[1 CPE] Cybersecurity Threats & Best Practices for Information & Operational Technology

  Presented by Leslie Kainoa and Theresa Masse • CISA

The Cybersecurity and Infrastructure Security Agency (CISA) leads the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure. We connect our stakeholders in industry and government to each other and to resources, analyses, and tools to help them build their own cyber, communications, and physical security and resilience, in turn helping to ensure a secure and resilient infrastructure for the American people.

This presentation will feature two local Oregon CISA leaders, Cybersecurity Advisor Leslie Kainoa and Cybersecurity State Coordinator Theresa Masse. It will focus on general cyber threats and, more specifically, on operation technology cybersecurity best practices and current threats. It also will outline cyber services CISA provides at no charge.

[1 CPE] Modern Segmentation Architectures

  Presented by Tyler Conrad and Jeremy Georges • Arista Networks

In this presentation, we will explore the different network segmentation models available, including VLANs, VRFs, and group-based segmentation models.

We will begin with an overview of the different segmentation models and discuss their benefits and drawbacks. VLANs provide a simple way to segment traffic but do not scale well in larger environments. VRFs offer more robust isolation but can be complex to manage. Group-based segmentation models offer a flexible and scalable way to segment traffic based on the endpoint itself rather than the network. We will discuss the implementation and configuration of each of these models and provide examples of how they can be used in different scenarios.

Next, we will discuss how EVPN with either VXLAN or MPLS transport can be used as an attachment point to allow for segmentation to cross the network device boundary and become a network-wide policy.

Finally, we will compare the different models to help you choose the best segmentation approach for your network, as well as how to layer these together to have a more complete design. By the end of this presentation, you will have a better understanding of modern segmentation architectures and be equipped to make informed decisions for your network.

[1 CPE] Technology Drives Our Clean Energy Future

  Presented by Dave Worth • Divisional CIO, Portland General Electric

The challenges facing the electrical grid are well known, and well publicized. How will energy be produced? How will it be distributed? How do customers realize the value of their renewable investments? How do we keep it equitable? These are significant challenges, but PGE engineers, technicians, and technologists have converted many challenges into opportunities in our 134-year history, and we feel no different about these. The first step is to orchestrate the activities of each participant and improve the ability to operate our grid using automation. Simultaneously, we are called on to implement, maintain and replace a large amount of infrastructure to support the transition to electricity as an energy source efficiently. The virtuous cycle is a grid that is easier to maintain, more reliable, safer, and equitable to all stakeholders and is being driven through close IT/OT collaboration and cross-functional implementation.

Dave Worth is the Divisional CIO for Advanced Energy Delivery and Utility Operations at Portland General Electric. He leads the technology effort to modernize PGE’s capabilities, in service of its mission to drive Oregon’s energy transformation. Dave’s team focuses on outcomes for customers by delivering, maintaining, and modernizing technology associated with asset & work management, mobile, grid operations, emergency operations, and bulk management systems within PGE’s utility operations. Prior to this role, Dave was the Director of PGE’s Customer Engagement Transformation, which modernized PGE’s billing and metering systems, and is the largest IT project executed by PGE to date. Beyond software delivery and support, Dave’s management and technical expertise include customer service operations, marketing and sales, business development, and telecommunications. Dave lives with his family in Portland, Oregon where he enjoys gardening, playing guitar, and experiencing the outdoors by hiking and camping. Dave has been with PGE for 22 years, and in the IT industry for twenty-five. He graduated Magna Cum Laude from Linfield College with a BS in Business Information Systems (a mixed computer science/finance program).

[1 CPE] 4G / 5G Network Security

  Presented by Cradlepoint

Protecting organizational infrastructure, networks, and hardware devices is a never-ending pursuit these days. There is a secure network solution that offers a simple-to-manage alternative to complex VPN infrastructures for securely connecting sites, vehicles, IoT, and remote workers. This session will cover how to secure remote sites with ease, reduce attack surfaces by building undiscoverable network resources, and provide any-to-any connectivity. Learn how to unlock operational agility through built-in tunnel orchestration and simplified configuration. It’s all about end-to-end WAN and network security services that tightly integrate with routing and security devices to establish encrypted connections to access applications and resources in the cloud or data center.

[1 CPE] Why Smart Cities Are Safer Cities Thanks to Real-Time Data and AI

  Presented by iT1 Source & Wireless Guardian

Intelligent technology helps public safety organizations gain a holistic understanding of their cities, deepen public confidence and strengthen community connections. This session will explain the relationship the using Real-Time Data and Artificial Intelligence to create safer, more resilient communities. As part of the discussion, the presenter will explain the following:

  • Data and AI are helpful in real-time response
  • Data and AI are also reshaping long-term public safety processes
  • How smart safety technologies aid in environmental monitoring, emergency management and other situations
  • How smart technology pulls in signals from an array of sources across cities

The presenter will also stress public safety isn’t a top-down hierarchy. It’s actually a collective effort that prioritizes the needs of the community and depends on strong relationships. By realizing the future of public safety, smart city technology transforms the ability to serve local communities.

[1 CPE] Who’s Attacking You?

  Presented by Critical Insight

One of the most common questions from IT Leaders and Executives is: Who would attack our organization and why?

In this discussion, we’ll examine the most common cyberattack perpetrators and their methods. From hostile Nation-States to teenagers to some threat actors you might not expect. We will discuss the methods these attackers are using to gain access to your networks, be it unpatched systems, newly found zero days, as well as other avenues into your network. Also covered will be the intent of these attacks, whether it is to steal your intellectual property, extort your cryptocurrency, or to disrupt your operation to meet strategic goals. Most importantly, we will discuss how to tell the difference, and how to protect yourself.

[1 CPE] Securing a Distributed Network with ZTNA, SASE, & a Cybersecurity Mesh Platform

  Presented by Fortinet

Securing connected resources and the different pieces of a distributed network can be challenging. Join this session to explore the advantages of using SASE and a ZTNA architecture to provide secure, application-based access over the traditional VPN access most enterprises use today. We’ll also examine how employing Gartner’s Cybersecurity Mesh Architecture can simplify Network and Security operations.

[1 CPE] The Future of Observability

  Presented by Cribl

Digital transformations, cloud migrations, and persistent security threats turned observability from a niche concern to an essential capability in today’s organizations. We’re still in the early days of observability maturity, but early stumbles point to where observability must go in the future. This talk discusses where observability is today and the three critical areas necessary for observability to deliver on its promises throughout the enterprise.

[1 CPE] Scaling Network Infrastructure: From the Remote Employee to The Corporate Office

  Presented by Pine Cove Consulting

In the world we live in, employees are now working from home. However, that does not mean they do not need adequate network infrastructure, so their workday runs smoothly. During this presentation, we will talk about how to implement network devices like servers, on a very small scale like a home office, and how networking technology changes when scaling up to fit a larger space and more employees, like the corporate office.

[1 CPE] Securing Layer 8

  Presented by Synack

One of the most difficult challenges globally is securing the human element and as such, it tends to be neglected. The current solution of training with “gotcha” emails is not successful and tends to cause unintended negative consequences. We will investigate a more global approach to securing businesses by taking on the “business of hacking.” We’ll show how we can harden the human element and expand our footprint by using a better way to learn and widening our defenses. The key is to ensure we also harden society to help drive the ROI for attackers up enough that business is no longer profitable, forcing them into the technology fight in which, as an industry, security professionals have much more secure footing.