- This event has passed.
January 12, 2017 @ 8:15 am - 2:30 pm
The Portland Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Network Access Control (NAC) 501 – Transforming Network Security through Visibility, Control & Response
Mobile devices, cloud technology,IoT and virtual work alternatives have changed how organizations operate. With over 21 billion new devices accessing networks by 2020 according to Gartner, how can organizations prepare today for the increase in devices without undermining the security posture?
A strong perimeter defense is no longer sufficient to prevent cyber threats. Organizations need to address the entire security lifecycle to adequately protect digital assets and intellectual property, even as network access grows. This presentation will address the evolving security threat landscape, cover the three critical aspects of network security – visibility, control and automated response to augment existing security controls, and provide tips and best practices to shrink your attack surface and secure your network now and for the future.
Unifying Data Protection: Leveraging the Power of the Cloud
After spending the first half of his career in IT, Daniel joined Data Domain in 2006, and has made data protection a core technical focus of his career ever since. Observing firsthand the transformative impact of the cloud, he joined Druva in 2016, and comes to us more excited then ever to bring Druva’s unified data protection solutions to our customers around the world. When away from work, he enjoys traveling with his wife, Mercy, and daughters: Havah (11) & Calliope (7), spending time with friends, and finding adventure in the great outdoors.
Threats Have Evolved – Has Your Security Program?
Abstract: To kill threats quickly, you need to accelerate time to detection and time to response. This requires efficiency of operations and a well-enabled team. Join LogRhythm Sales Engineer, Peter McNaull, as we discuss how a security strategy that is focused on detection is required in today’s threat environment. Peter will demonstrate how to use your own security intelligence to efficiently reduce your mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR).
Security Account Manager
Enabling Network Access Visibility without Compromise
20 years of experience in network, and application security
How to Block Cyber-Threats at the DNS Layer, Before, During, After an Attack, with Cisco Umbrella + Cisco’s Advanced Malware Protection
With cyber attacks growing at a rapid pace, organizations of all sizes must adopt a layered security strategy, to provide maximum threat protection. In this informative session, you will learn from Cisco’s Jordan Gackowski about defense-in-depth strategies, and the “multiplier” benefit of combining OpenDNS Umbrella with Advanced Malware Protection (AMP) and cloud-based security services, delivered at the DNS layer.
OpenDNS Umbrella delivers security at the DNS layer, creating a first layer of defense in your security stack. Umbrella uses the Internet’s existing infrastructure to keep malware from compromising your systems and to stop botnets or phishing from exfiltrating your data. In seconds, this cloud platform displays your global activity from all locations. Instantly, you can identify targeted attacks by comparing your activity—over any port, protocol, or app to the rest of the world.
Cisco AMP provides global threat intelligence, advanced sandboxing, and real-time malware blocking to prevent breaches. But because you can’t rely on prevention alone, AMP continuously analyzes file activity across your extended network, so you can quickly detect, contain, and remove advanced malware.
The combination of the two products gives organizations a highly robust solution to detect and block malicious domains and files, for maximum threat protection.
Regional Systems Engineer
Stop Cyber Threats With Adaptive Micro-Segmentation
Jeff has 25+ years of experience in the IT field, with professional experience in software development, devops, Linux systems administration, device drivers, embedded systems design, network architecture, and network and computer security. He has worked most of the last fifteen years as a Security Engineer for various large security vendors. Jeff joined Illumio in 2015 as a Regional Systems Engineer, and covers the Northwestern United States.
Channel Sales Engineer, Pacific Northwest
Stopping Ransomware at the Door (and every other Threat)
While old school anti-virus protection focuses on examining files to detect malware, cyber criminals have persisted and can now polymorph malware so that no signature-based detection method has a chance. By leveraging zero-day vulnerabilities and exploiting insecure programing, hackers can easily bypass even the most advanced file analysis detection products. Come learn how it’s happening and what you can do to protect yourself.
Sr. Director, Security Solutions
Principal Solution Engineer
SentinelOne: Next Generation Endpoint Protection
In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.
Zerto’s Seamless Recovery — Even From Cryptolocker
Ransomware is now one of the biggest threats to your data. Nobody wants to be in a position of being locked out of all of your data and facing the prospect of having to pay a ransom or accept the impact of data loss and downtime by restoring from backups.
In this session you will learn how to configure your environment with Zerto to ensure you can recover the data from seconds before it was encrypted, minimizing the impact to the business by re-winding to a point in time before the ransomware infection existed. Zerto Virtual Replication (ZVR) integrates at the hypervisor level and causes no performance impact to the protected virtual machines. ZVR replicates without snapshots or agents, allowing for better performance and flexibility DR strategy in your vSphere environment. The virtual awareness understands the needs of resilience capabilities such as HA/DRS/VMotion/Storage VMotion/Storage DRS, etc. and continues replicating consistent data across the application virtual machine groupings.
• Securing & protecting your infrastructure
• Journaling to enable re-wind & recover
• Failover testing to isolated environments
• Recovering from the infection
• Best practices when recovering from ransomware
• Real-world customer story of using Zerto to recover from Cryptolocker