Fostering Inclusion in a Remote Work Environment

  Presented by PDX WIT

Underrepresented groups are disproportionately affected by this pandemic and its economic fallout. The requirement to work from home brings its own set of challenges. Employees depend on their immediate managers for support in these unique circumstances, but everyone can play a role. This presentation will explore how everyone on the team (particularly those in leadership roles) can continue to foster an inclusive work environment for their distributed teams.

Presenter:
Molly Lebowitz • Management Consultant at Propeller and PDX Women in Tech Representative

Real-Time Defender Velocity: Code on Code Warfare

  Presented by SentinelOne

Organizations spend more money on cyber security tools every year, yet the number of breaches and the cost of these breaches continues to increase. A new approach is needed that relies on autonomous analysis that can respond at machine speed. By embracing automation, AI, and big data analytics, organizations can better prevent threats, find, and detect what is missed, provide contextual linking for forensic and threat hunting ¬– and even more importantly – self-heal and fully recover when necessary.

Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, we’ll discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations

The Anatomy of the SolarWinds Attack

  Presented by CyberArk

In early December 2020, a supply chain attack was discovered which “trojanized” SolarWinds Orion business software updates in order to distribute malware. The campaign successfully infected 18,000 organizations – including several government agencies and high-value companies around the world.

Attacks of this magnitude and sophistication have a vast and rippling impact. Whether you have been directly affected or not – we are witnessing a new level of attack sophistication that demands a closer understanding.

In this session we’ll cover:

  • The rise of the digital supply chain attack
  • An attacker’s perspective on Orion
  • An end-to-end review of the attack flow
  • How the attackers managed to trojanize SolarWinds code
  • What the attackers did during months of seeming inactivity
  • A review of the Golden SAML technique
  • The big picture – what ‘Solorigate’ means for attackers and defenders

The Case for Automation: Why Every Business Needs It

  Presented by Aruba Networks

As networks evolved from delivering basic connectivity (wired and wireless) to more sophisticated needs, enterprise security has moved from a strong, wall methodology to untrusted connections for every user. Join us to learn how network automation can reduce the burden on IT staff to keep up with the latest networking requirements while safely connecting workers, customers, and citizens to critical services.

Disasters Happen. Cloud Will Help You Recover.

  Presented by iland

Malicious ransomware attacks. Unplanned outages. Devastating natural disasters. It’s obvious why Disaster Recovery (DR) is no longer a luxury for your organization. It’s a necessity! It could also be the one thing keeping your business up and running no matter what. What do you need to become truly IT resilient? In this presentation, you will:

  • Learn how organizations are successfully using cloud-based DR
  • Hear why cloud changes the cost model to make DR finally reachable
  • See how the iland Secure Cloud Console can automate, orchestrate, and test with successful, repeatable results
  • Understand why full visibility, management, reporting, and documentation make the transition to cloud resources seamless
    • Join Gartner DR Magic Quadrant Leader iland and Veeam, with trusted IT guidance from Structured, to learn how we can help you create the right disaster recovery solution.

The Importance of a Risk-Aware Culture

  Presented by Code42

As companies double down on time to innovation, time to market, time to revenue, they are inherently introducing more risk from the inside. The more cloud-based, collaborative, and fast an organization becomes, the greater the Insider Risks posed to its people, technology, and data. The upside is that cloud collaboration tools make employees more productive. The downside is that these same tools make it easier to exfiltrate data. Add the complexities of working from home and off the corporate network; more employees are routinely using unauthorized devices, tools, and cloud-based applications to share files and ideas with colleagues.

Join us to discuss the growing insider risk problem and how the right data protection methods can set security teams up for success, without slowing down company productivity.

CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

Meaningful Insights from Unstructured Data & Why One Financial Model Doesn’t Work

  Presented by Hitachi Vantara and Converge Technology Solutions

Join us for this double presentation on Unstructured Data and why one financial model does not work.

Unstructured Data has become the future of business operations. Learn how to leverage your data and generate meaningful insights that will help you grow and expand.

We are complex organizations; therefore, one financial model does not work. Businesses of all sizes are only becoming more complex and diversified. Examine this current situation and why it is important to leverage multiple financial models to achieve success.

First Line of Defense in Assessing your Organizations Cybersecurity Risks

  Presented by Fortinet

Assessing the resilience of your network can dramatically improve your ability to fend off prospective breaches. New applications and services introduce new avenues of attack. Without knowing the potential weaknesses within your network, you cannot successfully defend it.

Join us to hear about:

  • how assessments give you the visibility you need to make more informed, data-driven decisions
  • how you can prioritize strategic initiatives and obtain budgeting more easily by running assessments
  • how certain verticals (education, healthcare, et al.) can benefit from understanding their specific threat landscapes and common industry-wide threats.

During this session we will also cover:

  • a firsthand demonstration on how data is collected and processed, and logs are analyzed from your network during an assessment
  • contents of a sample findings report and how recommendations can help prioritize your security strategy

Assessment offering:
Schedule an assessment, and you will receive a complimentary Fortinet branded Basecamp Rapids Wireless Speaker. Once the assessment has been completed, will receive a pair of FortiVans (limit 50). Note that SLED customers may not be eligible for giveaway items.