Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization’s boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization’s core business strategy.

Mitigating Cybercrime Through Automated Response and Integration

  Presented by Fortinet

Come join our talk on mitigating cybercrime and learn about best practices to help your company maintain a strong security posture through the digital transformation and beyond. The bad guys are using automated tactics to try to find a foothold in your network. Isn’t it time to leverage an integrated security approach to automate your response?

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

How to Be a Worthy Opponent at a Table of Cyber Criminals

  Moderated by INTERFACE Advisory Council

In today’s world, end users are not the only people interested in your technology. Organizations are constantly under attack and information is often the target. What kinds of attacks happen? How do you stay ahead of the curve when the attacks are constantly evolving? What resources are available to you? Join the Advisory Council in a panel discussion on cybercrimes and what you can do about them.

Moderated by:

  • Amy McLaughlin • Director of Information Services at OSU

Panelists:

  • Lisa Vasa • CISO for the Oregon Secretary of State
  • Matthew Wilson • VP Risk & Administration at Oregon Community Credit Union
  • Richard Rader • CTO at Seven Feathers Casino & Resort

How Not to do Security!

  Presented by Check Point Software

Whether you are a bank, government, retail or in manufacturing, security impacts us all. Despite the differences in vertical sector, education has the same technology needs as these organizations. The ironic thing is that having more Information Security funding alone does not help these organizations keep their networks secure and their data from being ex-filtrated. Our nation’s top industries continue to be targeted for attacks with numerous breaches disclosed throughout the year.

In each case of these recent breaches, the organizations had the tools, technology and information security resources to detect, prevent and respond to such attacks. None the less, cyber-attacks on our nations corporate, government, critical infrastructure is on the rise. Securing the network, perimeter and data center is the same as in other industries. Come learn best practices that Check Point has learned from helping secure our customers networks for two decades and how to best apply them in today’s networks.

Mitigating Cybercrime Through Automated Response and Integration

  Presented by Fortinet

Come join our talk on mitigating cybercrime and learn about best practices to help your company maintain a strong security posture through the digital transformation and beyond. The bad guys are using automated tactics to try to find a foothold in your network. Isn’t it time to leverage an integrated security approach to automate your response?

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization’s boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization’s core business strategy.

Active Directory Security: Early Stage Attack Activities to Watch For

  Presented by STEALTHbits Technologies

Attackers have demonstrated a consistent and ongoing ability to obtain access to workstations inside the network boundary through phishing and other web and email attacks. From here, attackers set their sights on gaining control of Active Directory as a means to an end; compromising Active Directory is an easy way to gain access to all critical corporate data and resources. Darin will discuss two early stage attack activities: LDAP reconnaissance and Password Spraying – that allow attackers to move laterally inside your AD environment. Detection strategies and mitigation steps will also be explained.