- This event has passed.
June 28 @ 8:00 am - 4:00 pm
The Portland Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Combating Advanced Threats
Why attackers love email and what you can do about it
Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Cyber Exposure – The Next Frontier
The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join us for a discussion on how companies can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.
An Overview of WLAN Security
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.
So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:
- The 5 tenets of WLAN security
- Choosing the proper authentication and encryption model that doesn’t force user workarounds
- Utilizing Private PSK technology
- Device and user access control
- Future challenges for Wi-Fi security and WPA3
David D. Coleman is the Senior Product Evangelist for Aerohive Networks, www.aerohive.com. David collaborates with the Aerohive Product Training and travels the world for WLAN training sessions and speaking events. He has instructed IT professionals from around the globe in WLAN design, security, administration, and troubleshooting. David has written multiple books, blogs, and white papers about wireless networking, and he is considered an authority on 802.11 technology. Prior to working at Aerohive, he specialized in corporate and government Wi-Fi training and consulting. In the past, he has provided WLAN training for numerous private corporations, the US military, and other federal and state government agencies. When he is not traveling, David resides in both Atlanta, Georgia and Seattle, Washington.
David is CWNE #4 and is the co-author of the Certified Wireless Security Professional (CWSP) Study Guide.
Win Big with IT Resilience
In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.
Principal Application Architect
Cloud Security Planning
The general feeling that the Cloud is not secure is fading, however it is still easy enough to find news on the latest Cloud security breach. Understanding how the Cloud affects your perimeter is only the first step in a solid Cloud security plan. This session will offer a quick walkthrough of the considerations needed when developing a comprehensive Cloud security roadmap and discuss a few of the tools available to help.
Scott Morley is a Principle Application Architect at OneNeck IT Solutions, he responsible for providing guidance and advisory services surrounding Dynamics AX and Azure in the areas of architecture, performance engineering, application integration and leveraging the hybrid cloud. Scott has over 20 years of IT and business experience in software development, security and enterprise application implementation. Scott has an extensive technical background in the Microsoft Stack and exceptional knowledge of MES systems. Prior to joining OneNeck, Scott was a technical manager on multiple ERP implementations and developed and managed an AX infrastructure team.
A new approach to email security
Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.
Senior Principal Systems Engineer
10 Tips for Effective Endpoint & Mobile Security
With the growing number, sophistication, and impact of cyber attacks such as WannaCry and Petya; defending traditional endpoints, modern devices, mobile and IT assets from emerging threats is critically important for enterprises. Join this session to learn 10 Tips for Effective Endpoint & Mobile Security
Traditional Pen Testing is Dead
How Companies are Utilizing Crowdsourced Teams of Ethical Hackers for On-Demand & Continuous Penetration Testing
Hackers who help protect the most “attractive” targets, rather than exploit them?
What has led to the previously unimaginable adoption of crowdsourced security testing by the world’s most recognizable companies and government agencies in place of traditional pen testing?
We’ll discuss how organizations are embracing global teams of trusted ethical hackers to:
- Proactively detect and report holes in critical applications and networks, before a criminal hacker gets there first
- Gain a true understanding how areas of weakness and subsequent exploitation relate to overall business risk, and how remediation and testing schedules can be prioritized accordingly
- Visualize how a true adversary views their attack surface