[1 CPE] Actions for Critical Infrastructure Leaders to Address PRC State-Sponsored Activity

  Presented by Leslie Ann Kainoa, Oregon Cybersecurity State Coordinator • CISA

Please join us for a detailed discussion on the techniques and tactics of the People’s Republic of China state-sponsored activity, including Volt Typhoon. Background will be shared on an understanding of known US compromises and recommended actions to mitigate risks. This talk will be given at the TLP: Clear, public information classification level.

Leslie Ann Kainoa is the Oregon Cybersecurity State Coordinator for the Cybersecurity and Infrastructure Security Agency (CISA), Region 10. In her current role, Leslie provides cybersecurity assistance and support to public and private Critical Infrastructure sectors throughout the State. She is focused on working with these organizations to improve cybersecurity and critical infrastructure resilience.

[1 CPE] The Decarbonization of the Data Center

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Balancing the need for substantial data infrastructure with more eco-friendly policies should be top of all organizational to-do lists. Rather than a competition between corporations, these initiatives should be focused on the larger benefit of a healthier world. That’s why creating a specific data center decarbonization strategy will be key. This will range from improving the visibility and measurement of power usage, to actually reducing the carbon footprint of each operational layer. But where should organizations begin?

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

[1 CPE] The Modern Kill Chain: How Attacks Have Gone from Months to Minutes

  Presented by Tony Kelly, Sr Manager, Sales Engineering • Lookout

Cloud breaches are now happening in minutes, not months. Threat actors are exploiting the fact that mobile devices are more susceptible to social engineering, enabling them to gain direct access to cloud infrastructure and swiftly compromise data. Join us for this 50-minute presentation to learn:

  • How the traditional cyber kill chain has evolved to exploit mobile users
  • Why attacks utilizing a mobile device are increasing
  • What makes your organization vulnerable to a modern-day attack
  • Why stopping breaches requires the ability to identify anomalous data movements
  • The three key capabilities you need to defend against modern breaches

[1 CPE] Breaking Down Silos: Unify Assets, Minimize Attack Exposure

  Presented by Mike Brown, Sr Sales Engineer • Axonius

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.

Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.

As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.

[1 CPE] Don’t Build a Fire Department

  Presented by Alfonso Rodriguez, Sr Sales Engineer • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24×7 monitoring across your collective attack surfaces.

[1 CPE] From Back-End to Boardroom: Securing Your Seat at the Table

  Presented by INTERFACE Advisory Council

Decisions are made every day at your organization that will impact all employees. Budgets, policies procedures, and more are discussed in board rooms, on conference calls, or at a staff lunch. Who is a part of these discussions? Are you? So often Information Technology departments are not included in key decisions about the direction of an organization, and they should be.

Join the INTERFACE Advisory Council for an open discussion about securing your “seat at the table.” IT performs so many crucial services that help all aspects of a business, it makes sense that you are offering up the needed insight into technology’s role in key decisions. Join this panel discussion to hear from your peers about how you can accomplish this tough task.

Moderator: Brandon Gatke, AVP of Information Technology and Security, Portland Community College

Panelists:

  • Ed Arib, Technology Manager, Portland Police Bureau
  • Steve Hankel, Vice President of Information Technology, Johanson Transportation Service
  • Brian Hole, Deputy CISO, Legacy Health
  • Jaya Srinivasan, CISO, Director of Cybersecurity, M Financial Group

[1 CPE] Architecting a Data-Centric Approach to Zero Trust

  Presented by Aaron Kremer, Technical Solution Specialist • NetApp

As organizations navigate the evolving landscape of virtualization, cloud computing, and AI, they face increasing challenges in securing and managing their data. Security remains a critical foundation, while effective data management and mobility ensure data is accessible and protected across diverse environments. With rising complexity, simplicity becomes key to optimizing operations and accelerating outcomes. This session will explore strategies for balancing security, data management, and efficiency, providing actionable insights to help meet the demands of today’s dynamic IT environment.

[1 CPE] AI in Cybersecurity: Navigating the Double-Edged Sword

  Presented by Johan Bloomhart, Principal Sales Engineer • WatchGuard & BlackPoint IT

The rise of Artificial Intelligence (AI) has introduced both transformative opportunities and unprecedented risks to the cybersecurity landscape. While AI is a powerful tool for automating threat detection and enhancing security protocols, it also presents new avenues for cybercriminals to launch more sophisticated attacks. In AI in Cybersecurity: Navigating the Double-Edged Sword, we’ll explore AI’s dual impact—empowering both defenders and attackers—and discuss how to harness AI responsibly to protect against emerging threats.

This session will cover:

  • An overview of AI’s evolution and its prominence in the modern business world.
  • How malicious actors exploit AI for nefarious purposes, and the vulnerabilities that arise.
  • How cybersecurity professionals use AI to fortify defenses, identify threats, and mitigate risks.
  • Predictions for AI’s long-term influence on the security industry.
  • The latest technological tools and techniques that can mitigate the risks posed by AI.

We’ll also offer guidance on developing an artificial intelligence policy that allows your organization to leverage AI’s productivity benefits while minimizing risks to data security. Participants will walk away with actionable insights into how to implement AI securely in their business, staying ahead of both competitors and cyber threats.

[1 CPE] The Future of AI-Enabled Data Platforms

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Removing the infrastructure silos and administration complexity around your application’s data gives you the flexibility to consume solutions and deliver total data freedom. Join us as we showcase the future of data storage as a single hybrid cloud platform for applications. Allowing you to consume the data services you need, where and when you need it! Offering a single data plane and control plane across block, file, object, and mainframe, with one common experience for administration, analytics, and automation.

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.