[1 CPE] Breaking Down the 5 Most Disruptive Vulnerability Types

  Presented by Arctic Wolf

A vulnerability is a weakness in your infrastructure, networks, or applications that can potentially expose you to threats, such as data theft, denial-of-service attacks, or ransomware attacks. Join us as we discuss what makes vulnerabilities truly dangerous and take a deep dive into five types of vulnerabilities that risk management programs should focus on to most effectively eliminate risks.

We will cover:

  • The five riskiest types of vulnerabilities
  • Why they are dangerous and how bad actors exploit them
  • The key to identifying and protecting against them

[1 CPE] Endpoint Systems Management: Time to Rethink

  Presented by Quest Software

See the recent changes to the endpoint environment and how these affect your infrastructure. Learn how these changes affect your network design and what this means for your daily business. Learn more about the new technologies available for managing your endpoints and see some tips and guidelines to be prepared for what’s next.

[1 CPE] How to Successfully Manage Technology Challenges for a Remote Workforce

  Presented by INTERFACE Advisory Council

Your workforce will be dispersed permanently following the pandemic. Companies will no longer have their staff under one roof. Employees are working remotely in your city and throughout the country. This certainly has brought many challenges for IT departments everywhere. This is however the new business reality and adjustments have been made over the last year and a half to deal with the permanent remote workforce.

What are the best programs for basic monitoring of work? Can a VPN be trusted to securely handle your security needs? Is there really any difference between Zoom and Teams? Join the INTERFACE Advisory Council for a discussion about these questions and more. These challenges are nothing new but have quickly become more complex and common. Also, we will address the mix of workers coming back into your office and how that affects physical workspace changes.

Panelists:

Michael Agtunong • Manager, Information Technology, Gather Federal Credit Union
Jeromy Giacosa • Vice President, Information Services, Exagen
Matthew Linzer • Manager, Information Technology, University of California Office of The President

[1 CPE] 5 CISOs and a Whole Lot of Thought Leadership

  Presented by EVOTEK

Today’s environment demands attention on several fronts. This is especially the case as it relates to information security. Companies, no matter their size, are dealing with the same issue – how to survive and thrive in a digitally dangerous climate. EVOTEK’s executive advisory team addresses this question daily via their unprecedented roster of thought-provoking CISOs. Grab a front-row seat and join them in this session as they share years of experience and colorful insights in and around information security.

[1 CPE] Thinking Upstream: Avoid the Fallout of the Next Log4Shell

  Presented by Tidelift

News of a zero-day vulnerability in the popular open-source project Log4j broke in December, leading many organizations scrambling to figure out the impact on their applications. Nearly every organization developing applications was impacted, and the fallout was so broad that the FTC issued guidance.

Log4Shell comes on the heels of the U.S. White House cybersecurity executive order 14028, an attempt by the United States government to use its purchasing power to create positive changes to the way cybersecurity is addressed around the world.

Recent high-profile breaches like Log4Shell, the Colonial Pipeline ransomware attack, or the SolarWinds software supply chain attack have shown that our cybersecurity defenses are woefully inadequate. This executive order forces a higher standard of cybersecurity for any organization selling software to the federal government, which in turn makes it the de facto global standard for all software in the future.

Tidelift CEO and co-founder Donald Fischer shares his perspective on how the Log4Shell vulnerability and the cybersecurity executive order impact software supply chain security. He’ll brief attendees on the key issues addressed by the executive order, including software bill of materials (SBOM), supply chain security, and provenance requirements. He’ll outline the gaps that most organizations will need to close to stay in compliance. And he’ll share a proactive approach to addressing open-source software supply chain health and security upstream.

If you want to ensure your organization is fully prepared for the coming changes, you won’t want to miss this session.

[1 CPE] Ransomware: Who, What, Why & How…

  Presented by Check Point

Over the last 12 months, ransomware attacks surged by 93% with a devastating impact on businesses and industries worldwide. In today’s hybrid IT environment, preventing ransomware attacks seems like an impossible feat. But is it?

In this session, we will cover the latest ransomware trends and how you can protect your organization from falling victim to sophisticated ransomware attacks.

[1 CPE] Changes in Ransomware, Why Companies Still Fail to Respond, & What You Can Do Now

  Presented by Trey Blalock • Chief Security Advisor, Verification Labs

In this fast-paced must-see talk, Trey Blalock will walk participants through a wide variety of new threats and attack techniques impacting organizations and discuss the tools, technologies, and tips you can implement to protect your organization. This talk will be a fun information-rich talk accessible to anyone who wants to learn more about security, ransomware, or defense techniques.

Trey Blalock is a highly respected security specialist who has performed extensive work in almost every security domain for some of the world’s largest corporations and governments. Trey has trained thousands of people on advanced security topics. He has managed all aspects of security for one of the world’s largest financial transaction hubs, performed hundreds of penetration tests for Fortune 500 companies, and has performed forensics for several high-profile cases such as “Donald Vance vs. Donald Rumsfeld.” He also specializes in defending large-scale systems from advanced threat actors. Trey currently serves on several forensic, red teaming, and penetration testing advisory boards, is a frequent guest on television, recently served as the CISO for Coinstar, and is currently the CISO of Cognira.

[1 CPE] Deploying DLP for All of the Wrong Reasons

  Presented by Proofpoint

Data Loss Prevention is a misnamed and misapplied technology – not all data is in scope, you will never cover every loss scenario, and while protecting data sounds like a great idea in theory, in practice data protection isn’t always the optimal goal. Many organizations are required to deploy DLP technology to comply with a regulatory compliance requirement or to protect specific intellectual property. Most DLP projects end up in a much different state than their original design and intent.

This session will cover a brief history of DLP, how you should go about taking a people-centric approach to designing your information protection program, and using metrics for success that matter, as well as how to communicate your program to a non-technical audience.

Speaker Bio:

Brian Reed is the Director of Cybersecurity Strategy at Proofpoint. He has 20+ years of information technology experience. Before Proofpoint, Brian was a senior director analyst at Gartner. Since 2015, he published over 50 research notes at Gartner, covering a wide range of cybersecurity and risk management topics.

Before Gartner, he spent many years in a variety of business development, product management, sales, and system engineering roles. Brian also serves as an advisory board member and holds a Bachelor of Arts degree in History from The University of Georgia and a Master’s in Business Administration from Kennesaw State University.

[1 CPE] SASE: The Power of Convergence

  Presented by Palo Alto Networks

Fueled by digital transformation and a massive shift to work-from-home, traditional enterprise networking and security infrastructures have been stretched to the breaking point. Legacy on-premises point-product approaches of yesteryear simply don’t make sense anymore. It’s time for a new model with the Secure Access Service Edge, or SASE (pronounced “sassy”).

SASE is quickly becoming the predominant network and security architecture that underpins our post-COVID world. SASE is the convergence of network services like SD-WAN, and security services like FWaaS, SWG, CASB, and ZTNA, into a single, cloud-delivered service model.

Join this presentation to learn:

  • Why networking and security must converge in the cloud
  • The key use cases driving SASE adoption
  • Real-world case studies of customers who have adopted SASE

[1 CPE] The Privacy Roadmap: What You Need to Know About Data Privacy Now and Moving Forward

  Presented by INTERFACE Advisory Council

First, GDPR came into law in the European Union. Then in January of 2020, the California Consumer Privacy Act took effect. Privacy laws are now a reality for all IT professionals to deal with. Are you sharing any data with third parties? How is your data stored? Have you verified all the needed compliance regulations for data in the cloud? These are just some of the many questions IT professionals need to be ready for when it comes to the current state of data privacy.

Join the INTERFACE Portland Advisory Council for a discussion on these topics and more. We will discuss setting up the right program for your operation. There will also be tips shared from handling the newest privacy laws and how these items differ from traditional cyber security preparations. Our panel of local IT leaders will offer their experiences from the last couple of years with the rapid growth in data privacy laws and how it affects the IT industry.

Panelists
Stephen Fitton • Technology Consultant, Providence
Steve Hankel • Vice President of Information Technology, Johanson Transportation Service
Matt Olson • Senior Director of Compliance and Security, Higher Logic
Shane Perry • Information Security and Risk Officer, OR Public Employees Retirement System