Loading Events

« All Events

  • This event has passed.

Portland (Cybersecurity)

June 28 @ 8:00 am - 4:00 pm

Event Navigation

Details

Date:
June 28
Time:
8:00 am - 4:00 pm
Event Category:

Venue

Crowne Plaza Portland Downtown Convention Center
1441 NE 2nd Avenue
Portland, OR 97232
United States
  + Google Map
Phone:
(503) 233-2401
Website:
https://www.ihg.com/crowneplaza/hotels/us/en/portland/pdxne/hoteldetail

Overview

The Portland Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 9:00amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

9:00am - 9:30amSession One

Matt Smith
Sales Engineer

Combating Advanced Threats

Download the Presentation

9:30am - 10:00amSession Two

Wayne Tynes

Why attackers love email and what you can do about it

Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?

In this session, you’ll learn:

  • How your email can be used as an entry point for multiple types of attack
  • The damaging impact attacks have on organizations
  • Why your employees could be the weakest link in your email security
  • How to enhance your email security and thus your overall cyber resilience
10:00am - 10:30amBreak / Vendor Booth Time
10:30am -11:00amSession Three

Cyber Exposure – The Next Frontier

The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join us for a discussion on how companies can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.

11:00am - 11:30amSession Four

David D. Coleman
Senior Product Evangelist

An Overview of WLAN Security

As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.

So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:

  • The 5 tenets of WLAN security
  • Choosing the proper authentication and encryption model that doesn’t force user workarounds
  • Utilizing Private PSK technology
  • Device and user access control
  • Future challenges for Wi-Fi security and WPA3

Speaker’s Bio:

David D. Coleman is the Senior Product Evangelist for Aerohive Networks, www.aerohive.com. David collaborates with the Aerohive Product Training and travels the world for WLAN training sessions and speaking events. He has instructed IT professionals from around the globe in WLAN design, security, administration, and troubleshooting. David has written multiple books, blogs, and white papers about wireless networking, and he is considered an authority on 802.11 technology. Prior to working at Aerohive, he specialized in corporate and government Wi-Fi training and consulting. In the past, he has provided WLAN training for numerous private corporations, the US military, and other federal and state government agencies. When he is not traveling, David resides in both Atlanta, Georgia and Seattle, Washington.

David is CWNE #4 and is the co-author of the Certified Wireless Security Professional (CWSP) Study Guide.

11:30am - 12:00pmBreak / Vendor Booth Time / Lunch
12:00pm - 12:30pmSession Five

Gene Torres

Win Big with IT Resilience

In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.

12:30pm - 1:00pmBreak / Vendor Booth Time
1:00pm - 1:30pmSession Six

Scott Morley
Principal Application Architect

Cloud Security Planning

The general feeling that the Cloud is not secure is fading, however it is still easy enough to find news on the latest Cloud security breach. Understanding how the Cloud affects your perimeter is only the first step in a solid Cloud security plan. This session will offer a quick walkthrough of the considerations needed when developing a comprehensive Cloud security roadmap and discuss a few of the tools available to help.

Download the Presentation

Speaker’s Bio:

Scott Morley is a Principle Application Architect at OneNeck IT Solutions, he responsible for providing guidance and advisory services surrounding Dynamics AX and Azure in the areas of architecture, performance engineering, application integration and leveraging the hybrid cloud. Scott has over 20 years of IT and business experience in software development, security and enterprise application implementation. Scott has an extensive technical background in the Microsoft Stack and exceptional knowledge of MES systems. Prior to joining OneNeck, Scott was a technical manager on multiple ERP implementations and developed and managed an AX infrastructure team.

1:30pm - 2:15pmSession Seven

Romain Basset
Presales Engineer

A new approach to email security

Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.

Download the Presentation

2:15pm - 2:45pmBreak / Vendor Booth Time
2:45pm - 3:15pmSession Eight

Todd Murray
Senior Principal Systems Engineer

10 Tips for Effective Endpoint & Mobile Security

With the growing number, sophistication, and impact of cyber attacks such as WannaCry and Petya; defending traditional endpoints, modern devices, mobile and IT assets from emerging threats is critically important for enterprises.   Join this session to learn 10 Tips for Effective Endpoint & Mobile Security

Download the Presentation

3:15pm - 3:45pmSession Nine

Traditional Pen Testing is Dead

How Companies are Utilizing Crowdsourced Teams of Ethical Hackers for On-Demand & Continuous Penetration Testing

Hackers who help protect the most “attractive” targets, rather than exploit them?

What has led to the previously unimaginable adoption of crowdsourced security testing by the world’s most recognizable companies and government agencies in place of traditional pen testing?

We’ll discuss how organizations are embracing global teams of trusted ethical hackers to:

  • Proactively detect and report holes in critical applications and networks, before a criminal hacker gets there first
  • Gain a true understanding how areas of weakness and subsequent exploitation relate to overall business risk, and how remediation and testing schedules can be prioritized accordingly
  • Visualize how a true adversary views their attack surface
Prize Drawings for All in Attendance

Sponsors