Welcome to the New Age of Converged Secondary and Primary Storage

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won’t be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

How Not to do Security!

  Presented by Check Point Software

Whether you are a bank, government, retail or in manufacturing, security impacts us all. Despite the differences in vertical sector, education has the same technology needs as these organizations. The ironic thing is that having more Information Security funding alone does not help these organizations keep their networks secure and their data from being ex-filtrated. Our nation’s top industries continue to be targeted for attacks with numerous breaches disclosed throughout the year.

In each case of these recent breaches, the organizations had the tools, technology and information security resources to detect, prevent and respond to such attacks. None the less, cyber-attacks on our nations corporate, government, critical infrastructure is on the rise. Securing the network, perimeter and data center is the same as in other industries. Come learn best practices that Check Point has learned from helping secure our customers networks for two decades and how to best apply them in today’s networks.

How to Be a Worthy Opponent at a Table of Cyber Criminals

  Moderated by INTERFACE Advisory Council

In today’s world, end users are not the only people interested in your technology. Organizations are constantly under attack and information is often the target. What kinds of attacks happen? How do you stay ahead of the curve when the attacks are constantly evolving? What resources are available to you? Join the Advisory Council in a panel discussion on cybercrimes and what you can do about them.

Moderated by:

  • Amy McLaughlin • Director of Information Services at OSU

Panelists:

  • Lisa Vasa • CISO for the Oregon Secretary of State
  • Matthew Wilson • VP Risk & Administration at Oregon Community Credit Union
  • Richard Rader • CTO at Seven Feathers Casino & Resort

So You Want to be an IT Rock Star?

  Moderated by INTERFACE Advisory Council

As more people turn to IT as a profession, how do you stand out and make yourself a cut above the rest? Join the Advisory Council for a panel on what makes an IT professional stand out, where there are opportunities for growth and things you can do today to be a better IT team member.

Moderated by:

  • David Clark • Director of IT for Three Rivers Casino

Panelists:

  • Mike Finch • CIO, Lane County Information Services
  • Michael Quiner • CIO, Linn-Benton Community College
  • Keleen Wright • CIO at Department of Veterans Affairs

Digital Ducks: Transformation Taking Flight at the University of Oregon

  Presented by Matt Riley • CTO & Leo Howell • CISO, University of Oregon

Dive into the world of IT in higher education at a flagship public institution, including where we have been, where we are and where we are going. Together, Leo and I will cover a little history, discuss where our institution is at today, and where the University of Oregon is headed in terms of the transformation of our business, the changing expectations of our students, staff and faculty, and how our teams are enabling these changes.

We will explore the challenges we experience as a brick and mortar campus operating in a virtual world. Key topics will include creating, servicing and maintaining the right technology infrastructure on campus, the influence and potential of the cloud, security and privacy and the alignment of IT and institutional strategy.

Matt Riley joined the University of Oregon as Chief Technology Officer early last fall. Matt has been involved in technology leadership within higher education for more than 28 years, including managing and directing IT at the University of Redlands for over 16 years. Matt then led IT for the School of Humanities and Sciences at the University of Redlands, eventually moving on to the University of Montana, where he served as chief information officer for five years before coming to Oregon. In his CIO role at Montana, Matt provided vision and strategic direction for information technology. Matt continues that work in Eugene, assisting Jessie Minton, chief information officer and vice provost for information services.

Leo Howell is an experienced and enthusiastic cybersecurity visionary committed to reducing risks and improving business productivity. Put another way, Leo empowers the “good guys” to do their stuff while doing what’s necessary to stop the “bad guys” from being a pain in the neck. Leo currently serves as the Chief Information Security Officer for the University of Oregon. Previously, he serves as the Director for Information Security Risk and Assurance at NC State University. In a past life, Leo served in senior roles in Internal Audit and held many other IT and security roles in and outside of higher education. Leo is a Certified Information Security Professional (CISSP), Certified Information Systems Auditor (CISA) and former certified almost everything else. He received his B.Sc. in Computer Science and Electronics from the University of the West Indies with honors, and his MBA from NC State University. Leo is a proud member of the international honor society Beta Gamma Sigma. He likes to build secure things. He is a proud husband and father and is excited and about the future.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Mitigating Cybercrime Through Automated Response and Integration

  Presented by Fortinet

Come join our talk on mitigating cybercrime and learn about best practices to help your company maintain a strong security posture through the digital transformation and beyond. The bad guys are using automated tactics to try to find a foothold in your network. Isn’t it time to leverage an integrated security approach to automate your response?

Active Directory Security: Early Stage Attack Activities to Watch For

  Presented by STEALTHbits Technologies

Attackers have demonstrated a consistent and ongoing ability to obtain access to workstations inside the network boundary through phishing and other web and email attacks. From here, attackers set their sights on gaining control of Active Directory as a means to an end; compromising Active Directory is an easy way to gain access to all critical corporate data and resources. Darin will discuss two early stage attack activities: LDAP reconnaissance and Password Spraying – that allow attackers to move laterally inside your AD environment. Detection strategies and mitigation steps will also be explained.

Operationalizing Cyber Resilience for School Safety & Continuity of Education

  Presented by Minna LeVine • CEO,
SMART Community Exchange

Increasingly numerous and successful cyber-attacks on high-value targets in American communities are captured in near-daily headlines. In her State of Homeland Security remarks on March 18, 2019, former DHS Secretary Kirstjen Nielsen called for a “Whole of Society” approach to correcting the realities, and looming consequences inherent in a cyber-reliant, and thus target rich, America. As targets for both cyber and physical predators. The presentation will provide insights into a private sector developed solution set that provides continuous real-time school security and situational awareness while simultaneously ensuring the continuity of education operations in communities throughout America.