Cyber Threat Awareness and Creative Strategies for Managing Risk
Title: Mark Lanterman, Chief Technology Officer of Computer Forensic Services
Keynote Session Description: Ransomware. Spear phishing. The “insider” threat. Organizations and firms face a myriad of cyber threats that come with ample amounts of risk. From reputational damage to financial losses, the possible costs of a cyber attack or data breach can be challenging to quantify—and mitigate. Mark Lanterman, Chief Technology Officer of Computer Forensic Services, will discuss latest trends in our cyber landscape including topics such as the Dark Web, doxxing, ransomware, and the role of the human element in making or breaking a strong security culture. Mark will also provide practical suggestions for improving cybersecurity postures with proactive and reactive strategies.
Breakout Session Description: The New Frontier: Navigating AI and Deep Fakes in the Legal Landscape- In an era where artificial intelligence and deep fakes are increasingly sophisticated, the legal community faces new challenges and opportunities. This session will equip judges and attorneys with the knowledge to understand and identify AI-generated content and deep fakes, exploring their implications in legal contexts.
We will cover the latest advancements in AI technology, methods for detecting fabricated evidence, and the ethical considerations surrounding the use of AI in the courtroom. Attendees will leave with practical strategies to confidently address these emerging issues, ensuring justice is upheld in an age of digital deception.
General Sessions
Arvig
Unmasking the Invisible: How AI is Revolutionizing Attack Identification- In the relentless landscape of cyber threats, the sheer volume of log data generated by internet service providers (ISPs) presents both a critical resource and a monumental challenge. Traditional security approaches often drown in this data deluge, missing subtle yet sophisticated attack patterns. This presentation will explore how Artificial Intelligence (AI), particularly Machine Learning (ML), is transforming our ability to detect and respond to cyberattacks hidden within vast log datasets.
Bytespeed
Transitioning from Vmware to Hyper-V: Bytespeed’s considerations
Bytespeed/Arctic Wolf
Ransomware Roundtable: Bytespeed + Arctic Wolf - "We’re excited to announce that we are hosting a new event in collaboration with Arctic Wolf, and this time we’re shaking things up. Unlike our previous events, this one will feature a fictional roundtable exercise focusing on a ransomware attack. This innovative format will provide a unique, interactive experience where you'll delve into the business impacts of a ransomware incident, through our shared role play."
Bytespeed/Juniper-Mist
Smarter Networks, Stronger Outcomes: Harnessing Juniper-Mist’s AI-Native Networking - Tailored for IT leaders, network administrators, and decision-makers in mid-sized enterprises, this session offers actionable insights into deploying AI-native networking solutions that align with organizational goals and resource constraints. Join us to explore how embracing AI-driven networking can lead to smarter operations and stronger business outcomes.
CIT
Tales of the Trenches: Real-World Lessons from IT Professionals- IT professionals face unique challenges. From managing legacy systems and limited budgets to navigating complex procurement processes and ensuring compliance with stringent regulations, the demands on an IT staff can be daunting. In this engaging session, experienced IT veterans will share their hard-earned lessons and war stories from the trenches. Attendees will gain valuable insights into the specific challenges faced, including cybersecurity threats, data governance, interoperability issues, and the ever-present need for innovation amid resource constraints. Through real-world examples and case studies, the speakers will impart practical wisdom and strategies for navigating common roadblocks, managing high-pressure situations, and delivering successful projects.
Doosan Digital Innovation
What is OT Security? An introduction to OT and ICS Security- We will dive into what Operation Technology (OT) is and why its becoming more important in all industries, the differences and similarities between IT and OT. We'll go over secure OT models, specific OT security tools and processes, and how to get involved with OT security and apply OT principles to your organization. We will also go over education material to learn more about OT practices.
ECMECC
Defend Your School with the School Incident Response Game- In today's digital learning environments, schools are increasingly targeted by cyber threats—from phishing to ransomware. This interactive session introduces the School Incident Response Game, a hands-on challenge that teaches real-world incident response and risk management in school scenarios. Learn how to balance resources, manage crises, and mitigate threats while collaborating with fellow educators and administrators.
Level up your cybersecurity skills and defend your school in a fun, engaging way!
Extreme Networks
Managing Your Network Made Easy- Extreme Fabric is the industry’s only end-to-end, automated, and secure network fabric solution. With Extreme Fabric, IT teams can simplify operations, save time and effort, and reduce risk.
-Hyper segmentation prevents lateral movement with isolated, end-to-end services.
-Stealth networking protects fabric core against attacks.
-Securely retracts redundant network services.
Extreme Networks Platform ONE - Revolutionizing the way Networks are assisted with AI- Extreme Platform ONE enables organizations to regain control, unlock innovation, and boost productivity through:
-One integrated experience that is easy to use
-Automation with built-in AI that boosts productivity, reducing cycle time from hours to minutes
-Simplified licensing that makes the solution as easy to buy as it is to use
Unique Capabilities
A real-time, composable workspace unifies networking, security, and inventory management
-The built-in AI goes beyond mere remediation to automate use cases across the entire learn, plan, deliver, and fix lifecycle
-Complete access security includes cloud-managed ZTNA and network access control in a single, easy-to-use interface Extreme Platform ONE enables organizations to regain control, unlock innovation, and boost productivity through:
Extreme’s Cloud Applications Simplify Managing Extreme and Third-Party Networks- Cloud-based unified network management of Wired, Wireless, SD-WAN, and IoT devices.
Layered security across the entire infrastructure with network access solutions, air interface protection, fabric-based hyper-segmentation, and SD-WAN. Best in class Wired, Wireless, and SD-WAN along with industry-leading Extreme Fabric ties everything together over an automated, secure, end-to-end network. AIOps and support for third-party devices reduces operational costs while improving reliability and ensuring the best user experience. Customer control of device updates minimizes downtime. Insights into users, devices, application, and traffic enable new business services.
Ruckus Networks
Harnesses the Future of Connectivity with Wifi7 and AI- Explore the transformative potential of Wi-Fi 7 and AI in revolutionizing network connectivity and management. Discover how Wi-Fi 7's unprecedented speed, capacity, and reliability can elevate student learning. Learn how RUCKUS AI's advanced analytics and automation streamline network operations, reduce IT workloads, and enhance decision-making by proactively identifying and prioritizing network issues with clear steps to resolution. Join us to unlock the future of connectivity!
Tech Check
Shoring Up Your Servers- Recent developments in server virtualization and data backups are shaping upcoming purchasing decisions in K12 Technology. We will discuss how these changes are impacting hardware purchases, cost-saving virtualization solutions, considerations for a hypervisor migration, and NAS & Cloud based Veeam Backup solutions. As an added bonus, we will discuss the reemergence of tape drives and there role in your data center - a true technology phoenix!
Server Virtualization- Current trends. VMWare updates, Hypervisor options and associated costs
NAS Devices- What to look for and recomendations
Veeam - The new Data Cloud Vault, licensing, and comparisons