[1 CPE] Reinventing TPRM: Managing Third-Party Cyber Risk with Intelligence

  Presented by Mark Nafe, Director, Solutions Consulting • RiskRecon by Mastercard

In today’s hyperconnected enterprise, your cybersecurity risk doesn’t end at the firewall—it extends to every vendor, supplier, and partner in your digital ecosystem. Yet many organizations struggle to gain visibility into third-party risk, relying on outdated methods that can’t keep pace with modern threats.

This session explores how leading organizations are leveraging machine learning, threat intelligence, and continuous monitoring to transform their third-party risk management (TPRM) programs from reactive check-the-box exercises into proactive, intelligence-driven strategies. You’ll learn how advanced technologies are enabling security teams to identify high-risk vendors before they become the weak link—and how TPRM is evolving into a critical pillar of enterprise resilience.

Whether you’re already managing vendor risk or just starting to explore the issue, this session will provide the business case, practical frameworks, and technology insights you need to elevate your security posture.

[1 CPE] Browse Bravely With Prisma Access Browser

  Presented by JR Silverthorne, Partner Solutions Consultant, West • Palo Alto Networks

Join us as we dive into the latest in last-mile data loss prevention and secure browsing for end users. We will showcase Prisma Access Browser’s capabilities to keep your data protected on both managed and unmanaged devices while maintaining access to internal applications.

We will showcase how Prisma Access Browser can secure work on any device, boost visibility and control across SaaS/GenAI and web apps, and deliver a delightful user experience.

Whether you’re a security architect, IT leader, or network professional, this seminar offers actionable insights and practical guidance to strengthen your organization’s security strategy.

[1 CPE] Don’t Build a Fire Department

  Presented by Herb Williams, Sr Sales Engineer, Enterprise US • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24×7 monitoring across your collective attack surfaces.

[1 CPE] Cybersecurity and Compliance For 2025

  Presented by Chris Green, Manager, Penetration Testing • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI, and security best practices. Presented by Chris Green, Manager, Penetration Testing at Structured, this discussion will focus on security solutions to these challenges, including penetration testing and zero-trust implementations.

[1 CPE] Zero Trust in Motion: Securing East/West Traffic to Reduce Risk

  Presented by Rob Miley, AZ Commercial Sales Engineer • HPE Aruba Networking

Ransomware and targeted cyber security threats are on the rise. A proactive prevention strategy should use both tried and proven methodologies as well as new and emerging technologies. East West traffic identification and isolation is key in preventing malicious content from spreading, both in the Data Center and at the Campus Edge of the network. We will focus on innovative approaches to address the security compliance, performance, agility, and scalability demands of today’s highly distributed, hybrid, network environments.

[1 CPE] Breaking Down Silos: Unify Assets, Minimize Attack Exposure

  Presented by Lucas Zaichkowsky, Sr Sales Engineer • Axonius

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.

Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.

As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.

[1 CPE] Hackers Gonna Hack: When Defenses Break Down

  Presented by Jason Graun, Director of Sales Engineering • Fortinet

Organized threat actors continue to be the most dangerous risk in Cybersecurity. The tactics used to get into endpoints are constantly evolving in sophistication and scale. In this session, we will discuss industry trends/challenges, as well as walk through the tactics, techniques, and procedures used by threat actor groups by using a known active group as an example. We will also discuss practical real-world situations and how to defend against them using a unique approach to stopping ransomware before it becomes an active breach.

Jason Graun is the Sales Engineering Director for the Fortinet Security Operations team. He brings over 20 years of experience in information security and has spent 11 years at Fortinet. He regularly speaks at industry events, CIO/CISO summits, and works closely with IT executives to understand the business challenges they face in securing assets across an ever increasingly mobile workforce. Jason’s focus is to find ways technology can solve the biggest challenges in information security, he also holds a patent on cloud security malware inspection methods.

[1 CPE] Outsmart Cybercrime: Protection Optimized with MDR

  Presented by Raymond Neff, Solution Architect • ESET

With the rise of cyber threats and ongoing cyber talent shortage continuing unabated, many organizations are turning toward Managed Detection and Response (MDR). So how can this service enhance an organization’s overall security posture and improve incident response? This presentation explores combatting new threats, like multi-extortion ransomware with MDR how to leverage AI-powered threat detection and response, and human expertise, to prevent new ransomware variants the significance of a prevention-first, holistic cybersecurity strategy.

[1 CPE] Strengthening the Cyber Shield: Private-Public Partnerships at the State and Local Level

  Presented by ACTRA

This session focuses on maturing actionable strategies and collaborative frameworks designed to help IT leaders and cybersecurity professionals navigate today’s dynamic threat landscape. As adversaries increasingly target state and local systems, Arizona’s model for public-private cooperation demonstrates how trusted partnerships, timely threat intelligence sharing, and coordinated incident response can significantly enhance cyber resilience. This session will update participants on practical timely insights into how cross-sector collaboration is being operationalized to protect infrastructure, ensure business continuity, and support a unified cybersecurity posture across the state.

Speakers:

  • Frank J. Grimmelmann, President & CEO, Arizona Cyber Threat Response Alliance, Inc. (ACTRA)
  • Ryan Murray, Deputy Director, AZ Dept of Homeland Security, CISO, State of Arizona

[1 CPE] Securing the Hyperconnected World in the AI Era

  Presented by Grant Asplund, Security Evangelist • Check Point

The AI revolution is fundamentally transforming cybersecurity, while the future of networking evolves toward Hybrid Full Mesh—integrating 5G, WiFi, Ethernet, Fiber, and other network infrastructures. This presentation examines how AI is accelerating cyber threats: attack costs are skyrocketing, incidents surging 50% year-over-year, and ransomware development compressed from nine days to mere minutes*. We’ll explore why Hybrid SASE (not cloud-only) forms the core of an effective hybrid full-mesh security architecture and how organizations can respond when the rate of change and complexity outpace their capabilities. Most importantly, we’ll demonstrate why security isn’t just a feature but the essential foundation of operations in this new era of hyperconnected vulnerability.

*Source: 2025 Check Point Research, CyberInt, Cybercrime Magazine, IBM, SAN