[1 CPE] Zero Trust Microsegmentation – It’s Easier Than You Think

  Presented by Sumi Gorla, Director of Systems Engineering • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

Sumi Gorla is the Director of Systems Engineering at Illumio. Her responsibilities include executing Illumio strategic product vision, field engineering enablement, and enterprise customer selling and support across US West. Prior to Illumio, Sumi has held several engineering and technical sales leadership roles in companies such as EMC, Brocade, Citrix, and BigSwitch Networks. As a sales leader, Sumi brings a unique approach to problem-solving, from both a technical and a business perspective. Sumi’s strengths are in her ability to explain how technical features can meet business requirements for all levels of audience.

[1 CPE] Intune: What’s New and What’s Next

  Presented by Structured

Microsoft Intune is quickly becoming a strategic part of not only device management, but compliance and security as well. Structured will cover what’s new and how Intune will impact your Windows PC strategy management.

Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.

[1 CPE] Improved Security for SecOps & NetOps that’s Recession Friendly

  Presented by Ryan Parr, Sr Solutions Architect • Infoblox

While the future economic impact on IT budgets is unclear, one thing is clear –– attackers will not slow down and may even ramp up knowing organizations are considering lowering IT and cybersecurity spending. It is clear enterprise security is of extreme importance and making investments stretch is going to become essential. Core network services you already have in place, including DNS, DHCP, and IPAM (IP Address Management) are often overlooked in the cybersecurity world but can become the most powerful weapon against attackers. During this session, you will learn how to leverage existing services to:

  • Reduce the burden on existing security investments, extending their capacity and lifespan
  • Combat up to 92% of malware and ransomware without new security tools
  • Decrease SecOps investigation time by up to 60%
  • Improve your security posture, lowering cyber insurance costs

[1 CPE] Protecting Your Data from Ransomware Where it Lives: Your Last Line of Defense

  Presented by Nik Lainus, Sr Solution Consultant • Hitachi Vantara

If an attack happens and makes it all the way to your data, then they have already broken through all your walls. Where your data lives IS your last line of defense, which is why the Armed Forces that protect the USA trust Hitachi to protect them. Prevention is great but without that last line of defense, you’re a sitting duck. Attend this session to learn how Hitachi serves as your last line of defense against ransomware attacks.

[1 CPE] How AI Can Think Like an Attacker

  Presented by Darktrace

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

[1 CPE] Modernizing Physical Security

  Presented by Verkada

In this session, we’ll look at the technologies at the forefront of enterprise building security. Connected security devices can provide users with real-time insights and a full picture of the health and safety of their environments. We’ll explore how to minimize security risks, workplace frustrations, and costly inefficiencies with best–in–class solutions that provide a scalable way to easily configure, monitor and respond to events from anywhere. Learn how modernizing your physical security can help you seamlessly safeguard the physical world –– without sacrificing privacy –– to operate safer, smarter buildings.

[1 CPE] Panel: Retaining Your IT Staff in 2023, Can it be Done?

  Presented by INTERFACE Advisory Council

“The other company is offering higher wages. I get to work remotely as much as I want, and I am getting a four-day workweek. Sorry but I must take it.” Have you heard this just a few times? So many IT hiring managers are having to find creative ways to keep staff members in-house. While budgets and major company overhauls can’t always be achieved, there are methods that can help.

Join the INTERFACE Portland Advisory Council for an open conversation on how to keep your staff intact. This panel features local area IT hiring managers and leaders that deal with these challenges in their own shops. Bring your questions as there will be an opportunity to get advice on the needs you have.

  • Steve Hankel, Vice President, Information Technology, Johanson Transportation Service
  • Don Hornschuch, Information Technology Manager, OnPoint Community Credit Union
  • Ian Raloff, Sr Applications Systems Engineer, Moda Health
  • Saby Waraich, Chief Information Officer, Clackamas Community College

[1 CPE] Security and Resiliency for Your Most Critical Data

  Presented by Ratko Puzic, Senior Channel Systems Engineer • Cohesity

Join this session for a walk-through of a real-world ransomware attack and the necessary steps to recover. We will cover a cyber insurance form to show how it aligns with our “Protect, Detect, Recover” point of view, and we will speak to the specific capabilities associated with each point.

[1 CPE] How to Stop East/West Attacks in Your Data Center

  Presented by Aruba Networks

70% of all breaches are caused by endpoint security vulnerabilities, followed by lateral movement in the data center. Halt that hacker traffic. Attend this session to learn about a new category of data center switch that combines best-of-breed L2/3 switching with the industry’s first hardware-accelerated programmable processor. This new tool augments your malware and ransomware detection and response capabilities by delivering stateful firewall services inline, at scale, with wire-rate performance and orders of magnitude improvement over traditional data center L2/3 switches. You will learn how to gain visibility and enforce security policy for all East/West flows between workloads to protect the critical assets in your data center.