[1 CPE] Maelstrom of Security

  Presented by Jerry Petru, President • InfraGard Washington

This session is designed for individuals responsible for their organizations’ Confidentiality, Integrity, and Availability from the front door firewall administrator with IDS/IPS, cloud, compliance, data governance, and networking all the way to the Chief Executives of an organization. In a world of ever-changing threat landscapes, this session will cover the overall magnitude of the challenge! We’ll discuss the evolution as it took place and what to do about fixing what is in our hands today.

We’ll cover how to speak to the C-Suite and get the business side of the conversation to move toward better security hygiene and answer the question of how much security is enough. This session is truly about information security risk. The risk is Very High for all organizations. The NIST 800-30 defines Very High Risk as that of a threat event that could be expected to have multiple severe or catastrophic adverse effects on organizational operations, organizational assets, individuals, other organizations, or the Nation. The discussion will be open and free-flowing, covering real-world business issues and providing a platform to ask your questions.

Bio: Jerry Petru is the President of the Washington State InfraGard Chapter and a Fellow of the British Computer Society, The Charted Institute for IT. He is an innovative and technically sophisticated professional, offering substantial years of broad-based experience in evaluating large corporate systems. Powered with a comprehensive background in development and implementation, he has authored more than forty-seven different courses based on AIX, Encryption, Linux, Networking, Security, and Virtualization technologies teaching to an audience of tens of thousands around the world for the past twenty-five years.

Mr. Petru is equipped with a proven track record of success in designing and implementing systems and policies based on Confidentiality, Integrity, and Availability to meet business continuity and disaster recovery for long-range strategic plans of Fortune 100 Companies. He is also armed with stellar qualifications in all facets of project lifecycle development, from initial analysis and conceptual design to implementation, quality review, and enhancement to optimize operational efficiencies that improve business and IT operations.

[1 CPE] Saving Money in IT Project Management and Operations

  Presented by Michael J. Berry • Member and Presenter • PMI Northern Utah Chapter

In this session, you will learn how to save time, effort, and costs through Operational Excellence in IT Project Management. Also covered will be Operations that use patterns found in Agile, Lean, and Artificial Intelligence.

Michael J. Berry is the founder and chief consultant for Red Rock Research, a 17-year-old IT training and consulting company he founded in 2007. Michael’s professional consulting work has taken him all over the US, to Australia, to the Arctic Circle, and to Europe helping large companies optimize their project management and other production processes. Michael has worked in the software industry for over 35 years, specifically in Finance, Medical, and Manufacturing software. He is the creator of the Stable Framework™, an Operational Excellence performance management system for IT, and has a book blog you can read at https://blog.RedRockResearch.com.

[1 CPE] Cybersecurity Trends for 2023

  Presented by Jeff Simpson, Sr Sales Executive, Cybersecurity Solutions • AT&T Alaska

With Cybersecurity compliance mandates increasing, and attacks on vulnerable supply chains and endpoints on the rise, it has never been more important to assess and take proactive measures to secure your network. This presentation pulls together information from many different analysts and digests their views on which Cybersecurity priorities your organization may face this year, along with the top eight cybersecurity trends for 2023, such as Supply Chain Resilience, Security Architecture Modernization and Data-Centric Transformation.

[1 CPE] Dark Web Monitoring: It’s time for an Offensive Strategy!

  Presented by Jeff Simpson, Sr Sales Executive, Cybersecurity Solutions • AT&T Alaska

Many organizations discover a cybersecurity breach many months later, too late for any substantial mitigation. With the average cost of breaches in the US at $9.4M, (without including ransom paid), it is advisable for organizations to take a more offensive stance. What if there was a way to detect compromised corporate credentials well before they were used to cause widespread fraud? Dark Web Monitoring goes where cybercriminals traffic stolen emails, usernames, and passwords, and can alert an organization if personal or corporate user information shows up in the Darknet layers. Learn how using a tool like this can help protect an organization’s employees, consumers, and vendors, as well as its reputation.

[1 CPE] Improved Security for SecOps & NetOps that’s Recession Friendly

  Presented by Ryan Parr, Sr Solutions Architect • Infoblox

While the future economic impact on IT budgets is unclear, one thing is clear –– attackers will not slow down and may even ramp up knowing organizations are considering lowering IT and cybersecurity spending. It is clear enterprise security is of extreme importance and making investments stretch is going to become essential. Core network services you already have in place, including DNS, DHCP, and IPAM (IP Address Management) are often overlooked in the cybersecurity world but can become the most powerful weapon against attackers. During this session, you will learn how to leverage existing services to:

  • Reduce the burden on existing security investments, extending their capacity and lifespan
  • Combat up to 92% of malware and ransomware without new security tools
  • Decrease SecOps investigation time by up to 60%
  • Improve your security posture, lowering cyber insurance costs

[1 CPE] Who’s Attacking You?

  Presented by Critical Insight

One of the most common questions from IT Leaders and Executives is: Who would attack our organization and why?

In this discussion, we’ll examine the most common cyberattack perpetrators and their methods. From hostile Nation-States to teenagers to some threat actors you might not expect. We will discuss the methods these attackers are using to gain access to your networks, be it unpatched systems, newly found zero days, as well as other avenues into your network. Also covered will be the intent of these attacks, whether it is to steal your intellectual property, extort your cryptocurrency, or to disrupt your operation to meet strategic goals. Most importantly, we will discuss how to tell the difference, and how to protect yourself.

[1 CPE] How to Get the Security Budget You Deserve

  Presented by CYE

Because of the current economic downturn, security leaders are being forced to stretch their budgets further, even as devastating cyberattacks continue to proliferate. Given these challenges, how can CISOs convince their board members to support a robust and effective cybersecurity budget?

In this session moderated by Bryan Hurd, Reuven Aronashvili and Ira Winkler will highlight the best ways to stretch your security budget, including which investments will provide the most bang for your buck. Perhaps most importantly, however, Reuven and Ira will also touch on how CISOs like you can present your security recommendations and successfully receive the budget you deserve.

[1 CPE] Shifting Your Workforce Strategy to Support Your Growing Organization

  Presented by IP Pathways

The technology landscape continues to evolve. Finding cloud talent to architect & build a custom solution continues to be challenging and even harder to retain. Lead times for hardware continue to increase making it hard to support growing businesses. During this session, we will outline the trends being used to supplement your workforce strategy.

[1 CPE] Securing Layer 8

  Presented by Synack

One of the most difficult challenges globally is securing the human element and as such, it tends to be neglected. The current solution of training with “gotcha” emails is not successful and tends to cause unintended negative consequences. We will investigate a more global approach to securing businesses by taking on the “business of hacking.” We’ll show how we can harden the human element and expand our footprint by using a better way to learn and widening our defenses. The key is to ensure we also harden society to help drive the ROI for attackers up enough that business is no longer profitable, forcing them into the technology fight in which, as an industry, security professionals have much more secure footing.

[1 CPE] Co-Managed IT: The Modern MSP Relationship

  Presented by Exbabylon

A pragmatic conversation about what the modern relationship should look like between internal IT teams and external consultants, MSPs, MSSPs and VARs. As organizations embark on digital transformation journeys that require a cloud forward approach, the skills, competencies, and experience of a strategic partner who can collaborate and build initiatives becomes more apparent and important. Navigating the shifting expectations of IT Leadership as business demands evolve and change from the team that just keeps the network up to their new role as a business influencer through data intelligence, business intelligence, automation, and big data/AI.