PCI and Your Organizational Liability

  Presented by Structured Communication Systems

Payment card processing is a critical service many companies and organizations offer. But with this service comes the added responsibility to comply with PCI requirements, and the technical, administrative, and physical controls applicable to card processing environments. Failure to comply can result in costly fines. Plus, a breach of card holder information could have disastrous financial and public relations consequences for compromised merchants. Want to know more? With compelling and engaging content delivered by Rob Wayt, a PCI Qualified Security Assessor (QSA), you will learn the intricacies of these requirements, proper scoping, and how to mitigate risks that merchants have while card processing.

Cloud Security: Top Use Cases for Modern Cloud Protection

  Presented by Xiologix

With enterprises embracing multiple cloud environments, the attack surface is growing immensely—but security visibility and coordination are shrinking. In this presentation, we will discuss why and how to bring the cloud conversation into hardware purchase conversations and who is responsible for securing the different types of cloud resources. We will also walk through the six most common use cases for cloud protection.

Phishing, Shoulder Surfing, Drafting: Avoiding Social Engineering Exploits

  Moderated by INTERFACE Advisory Council

Social engineering has been around longer than we’ve had computers and continues to represent a significant risk to companies in the US and around the world. Whether it’s a phishing attack, opening a malicious attachment, seeing a stranger show up where he or she shouldn’t be or logging on to the company network from a coffee shop it all comes down to people. It’s important to make use of training and other tools to reduce the risk of such attacks. Many security incidents and breaches that occur are not the result of not rolling out the right software or installing strong locks on the doors. They result from well-meaning people who just aren’t paying attention to social engineering risks. This session provides participants with tools they can use in their companies to protect confidential and non-public data as technologies and training that will, if understood and used properly, reduce risks significantly.

Moderator:

  • Chris Apgar • CEO & President, Apgar and Associates

Panelists:

  • Erik Gellatly • President; InfraGard Oregon Members’ Alliance
  • Theresa Masse • CISO; Port of Portland
  • Christopher Paidhrin • CISO, City of Portland
  • Dennis Tomlin • CISO, Multnomah County

Backups to the Cloud: Our Journey to Move Beyond Tape

  Presented by Commvault

Learn how Portland State University ditched tape and took advantage of cloud storage to improve the geographical diversity of offsite backups as well as enhance recovery capabilities. Replacing tape backups and offsite storage with public cloud within the existing budget can be a daunting challenge. The presenters provide an overview of Portland State University’s backup methodologies, technical challenges, security concerns, and budget strategies to prepare each organization for what is required when transitioning from tape to cloud.

Mitigating Cybercrime Through Automated Response and Integration

  Presented by Fortinet

Come join our talk on mitigating cybercrime and learn about best practices to help your company maintain a strong security posture through the digital transformation and beyond. The bad guys are using automated tactics to try to find a foothold in your network. Isn’t it time to leverage an integrated security approach to automate your response?

Welcome to the New Age of Converged Secondary and Primary Storage

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won’t be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.