The Current Malware Threat Landscape & Best Practices for Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Architecting the New SD-WAN Edge for the Cloud-first Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

Active Directory Security: Early Stage Attack Activities to Watch For

  Presented by STEALTHbits Technologies

Attackers have demonstrated a consistent and ongoing ability to obtain access to workstations inside the network boundary through phishing and other web and email attacks. From here, attackers set their sights on gaining control of Active Directory as a means to an end; compromising Active Directory is an easy way to gain access to all critical corporate data and resources. Darin will discuss two early stage attack activities: LDAP reconnaissance and Password Spraying — that allow attackers to move laterally inside your AD environment. Detection strategies and mitigation steps will also be explained.

Micro-Segmentation 101

  Presented by Illumio

Companies of all sizes are struggling to ensure their networks are secure using aging firewall security systems. Micro-segmentation, when implemented correctly, can offer the additional security they need and provide tremendous application visibility in the process.

You’ll learn…

  • Why you need micro-segmentation
  • How micro-segmentation works
  • The 5 steps to implementing a micro-segmentation strategy for your data center and cloud

Welcome to the New Age of Converged Secondary and Primary Storage

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won’t be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

IT Modernization

  Moderated by INTERFACE Advisory Council

IT Modernization means different things to different organizations and their IT departments. Generally it is the process of upgrading the technical infrastructure, be it the hardware for the network, the servers or desktops, and increasingly the mobile devices in play. It is also the process of upgrading the business applications by upgrading and/or replacing the vendor supported application, or the AppDev stack for in house systems.

IT Modernization is often challenged by the business priorities, and the need to deliver new functionality to remain competitive or increase efficiency and customer service. Deferring and avoiding the updating and modernization in IT leads down the dark path of technical debt and bankruptcy.

Join a panel of senior IT managers to discuss how their IT organizations have led IT modernization efforts, and share pointers and best practices in this area.

Moderator:

  • Richard Appleyard • Deputy CIO for Oregon Secretary of State

Panelists:

  • Caesar Bernardo • IT Program Manager / Consultant
  • Stephen Fitton • Technical Solutions Manager at Salem Health

Predict Future Attacks with AI

  Presented by Cylance & Structured Communication Systems

Get a first-hand look at how cybercrime is conducted today, how to combat the most damaging attack strategies, and how to even prevent threats that have not been seen before. Take a journey with us as we explore the enemy, revealing tactics and tricks, so you don’t become the next cybercrime victim. Join us in the good fight against an ever-changing threat vector with the best weapons, knowledge, and powerful AI-based technology. /p>

Rearchitecting Security for Branch and Mobile Users

  Presented by Palo Alto Networks

Traditional back haul hub & spoke networking, such as MPLS and remote access VPN, is not suitable for today’s mix of cloud and internet applications. Join our session to learn what is needed for consistent security that provides the coverage for growing organization.

Modernize Your Business with Cloud-Ready Infrastructure

  Presented by Xiologix

Today’s IT infrastructure must manage our modern hyper-connected, and hyper-distributed digital realities. In this presentation, we will discuss the important relationship between on-premises hardware and cloud services, reality vs expectations when executing a new cloud strategy, and how to minimize cost while running in the cloud.

On a Clear Day You Can See the Cloud

  Presented by Ben Berry • Executive VP, Information Technology & CIO of Bonneville Power Administration

Deciding whether and how to use cloud computing versus on premise is a complex decision. It can be complicated by business architecture, vendor software development strategies, multicloud approaches, compliance requirements, who owns the data, and the color of money. As Executive VP for Information Technology and CIO for Bonneville Power Administration, Ben Berry works with IT Strategic Business Partners and customers to make the right cloud decisions.

Serving as a strategic technology leader, Ben Berry is a professional with performance-based leadership and knowledge of diverse private and public sector business and technology systems. He is the Executive Vice President of Information Technology and CIO for the Federal Government’s Bonneville Power Administration. The power generated on BPA’s electric grid is sold to public utilities, private utilities, and industry on the grid.

Mr. Berry is the Aerospace Entrepreneurial CEO and Chief Digital Officer for AirShip Technologies Group’s AirShip Endurance Unmanned Aerial Vehicles, StingerMAV MicroIntelligence for clean tech, long flight endurance drones. He has held various senior leadership technology positions serving the Royal Saudi Air Force, Kingdom of Saudi Arabian International Airports, and Hughes Aircraft Company–Los Angeles. He is a Board of Director at the Evergreen Aviation and Space Museum. Currently he serves as a U.S. Air Force Honorary Commander for the U.S. Air Force 142nd Fighter Wing, one of two “Ready Alert Bases” that protect the entire West Coast of the United States of America and Canada as part of NORAD.

Mr. Berry is the previous Chief Technology Officer for the City of Portland. Previously, He also served as Oregon Department of Transportation’s (ODOT) Chief Information Officer providing overall leadership, planning, development and delivery of information technology services for ODOT and several other non-transportation organizations. As CIO for the second largest state agency in Oregon, Mr. Berry was responsible for systems supporting highways, bridges, rail service, right-of-way determinations, DMV and Motor Carrier commercial trucking inspections and licensing throughout the state.

Mr. Berry is the former Regional Chief Technology Officer of Providence Health System Oregon, supporting a service area of eight hospitals and 33 clinics. He has held executive and management positions in sectors such as state and local government, healthcare, telecommunications, aerospace/defense and airport transportation. Berry received his M.B.A. from UCLA, a B.S. in Life Science–Biotechnology from the University of Portland.

Mr. Berry currently serves on the following Boards:

  • Central City Concern (8yrs.)
  • Oregon State University, School of Business–Business Information Systems (12yrs.)
  • Evergreen Aviation and Space Museum (4yrs.)
  • Scouts, BSA – Pacific Cascade Council Board (3yrs.)
  • iUrban Teen Technology (7yrs.)