June 28 @ 8:00 am - 5:00 pm
The Portland Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Why attackers love email and what you can do about it
Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Cyber Exposure – The Next Frontier
The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join us for a discussion on how companies can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.
Principal Application Architect
Cloud Security Planning
The general feeling that the Cloud is not secure is fading, however it is still easy enough to find news on the latest Cloud security breach. Understanding how the Cloud affects your perimeter is only the first step in a solid Cloud security plan. This session will offer a quick walkthrough of the considerations needed when developing a comprehensive Cloud security roadmap and discuss a few of the tools available to help.
Scott Morley is a Principle Application Architect at OneNeck IT Solutions, he responsible for providing guidance and advisory services surrounding Dynamics AX and Azure in the areas of architecture, performance engineering, application integration and leveraging the hybrid cloud. Scott has over 20 years of IT and business experience in software development, security and enterprise application implementation. Scott has an extensive technical background in the Microsoft Stack and exceptional knowledge of MES systems. Prior to joining OneNeck, Scott was a technical manager on multiple ERP implementations and developed and managed an AX infrastructure team.