Page 6 - 2025 Spring Conference Brochure
P. 6

Information Technology
                                Information Technology



                                      Pre-Conference Agenda

                                                     April 2, 2025

        9:00 AM - 10:00 AM
        K eynote Address
        Keynote Address
        Succes    sful Leadership in an Educ              a tional Envir       onment:
        Successful Leadership in an Educational Environment:
        Over   coming the Compliance Mindset
        Overcoming the Compliance Mindset
        10:05 AM - 3:30 PM
        This will be an all-da y session with breaks for lunch at 11:50 am and refreshments at 1:50 pm.
        This will be an all-day session with breaks for lunch at 11:50 am and refreshments at 1:50 pm.
        I103: Enhancing Cybersecurity Posture: Leveraging Tanium,
        I103:    Enhancing Cybersecurity P                osture: Levera        ging T   anium,
                      o
                    Cr
                        wdstrike, and Cisco Duo
                    Crowdstrike, and Cisco Duo
        This working session will focus on enhancing your organization’s cybersecurity posture by effec-
        tively utilizing three powerful tools:
        T anium                                                 Cisco Duo
                                                                Cisco Duo
        Tanium
           Explore Tanium’s capabilities for real-time             Explore Cisco Duo’s role in strengthening
           endpoint visibility and control.                        multi-factor authentication (MFA) and ac-
           Learn how to leverage Tanium for rapid                  cess security.
           threat response, patch management, and                  Learn how to implement and manage Duo’s
           software distribution.                                  MFA solutions to enhance the security of
           Gain insights into Tanium’s role in improv-             your organization’s remote access and data.
           ing incident response times and minimizing              Discuss strategies for integrating Duo with
           system downtime.                                        other security tools to improve overall secu-
                                                                   rity posture.
        Crowdstrike
        Cr  o wdstrike
           Understand CrowdStrike’s advanced end-
           point protection and threat-hunting capabil-
           ities.
                                                                Target Audience: This session is designed
           Learn how to leverage CrowdStrike’s                  T ar get   Audience:
           AI-powered threat intelligence to proactive-         for  IT professionals,  cybersecurity  specialists,
           ly identify and mitigate cyberattacks                and  other  relevant  personnel  interested  in
           Discuss best practices for utilizing Crowd-          enhancing  their  organization’s  cybersecurity
           Strike’s features, including endpoint detec-         posture  through  the  effective  use  of  Tanium,
           tion and response (EDR) and threat intelli-          Crowdstrike, and Cisco Duo.
           gence feeds.


                                                                                    s:
                                                                                   y
                                                                               w
                                                                        akea
                                                                Key T
                                                                                 a
        Presenters                                              Key Takeaways:
           Albert Magallanez - Sunnyside Unified                   Gain a deeper understanding of the func-
           School District                                         tionalities and benefits of Tanium, Crowd-
           Mary Farrelly - CrowdStrike                             strike, and Cisco Duo.
           Michele Reseigh - Tanium                                Learn best practices for implementing and
           Bethanie Vang - Cisco                                   utilizing these tools effectively.
           Ali Bramlett - State of Arizona Department              Develop strategies for integrating these
           of Homeland Security | Cyber Command                    tools into your existing cybersecurity frame-
           Ryan Murray - State of Arizona Depart-                  work.
           ment of Homeland Security | Cyber Com-                  Network with other cybersecurity profes-
           mand                                                    sionals and share best practices.
        Page 6
   1   2   3   4   5   6   7   8   9   10   11