinkedIn advocating for the adoption of these practices. Now, human risk quantification is an organizational priority. Having done extensive research into where the players in the market are and how companies utilize these strategies, human risk quantification has become the next step of a risk journey for many companies. Over 80% of breaches involve the human element –– if organizations want to stop them, they need to understand how the people they employ affect their security posture.

[1 CPE] Meaningful Compliance: More than Just Checking Off Boxes

  Presented by Mark Fitzgerald • Chief Compliance Officer, Brigham Young University Hawaii

A key to creating a culture of compliance is to make it meaningful for all who are involved. Too often compliance is seen as a restriction rather than a series of best practices that can keep all of us safe and enhance user experiences. By adopting practices learned from your help desk –– knowledge management, continual improvement, setting expectations, and practice communications –– you can transform compliance into a tool to help users trust in what IT is delivering to them.

Mark Fitzgerald is BYU Hawaii’s Chief Compliance Officer in the Office of Compliance & Ethics and oversees the Purchasing Department. In this position, Fitzgerald manages programs and activities for establishing standards and implementing procedures to help leaders and managers ensure the university’s compliance with applicable laws and regulations.

Fitzgerald has worked in higher education information technology for over 25 years. Most recently, he worked as the Chief Information Security Officer at Boise State University where he had responsibility for IT compliance. He has also held positions as Executive Director for the Office of Information Technology and Director of Customer Care and Academic Technologies. He taught in the Master of Business Administration program at Boise State University. He also spent some of the early years of his career at BYU in Provo, Utah.

Fitzgerald has a Master of Business Administration in Information Technology from Boise State University and a Bachelor of Arts in Marketing Communications from Brigham Young University in Provo. He has several certifications and associations, including being a Lean Six Sigma Yellow Belt. He also had the privilege of teaching in the Boise State University MBA and Master of Cybersecurity programs.

[1 CPE] Securing the Future: Cyber Insurance and Cybersecurity Strategies for 2024

  Presented by Andrew Livingston, Cyber Security Specialist • Sentinel Technologies

In the dynamic and interconnected digital era of 2024, the landscape of cyber threats continuously evolves, posing unprecedented challenges to businesses worldwide. “Securing the Future: Cyber Insurance and Cybersecurity Strategies for 2024” delves into the intricacies of cyber insurance as a pivotal component of modern business risk management. This presentation offers a thorough exploration of the latest trends in cyber threats that businesses face, such as sophisticated AI-driven attacks, the proliferation of ransomware, and the vulnerabilities introduced by emerging technologies. It highlights the critical challenges that could lead to the denial of cyber insurance claims and potential loss of coverage, emphasizing the importance of compliance, accurate representation of cybersecurity measures, and prompt incident reporting.

Furthermore, the presentation shifts focus towards proactive strategies for enhancing an organization’s cybersecurity posture. It outlines actionable tips for businesses to not only fortify their defenses against cyber threats but also to positively influence their cyber insurance rates. Through a blend of expert insights and practical guidance, the audience will learn about the significance of regular risk assessments, the adoption of multi-factor authentication, encryption, endpoint security, and the development of robust incident response plans. We’ll discuss:

  • Insights into the evolving cyber threat landscape in 2024.
  • Common pitfalls leading to cyber insurance claim denials.
  • Strategies for enhancing cybersecurity measures to favorably impact insurance rates.
  • The future outlook of cyber insurance and the role of emerging technologies.

By the conclusion of this presentation, attendees will be equipped with the knowledge to navigate the complexities of cyber insurance and implement comprehensive cybersecurity strategies. This will not only prepare them to mitigate the risks of cyber threats but also optimize their insurance coverage in the face of an ever-changing digital threat landscape.