Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization’s boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization’s core business strategy.

How Security Leaders Gain Trust in the Boardroom

  Presented by Kudelski Security

Security Leaders need a solid and comprehensive approach in communicating their cybersecurity programs. Kudelski Security surveyed CISOs, CSOs, and CIOs about communicating their cybersecurity program with their Board of Directors. The collective responses provide insight into what interests boards the most, suggested strategies and metrics that resonate when answering the board’s most challenging questions. A summary of the research will be provided to all participants in hardcopy booklet format.

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization’s boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization’s core business strategy.

Mitigating Cybercrime Through Automated Response and Integration

  Presented by Fortinet

Come join our talk on mitigating cybercrime and learn about best practices to help your company maintain a strong security posture through the digital transformation and beyond. The bad guys are using automated tactics to try to find a foothold in your network. Isn’t it time to leverage an integrated security approach to automate your response?

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

How to Be a Worthy Opponent at a Table of Cyber Criminals

  Moderated by INTERFACE Advisory Council

In today’s world, end users are not the only people interested in your technology. Organizations are constantly under attack and information is often the target. What kinds of attacks happen? How do you stay ahead of the curve when the attacks are constantly evolving? What resources are available to you? Join the Advisory Council in a panel discussion on cybercrimes and what you can do about them.

Moderated by:

  • Amy McLaughlin • Director of Information Services at OSU

Panelists:

  • Lisa Vasa • CISO for the Oregon Secretary of State
  • Matthew Wilson • VP Risk & Administration at Oregon Community Credit Union
  • Richard Rader • CTO at Seven Feathers Casino & Resort

How Not to do Security!

  Presented by Check Point Software

Whether you are a bank, government, retail or in manufacturing, security impacts us all. Despite the differences in vertical sector, education has the same technology needs as these organizations. The ironic thing is that having more Information Security funding alone does not help these organizations keep their networks secure and their data from being ex-filtrated. Our nation’s top industries continue to be targeted for attacks with numerous breaches disclosed throughout the year.

In each case of these recent breaches, the organizations had the tools, technology and information security resources to detect, prevent and respond to such attacks. None the less, cyber-attacks on our nations corporate, government, critical infrastructure is on the rise. Securing the network, perimeter and data center is the same as in other industries. Come learn best practices that Check Point has learned from helping secure our customers networks for two decades and how to best apply them in today’s networks.

Mitigating Cybercrime Through Automated Response and Integration

  Presented by Fortinet

Come join our talk on mitigating cybercrime and learn about best practices to help your company maintain a strong security posture through the digital transformation and beyond. The bad guys are using automated tactics to try to find a foothold in your network. Isn’t it time to leverage an integrated security approach to automate your response?

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.