[1 CPE] Developing a Vision and Strategy for Security Centric IAM Programs

  Presented by Business Partner Solutions

Learn how to defend new age data breaches through Identity Centric Security. 80% of cyber incidents stem from stolen credentials & privileged accounts. By including Identity Centric Security (ICS), organizations can proactively manage their threat landscape, ensuring better threat intelligence and breach defenses.

Topics discussed will inlcude:

  • What is ICS?
  • How does ICS enable risk-based decision-making?
  • How does ICS strengthen breach defense?
  • Approach to embracing ICS

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

[1 CPE] Unified Endpoint Management

  Presented by Quest Software

This presentation highlights the reasons and need for Unified Endpoint Management in your business strategy. This presentation’s sole purpose is to educate C-level and system administrators of the need for UEM as well as what aspects are important. One of the problems with endpoint management today is the proliferation of endpoints. During this global health crisis especially, we are seeing a large work-from-home movement in businesses all over the world. In order to combat this issue, you must have an endpoint management strategy that works not only on the network but off of it as well.

[1 CPE] Remote Working – Here to Stay?

  Presented by INTERFACE Advisory Council

Remote working during the pandemic has proved to be beneficial for some companies and employees. Even as we forecast a return to the office soon, many will want to work remotely on a permanent basis.

Join the INTERFACE- Advisory Council for a look at what lies ahead with remote working. How are you adjusting your security procedures? Do you know if your end-users will return to the office? Also, we will address long term items when it comes to in person working for different industries. How much of a shift in business will we see? We will discuss how IT departments be involved in decision making and execution of policies.


Panelists:

Ulf Asplund • Manager of Technical Services, Alaska Court System
Paul Hinsberg • Sr Enterprise Architect, Alaska USA Federal Credit Union
Mark Merchant • Chief Information Security Officer, Municipality of Anchorage

[1 CPE] Work-Life Effectiveness: The Impacts on Employees & Employers

  Presented by Alaska Communications

In this presentation, you will learn the basics of work-life effectiveness and understand how it impacts the company’s bottom line. There are seven key elements of work-life effectiveness. We will explore these elements, which include ideas on how to bring them to your organization. We will also address work-life and wellness issues caused by the COVID-19 pandemic.

[1 CPE] Stay Ahead: Prep and Protect Your Enterprise for a Post-Pandemic World

  Presented by Check Point Software

Organizations worldwide transformed their ways of working with the onset of the COVID-19 pandemic. Now, we’re all forced to face new uncertainties as we transition to a post-pandemic world. Meanwhile, threat actors and cybercriminals are evolving their tactics to take advantage of these hazy times and the pandemic’s disruption as seen by recent surges in attacks across all industry sectors. This new phase of the modern workforce threatens more disruptive change and unpredictability. Join us to better understand what organizations such as yours should be focusing on to avoid being the next victim and stay a step ahead of the world’s leading cybercriminals.

Fostering Inclusion in a Remote Work Environment

  Presented by PDX WIT

Underrepresented groups are disproportionately affected by this pandemic and its economic fallout. The requirement to work from home brings its own set of challenges. Employees depend on their immediate managers for support in these unique circumstances, but everyone can play a role. This presentation will explore how everyone on the team (particularly those in leadership roles) can continue to foster an inclusive work environment for their distributed teams.

Presenter:
Molly Lebowitz • Management Consultant at Propeller and PDX Women in Tech Representative

Health and Safety Innovations Lay a Smart Digital Foundation

  Presented by Hitachi Vantara and Converge Technology Solutions

The pandemic has accelerated innovation to protect health and safety, while laying a foundation for broader digital transformation across industries. Learn how automated detection of PPE, social distancing, collision avoidance, thermal scanning, and compliance analytics are helping companies reduce risk while protecting their workers and customers, and how this shift is preparing them to thrive in our digital future.