[1 CPE] 40 Years in 40 Minutes – A Journey Through Cyber

  Presented by Grant Asplund, Growth Technologies Evangelist • Check Point Software

A journey through cyber – from stand-alone Apple II computers using PFS or Ashton-Tate software to today’s ubiquitous, always-on, hyper-connected, cloud-first computing. This session is a fun compilation of short stories and excerpts spanning four decades in the cyber industry. Grant will discuss the transition from single systems to networking to the internet… and how cyber security has evolved from securing virtually nothing to virtually everything. Grant will also share his thoughts on the constantly evolving threat landscape including IoT, Cloud, and the still-reigning champion, Email. Finally, Grant will offer considerations for improving your overall security posture today as well as future trends… you’ll even have a chance to win some cash.

[1 CPE] Protecting Your Data from Ransomware Where it Lives: Your Last Line of Defense

  Presented by Nik Lainus, Sr Solution Consultant • Hitachi Vantara

If an attack happens and makes it all the way to your data, then they have already broken through all your walls. Where your data lives IS your last line of defense, which is why the Armed Forces that protect the USA trust Hitachi to protect them. Prevention is great but without that last line of defense, you’re a sitting duck. Attend this session to learn how Hitachi serves as your last line of defense against ransomware attacks.

[1 CPE] Why is Critical Data Being Compromised?

  Presented by Benjamin Longuechaud, Sr Sales Engineer, Thales Cloud Security  • Thales Group

Securing critical data and information was where this industry started a long time ago, but it became more challenging with the rapid growth of enterprise data in an interconnected world. The pandemic forced organizations to support a remote workforce and expose critical systems that were once only accessible from inside the company’s network. We’ve increased the attack surface and the number of vulnerabilities which has led to more data breaches. With the technology advancements in access management, data discovery and encryption we can once again shift the focus to securing our data and information. In this presentation, we will discuss a unified data-centric security approach and strategy to protecting your most critical data and information.

Benjamin Longuechaud is a Senior Sales Engineer for Thales Cloud Security, the world-wide leader in data security, hardware and software encryption. Benjamin started his career as a Software Engineer developing Cloud-based applications before training and supporting software development teams. He recently joined Thales to focus on creating security strategies to Discover, Protect and Control data wherever it resides.

[1 CPE] How AI Can Think Like an Attacker

  Presented by Darktrace

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

[1 CPE] Cybersecurity Threats & Best Practices for Information & Operational Technology

  Presented by Leslie Kainoa and Theresa Masse • CISA

The Cybersecurity and Infrastructure Security Agency (CISA) leads the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure. We connect our stakeholders in industry and government to each other and to resources, analyses, and tools to help them build their own cyber, communications, and physical security and resilience, in turn helping to ensure a secure and resilient infrastructure for the American people.

This presentation will feature two local Oregon CISA leaders, Cybersecurity Advisor Leslie Kainoa and Cybersecurity State Coordinator Theresa Masse. It will focus on general cyber threats and, more specifically, on operation technology cybersecurity best practices and current threats. It also will outline cyber services CISA provides at no charge.

[1 CPE] How You Communicate Risk Might Just Be Your Biggest Risk of All

  Presented by Meghan Maneval, Director of Technical Product Management • Reciprocity

It’s no secret that recent years have seen an uptick in malware attacks, data exfiltration, and vulnerability exploitation. And likely your Executive Leaders and the Board want to know, “Are we doing enough to protect ourselves?” As professionals, we need to be prepared to respond to difficult questions. But all too often, we see risk through the lens of “how” we are protecting our organization instead of “how well” it is protected. Seeing risk through different lenses can skew how risk is communicated resulting in a false sense of security and heightened risk for your organization.

Join this session to learn about the three types of “glasses” CISOs and Information Security professionals often wear: Rose Colored Glasses, Blinders, and Magnifying Glasses. Learn about the “right” glasses that can help you proactively monitor and communicate risk in a context your organization will understand. Wearing these glasses enables organizational leadership to prioritize investments and agree on a level of protection to enable company success and mitigate your biggest risk of them all.

[1 CPE] Open Source Developers Are Security’s New Front Line

  Presented by Neel Thakkar, Sales Engineer • Sonatype

Bad actors have recognized the power of open source and are now beginning to create their own attack opportunities. This new form of assault allows hackers to poison the well, where OSS project credentials are compromised, and malicious code is intentionally injected into open source libraries. In this session, Sonatype will explain how both security and developers must work together to stop this trend or risk losing the entire open source ecosystem.

  • Analyze and detail the events leading to today’s “all-out” attack on the OSS industry.
  • Define the future of open source in today’s new normal.
  • Outline how developers can step into the role of security to protect themselves and the millions of people depending on them.

[1 CPE] Security and Resiliency for Your Most Critical Data

  Presented by Ratko Puzic, Senior Channel Systems Engineer • Cohesity

Join this session for a walk-through of a real-world ransomware attack and the necessary steps to recover. We will cover a cyber insurance form to show how it aligns with our “Protect, Detect, Recover” point of view, and we will speak to the specific capabilities associated with each point.

[1 CPE] Improved Security for SecOps & NetOps that’s Recession Friendly

  Presented by Ryan Parr, Sr Solutions Architect • Infoblox

While the future economic impact on IT budgets is unclear, one thing is clear –– attackers will not slow down and may even ramp up knowing organizations are considering lowering IT and cybersecurity spending. It is clear enterprise security is of extreme importance and making investments stretch is going to become essential. Core network services you already have in place, including DNS, DHCP, and IPAM (IP Address Management) are often overlooked in the cybersecurity world but can become the most powerful weapon against attackers. During this session, you will learn how to leverage existing services to:

  • Reduce the burden on existing security investments, extending their capacity and lifespan
  • Combat up to 92% of malware and ransomware without new security tools
  • Decrease SecOps investigation time by up to 60%
  • Improve your security posture, lowering cyber insurance costs

[1 CPE] 4G / 5G Network Security

  Presented by Cradlepoint

Protecting organizational infrastructure, networks, and hardware devices is a never-ending pursuit these days. There is a secure network solution that offers a simple-to-manage alternative to complex VPN infrastructures for securely connecting sites, vehicles, IoT, and remote workers. This session will cover how to secure remote sites with ease, reduce attack surfaces by building undiscoverable network resources, and provide any-to-any connectivity. Learn how to unlock operational agility through built-in tunnel orchestration and simplified configuration. It’s all about end-to-end WAN and network security services that tightly integrate with routing and security devices to establish encrypted connections to access applications and resources in the cloud or data center.