Loading Events

« All Events

  • This event has passed.

Portland

January 12 @ 8:15 am - 2:30 pm

Event Navigation

Details

Date:
January 12
Time:
8:15 am - 2:30 pm

Overview

The Portland Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Greg Genta
Sales Engineering

Network Access Control (NAC) 501 – Transforming Network Security through Visibility, Control & Response

Mobile devices, cloud technology,IoT and virtual work alternatives have changed how organizations operate. With over 21 billion new devices accessing networks by 2020 according to Gartner, how can organizations prepare today for the increase in devices without undermining the security posture?

A strong perimeter defense is no longer sufficient to prevent cyber threats.  Organizations need to address the entire security lifecycle to adequately protect digital assets and intellectual property, even as network access grows.  This presentation will address the evolving security threat landscape, cover the three critical aspects of network security – visibility, control and automated response to augment existing security controls, and provide tips and best practices to shrink your attack surface and secure your network now and for the future.

9:15am - 9:45amSession Two

Daniel Budiansky

Unifying Data Protection:  Leveraging the Power of the Cloud

Download the Presentation

Speaker Bio:

After spending the first half of his career in IT, Daniel joined Data Domain in 2006, and has made data protection a core technical focus of his career ever since. Observing firsthand the transformative impact of the cloud, he joined Druva in 2016, and comes to us more excited then ever to bring Druva’s unified data protection solutions to our customers around the world. When away from work, he enjoys traveling with his wife, Mercy, and daughters: Havah (11) & Calliope (7), spending time with friends, and finding adventure in the great outdoors.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Peter McNaull
Sales Engineer

Threats Have Evolved – Has Your Security Program?

Abstract: To kill threats quickly, you need to accelerate time to detection and time to response. This requires efficiency of operations and a well-enabled team.  Join LogRhythm Sales Engineer, Peter McNaull, as we discuss how a security strategy that is focused on detection is required in today’s threat environment. Peter will demonstrate how to use your own security intelligence to efficiently reduce your mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR).

10:45am - 11:30amSession Four

Jose Fernandez
Security Account Manager

Enabling Network Access Visibility without Compromise

Download the Presentation

Speaker Bio:

20 years of experience in network, and application security

11:30am - 12:00pmBreak / Vendor Booth Time / Lunch
12:00pm - 12:30pmSession Five

Jordan Gackowski
Systems Engineer

How to Block Cyber-Threats at the DNS Layer, Before, During, After an Attack, with Cisco Umbrella + Cisco’s Advanced Malware Protection  

With cyber attacks growing at a rapid pace, organizations of all sizes must adopt a layered security strategy, to provide maximum threat protection. In this informative session, you will learn from Cisco’s Jordan Gackowski about defense-in-depth strategies, and the “multiplier” benefit of combining OpenDNS Umbrella with Advanced Malware Protection (AMP) and cloud-based security services, delivered at the DNS layer.

OpenDNS Umbrella delivers security at the DNS layer, creating a first layer of defense in your security stack. Umbrella uses the Internet’s existing infrastructure to keep malware from compromising your systems and to stop botnets or phishing from exfiltrating your data. In seconds, this cloud platform displays your global activity from all locations. Instantly, you can identify targeted attacks by comparing your activity—over any port, protocol, or app to the rest of the world.

Cisco AMP provides global threat intelligence, advanced sandboxing, and real-time malware blocking to prevent breaches. But because you can’t rely on prevention alone, AMP continuously analyzes file activity across your extended network, so you can quickly detect, contain, and remove advanced malware.

The combination of the two products gives organizations a highly robust solution to detect and block malicious domains and files, for maximum threat protection.

Download the Presentation

12:30pm - 12:45pmBreak / Vendor Booth Time
12:45pm - 1:15pmSession Six

Jeff Francis
Regional Systems Engineer

Stop Cyber Threats With Adaptive Micro-Segmentation

Download the Presentation

Speakers Bio:

Jeff has 25+ years of experience in the IT field, with professional experience in software development, devops, Linux systems administration, device drivers, embedded systems design, network architecture, and network and computer security. He has worked most of the last fifteen years as a Security Engineer for various large security vendors. Jeff joined Illumio in 2015 as a Regional Systems Engineer, and covers the Northwestern United States.

1:15pm - 1:45pmSession Seven

Gregory Bennett
Channel Sales Engineer,  Pacific Northwest

Stopping Ransomware at the Door (and every other Threat)

While old school anti-virus protection focuses on examining files to detect malware, cyber criminals have persisted and can now polymorph malware so that no signature-based detection method has a chance.  By leveraging zero-day vulnerabilities and exploiting insecure programing, hackers can easily bypass even the most advanced file analysis detection products. Come learn how it’s happening and what you can do to protect yourself.

1:45pm - 2:00pmBreak / Vendor Booth Time
2:00pm - 2:30pmSession Eight

Nick Schilbe
Sr. Director, Security Solutions

Chris Bates
Principal Solution Engineer

SentinelOne: Next Generation Endpoint Protection 

In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.

2:30pm - 2:45pmBreak / Vendor Booth Time
Prize Drawings for All in Attendnace
2:45pm - 3:15pmSession Nine

structured-logo-updated-25-year-slogan

Mark Hickman 
Director of Professional Services, Storage and Systems

Zerto’s Seamless Recovery — Even From Cryptolocker

Ransomware is now one of the biggest threats to your data. Nobody wants to be in a position of being locked out of all of your data and facing the prospect of having to pay a ransom or accept the impact of data loss and downtime by restoring from backups.

In this session you will learn how to configure your environment with Zerto to ensure you can recover the data from seconds before it was encrypted, minimizing the impact to the business by re-winding to a point in time before the ransomware infection existed. Zerto Virtual Replication (ZVR) integrates at the hypervisor level and causes no performance impact to the protected virtual machines. ZVR replicates without snapshots or agents, allowing for better performance and flexibility DR strategy in your vSphere environment. The virtual awareness understands the needs of resilience capabilities such as HA/DRS/VMotion/Storage VMotion/Storage DRS, etc. and continues replicating consistent data across the application virtual machine groupings.

Highlights include:
• Securing & protecting your infrastructure
• Journaling to enable re-wind & recover
• Failover testing to isolated environments
• Recovering from the infection
• Best practices when recovering from ransomware
• Real-world customer story of using Zerto to recover from Cryptolocker

Prize Drawings for All in Attendance

 

Sponsors