[1 CPE] How AI Can Think Like an Attacker

  Presented by Darktrace

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

[1 CPE] Modernizing Physical Security

  Presented by Verkada

In this session, we’ll look at the technologies at the forefront of enterprise building security. Connected security devices can provide users with real-time insights and a full picture of the health and safety of their environments. We’ll explore how to minimize security risks, workplace frustrations, and costly inefficiencies with best–in–class solutions that provide a scalable way to easily configure, monitor and respond to events from anywhere. Learn how modernizing your physical security can help you seamlessly safeguard the physical world –– without sacrificing privacy –– to operate safer, smarter buildings.

[1 CPE] Panel: Retaining Your IT Staff in 2023, Can it be Done?

  Presented by INTERFACE Advisory Council

“The other company is offering higher wages. I get to work remotely as much as I want, and I am getting a four-day workweek. Sorry but I must take it.” Have you heard this just a few times? So many IT hiring managers are having to find creative ways to keep staff members in-house. While budgets and major company overhauls can’t always be achieved, there are methods that can help.

Join the INTERFACE Portland Advisory Council for an open conversation on how to keep your staff intact. This panel features local area IT hiring managers and leaders that deal with these challenges in their own shops. Bring your questions as there will be an opportunity to get advice on the needs you have.

  • Steve Hankel, Vice President, Information Technology, Johanson Transportation Service
  • Don Hornschuch, Information Technology Manager, OnPoint Community Credit Union
  • Ian Raloff, Sr Applications Systems Engineer, Moda Health
  • Saby Waraich, Chief Information Officer, Clackamas Community College

[1 CPE] Security and Resiliency for Your Most Critical Data

  Presented by Ratko Puzic, Senior Channel Systems Engineer • Cohesity

Join this session for a walk-through of a real-world ransomware attack and the necessary steps to recover. We will cover a cyber insurance form to show how it aligns with our “Protect, Detect, Recover” point of view, and we will speak to the specific capabilities associated with each point.

[1 CPE] How to Stop East/West Attacks in Your Data Center

  Presented by Aruba Networks

70% of all breaches are caused by endpoint security vulnerabilities, followed by lateral movement in the data center. Halt that hacker traffic. Attend this session to learn about a new category of data center switch that combines best-of-breed L2/3 switching with the industry’s first hardware-accelerated programmable processor. This new tool augments your malware and ransomware detection and response capabilities by delivering stateful firewall services inline, at scale, with wire-rate performance and orders of magnitude improvement over traditional data center L2/3 switches. You will learn how to gain visibility and enforce security policy for all East/West flows between workloads to protect the critical assets in your data center.

[1 CPE] Technology Drives Our Clean Energy Future

  Presented by Dave Worth • Divisional CIO, Portland General Electric

The challenges facing the electrical grid are well known, and well publicized. How will energy be produced? How will it be distributed? How do customers realize the value of their renewable investments? How do we keep it equitable? These are significant challenges, but PGE engineers, technicians, and technologists have converted many challenges into opportunities in our 134-year history, and we feel no different about these. The first step is to orchestrate the activities of each participant and improve the ability to operate our grid using automation. Simultaneously, we are called on to implement, maintain and replace a large amount of infrastructure to support the transition to electricity as an energy source efficiently. The virtuous cycle is a grid that is easier to maintain, more reliable, safer, and equitable to all stakeholders and is being driven through close IT/OT collaboration and cross-functional implementation.

Dave Worth is the Divisional CIO for Advanced Energy Delivery and Utility Operations at Portland General Electric. He leads the technology effort to modernize PGE’s capabilities, in service of its mission to drive Oregon’s energy transformation. Dave’s team focuses on outcomes for customers by delivering, maintaining, and modernizing technology associated with asset & work management, mobile, grid operations, emergency operations, and bulk management systems within PGE’s utility operations. Prior to this role, Dave was the Director of PGE’s Customer Engagement Transformation, which modernized PGE’s billing and metering systems, and is the largest IT project executed by PGE to date. Beyond software delivery and support, Dave’s management and technical expertise include customer service operations, marketing and sales, business development, and telecommunications. Dave lives with his family in Portland, Oregon where he enjoys gardening, playing guitar, and experiencing the outdoors by hiking and camping. Dave has been with PGE for 22 years, and in the IT industry for twenty-five. He graduated Magna Cum Laude from Linfield College with a BS in Business Information Systems (a mixed computer science/finance program).

[1 CPE] How You Communicate Risk Might Just Be Your Biggest Risk of All

  Presented by Meghan Maneval, Director of Technical Product Management • Reciprocity

It’s no secret that recent years have seen an uptick in malware attacks, data exfiltration, and vulnerability exploitation. And likely your Executive Leaders and the Board want to know, “Are we doing enough to protect ourselves?” As professionals, we need to be prepared to respond to difficult questions. But all too often, we see risk through the lens of “how” we are protecting our organization instead of “how well” it is protected. Seeing risk through different lenses can skew how risk is communicated resulting in a false sense of security and heightened risk for your organization.

Join this session to learn about the three types of “glasses” CISOs and Information Security professionals often wear: Rose Colored Glasses, Blinders, and Magnifying Glasses. Learn about the “right” glasses that can help you proactively monitor and communicate risk in a context your organization will understand. Wearing these glasses enables organizational leadership to prioritize investments and agree on a level of protection to enable company success and mitigate your biggest risk of them all.

[1 CPE] Open Source Developers Are Security’s New Front Line

  Presented by Neel Thakkar, Sales Engineer • Sonatype

Bad actors have recognized the power of open source and are now beginning to create their own attack opportunities. This new form of assault allows hackers to poison the well, where OSS project credentials are compromised, and malicious code is intentionally injected into open source libraries. In this session, Sonatype will explain how both security and developers must work together to stop this trend or risk losing the entire open source ecosystem.

  • Analyze and detail the events leading to today’s “all-out” attack on the OSS industry.
  • Define the future of open source in today’s new normal.
  • Outline how developers can step into the role of security to protect themselves and the millions of people depending on them.

[1 CPE] Cybersecurity Threats & Best Practices for Information & Operational Technology

  Presented by Leslie Kainoa and Theresa Masse • CISA

The Cybersecurity and Infrastructure Security Agency (CISA) leads the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure. We connect our stakeholders in industry and government to each other and to resources, analyses, and tools to help them build their own cyber, communications, and physical security and resilience, in turn helping to ensure a secure and resilient infrastructure for the American people.

This presentation will feature two local Oregon CISA leaders, Cybersecurity Advisor Leslie Kainoa and Cybersecurity State Coordinator Theresa Masse. It will focus on general cyber threats and, more specifically, on operation technology cybersecurity best practices and current threats. It also will outline cyber services CISA provides at no charge.