Completing Security Visibility with NDR

  Presented by Gigamon

As SOCs have matured, they have employed a number of solutions to combat cybersecurity threats. Traditionally, SOCs have relied on SIEM and EDR tools for their detection and investigation needs. While these tools are critical to security operations, they have their visibility limitations. As such, modern security teams have turned to the network for added detection visibility. Network Detection and Response (NDR) solutions provide the necessary visibility not available in SIEM or EDR solutions and help SOCs complete their security architecture.

In this session, we discuss traditional security architectures and how they are being optimized using NDR into a modern security architecture.

Unified Endpoint Management

  Presented by Quest Software

This presentation highlights the reasons and need for Unified Endpoint Management in your business strategy. This presentation’s sole purpose is to educate C-level and system administrators of the need for UEM as well as what aspects are important. One of the problems with endpoint management today is the proliferation of endpoints. During this global health crisis especially, we are seeing a large work-from-home movement in businesses all over the world. In order to combat this issue, you must have an endpoint management strategy that works not only on the network but off of it as well.

Health and Safety Innovations Lay a Smart Digital Foundation

  Presented by Hitachi Vantara and Converge Technology Solutions

The pandemic has accelerated innovation to protect health and safety, while laying a foundation for broader digital transformation across industries. Learn how automated detection of PPE, social distancing, collision avoidance, thermal scanning, and compliance analytics are helping companies reduce risk while protecting their workers and customers, and how this shift is preparing them to thrive in our digital future.

Security vs. Compliance: Turning InfoSec Success into Audit Wins

  Presented by Tripwire

Security and compliance teams both strive to design, establish, and enforce controls to protect an organization. But even with shared goals in place, security and compliance teams often manage business risk in relative isolation. So how can these teams set aside tension and work better together to create a winning alliance?

In this session, we explore the key differences between security and compliance initiatives. It’s crucial to understand that being fully compliant doesn’t necessarily mean an organization is fundamentally secure. We’ll cover how the two initiatives complement each other when it comes to minimizing risk and how both teams can collaborate to create efficiencies. Attendees will learn how to leverage compliance policies to set the foundation to a robust information security program, while providing true visibility and coverage, consolidating toolsets, and reducing costs. Lastly, we’ll discuss how to ensure that a successful security program can help organizations prepare for an upcoming audit to ultimately achieve and maintain continuous compliance.

Don’t Adopt the Monkey: Leadership Secrets for You, Your Team, and Your Projects

  Presented by Saby Waraich • Chief Information Officer, Clackamas Community College

How do you develop an ability to lead from any position in an organization? How can you be more adept in influencing those over whom you have little or no authority? What are the key skills that are needed for a successful leader? Knowing how to influence and lead others, often without direct authority, is critical in successfully managing projects. Most of us aren’t natural leaders. The good news is that leadership skills can be learned. The best makes the journey from manager to leader using their innate talents and through continuous learning and improvement. Don’t rely on the school of hard knocks. Discover the secrets to exceptional leadership and the mistakes to avoid on your own road to success.

Energetic … engaging … lively … enthusiastic … inspiring … words that are often used to describe Saby. A speaker with the uncanny ability to look at the normal and see something quite different, Saby shares his life stories and has a fun way to look at life as well as live life. You are guaranteed to learn a thing or two on your journey from his unique perspective. He is a Technology Leader, Angel Investor, Professor, Mentor, Coach, Project & Program Management Expert, Change Leader and Volunteer Leader with a diverse experience of over 20 years in both public and private sector.

An internationally recognized speaker, trainer and coach, Saby has led multiple diverse clients in their business transformation through project successes, bolstering communications across various departments, and assisted customers in creating effective solutions to complex problems. Saby is currently working as CIO at Clackamas Community College. He speaks four languages, enjoys working with people and brings enthusiasm, inspiration & leadership qualities.

Cybersecurity Beyond the SIEM

  Presented by Secureworks

For forward-looking organizations, SIEM technology promised to identify security blind spots, reduce noise and alert fatigue, and simplify the detection and response to complex attacks. How well has it lived up to the promise? What gaps have emerged as the pandemic accelerated our digital transformation and adoption of cloud services? In this session, we’ll explore these issues and identify new ways to think about cybersecurity, threat detection, telemetry, and the converging technology needed to meet the challenges of the current threat landscape.

The Rise of Secure Access Service Edge

  Presented by Bitglass

Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms are built for this exact moment.

In this presentation, you will learn:

  • The core components SASE
  • The functionality you need to secure cloud, web, and remote access use cases
  • Architectural considerations for SASE platforms

Which is More Complex, Quantum Entanglement or Cybersecurity?

  Presented by INTERFACE Advisory Council

Cybersecurity is hard. Worldwide, billions of dollars are spent each year on cyber prevention and detection, and still, the bad actors breach even the best secured system—and no, I’m not talking about FireEye and SolarWinds in 2020.

Quantum Entanglement is hard to understand, explain, and until recently, hard to prove. Billions of development dollars are spent each year to create reliable and vastly powerful computing platforms—that very soon will change the landscape of encryption as it has been known.

Which is more complex, why does it matter, and how are they related? With wit, humor, and storytelling, Christopher Paidhrin, the CISO for City of Portland and past president of ISSA Portland, will provide you with one or more answers.


Presenter:

Christopher Paidhrin • Chief Information Security Officer, City of Portland

Situational Awareness Into the Dark Web

  Presented by Check Point Software

In our journey through this session, we take you through the evolution, goals, and motivation of the Dark Web. We will share with you what and whom you can find on the platforms as well as the major conflicts individuals face while exploring this web. The session also exposes you to the syndicates and structures running on the platforms. Surprisingly, we see how those groups were among the first to embrace and implement Blockchain technology and created a major global demand for crypto currencies. This is the time to listen, learn, and be exposed to the deepest secrets of the Dark Web.

2021 State of Malware

  Presented by Malwarebytes

Over the past year, the tools and tactics of cybercrime and cybersecurity adapted against a backdrop of enormous changes to our lives and businesses.

Join us to learn how cybercrime evolved in 2020 and identify ways to safeguard your organization against what’s out there.

We’ll explore:

  • Top threats for businesses and consumers
  • Emerging cybercrime trends and tactics
  • Solutions you can employ to thwart future attacks