As enterprises look at IT playing a broader role around digitalization using next generation workloads, including cloud-native applications and DevOps, they should consider how technologies such as software-defined infrastructure and cloud can drive real-world benefits. Learn how IT can move away from traditional environments to transformative data-center technologies and product innovations, including hyper-converged infrastructure and onward to Enterprise Clouds, to handle all their existing and emerging applications and business needs with clear agility, productivity and availability/security benefits.
Join your peers from the IT industry to discuss the ingredients of the new Enterprise Cloud infrastructure and a wide variety of other topics, including:
• Infrastructure to enable DevOps for a modern application life cycle
• Ability to innovate with flat IT budgets while continuing to align IT resource to business imperatives
• Building business cases and managing stakeholders for new initiatives
Special Agent Wells has been involved in solving countless crimes of all types- You don’t want to miss his presentation.
In a world where cybercrime has become commoditized, and both large corporations and small businesses find themselves frequently beset by malware, being able to thread security devices together to assemble an overall picture of what’s transpiring on your network will reduce your attack surface and response times while elevating your overall security posture.
The panel will provide various perspectives and share experiences in determining a backup strategy. Imagine you’re a new SYSADMIN for a company that has an insufficient or no backup plan. How do you unravel the right backup solution? Come listen as we discuss how to start the conversation. We will address how to mitigate risks to obtain project funding, outline steps in creating a plan, and select appropriate software and hardware.
Panel Moderated by: Chuck Fischer • Director of IT, Advantage Dental
David Eccles • Operating System Network Analyst, Oregon State University Student Health Services
Glenn Gillis • Manager, Information Technology-Environmental Law Alliance Worldwide
Thomas Winter • IT Manager, The Ford Family Foundation
Cyber Threats are only increasing. Attackers are shifting their tactics as we shift our security strategies. Join us for a discussion about the every changing threat landscape and how you can more effectively protect your company from these threats. In this session we will talk about how cyber threats increased in 2016, where attackers are shifting to, and what industry experts are recommending to address these shifts.
This presentation centers around a breach case study. Specifically, the presentation focuses in depth on the lead up to a significant breach, the immediate response, the public response, the regulatory response, ongoing follow up, and the aftermath.
Jeff earned his JD from Willamette University in 2004 and his CHC designation in 2016. He has over three years of experience as a state regulator and six in the Medicare, Medicaid, and Commercial lines of business on both the payor and payee side. Jeff has taught undergraduate Healthcare Law, Regulation, Compliance, and Ethics since 2010.
Join Ivoxy Consulting for a look at Disaster Recovery planning. We will discuss concepts and common terms used in DR discussions, the questions you need to ask to create a successful DR strategy, and then take a look at an overview of a DR design for a web facing application and the back off infrastructure and applications that support it.
Your organization is always running and therefore cannot afford downtime or lags during or after a disaster occurs. Backup solutions do not resolve this issue, as they are not true Disaster Recovery for the business.
It is imperative one recognizes what types of disasters will impact the business. Learn about Disaster Recovery scenarios and which questions to ask and answer when planning your Disaster Recovery solution and implementing true IT resilience. Learn which decisions impact the business in specific ways, and how to avoid making sacrifices for your always-on organization.
Industry Regulation has increased dramatically over the last two decades. As a result, IT Professionals have been tasked with a key role in meeting compliance needs while ensuring business continuity plans are in place. This has presented leaders with a dual task: finding a backup and disaster recovery solution that offers fast recovery and data security while also solving compliance challenges. In this presentation, you will learn how a BDR solution can ensure that your organization meets its internal metrics for minimizing downtime while staying compliant with industry regulations.
Have you wondered how ransomware creeps into your network despite the precautions you take and the memos you send to your staff? We will break down the common methods used to spread ransomware, describe the “Kill Chain” and how infections try to evade firewalls. We’ll then discuss three key requirements for today’s firewall solutions and lessons learned from the field.
The data storage market is going through tectonic shifts these days. Flash is being used to accelerate applications and IT leaders are moving from project based purchasing to building private clouds to concurrently hosting a multitude of applications. Join this session to learn how to take advantage of these changes and hear how IT leaders at a national credit union are consolidating workloads to increase IT agility while conserving budgets.
Today’s rapid pace of technological innovation is forcing digital and physical worlds to collide – and it’s also transforming the way organizations operate in every industry. This digital transformation can either make or break your business. In the digital world, customers expect 24/7 availability, 365 days a year. No longer do businesses need to think in hours or days. Rather, they can think in minutes or seconds instead. This applies to all applications, data, and workloads.
In this presentation, you will learn how to create a powerful data protection solution for all types of customer environments by combining high-performance storage with integrated data protection to meet the “Always-On Enterprise” SLAs.
The details of this presentation will be available soon. Please check back for updates!
Remember when IT was the gatekeeper and ruled with a combination of strict policies and a fully contained ecosystem? Those days are long gone. Laptops, smartphones, tablets and Internet of Things (IoT) devices are pouring into the workplace. Identifying what is on the network – including those overlooked wired ports in conference rooms, behind IP phones, and at printer stations – is the first step to securing your data. Automated policy enforcement ensures that only wanted users and devices are allowed to connect, and real-time threat protection is required to meet internal and external audit and compliance requirements.
Today’s access security must deliver profiling, policy enforcement, guest access, and BYOD onboarding to ensure IT-offload, enhanced threat protection and a more seamless user experience.
For years, you’ve feared intrusion by Managed Service Providers — those job-stealing voices from the void whose primary goal is to make you and your team look bad to upper management. In reality, Managed Service Providers offer you a great shot at upward mobility. They WILL steal your job – but only the mundane, commoditized tasks that suck valuable time, freeing your organization to tackle and complete projects that add value. But how to pick the right provider? Attend our session to learn why managed services are a boon to your business, how to avoid “yes-men” and hacks, and what Managed Service Providers REALLY think of you and your team.
It is time to rethink your threat management strategies. To kill threats quickly, you need to accelerate time to detection and time to response. This requires efficiency of operations and a well-enabled team. Join LogRhythm Sales Engineer, Peter McNaull, as we discuss how a security strategy that is focused on detection is required in today’s threat environment. Peter will demonstrate how to use your own security intelligence to efficiently reduce your mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR).
|Becky France||Cyber Security Officer||VA Roseburg Healthcare System|
|Bob Leek||Deputy Chief Information Officer||Multnomah County|
|Chuck Fischer||Director of Information Technology||Advantage Dental|
|Dale Debs||Chief Information Officer||Cascade Community Credit Union|
|Dan Guzman||Chapter President||SQL Users Group- Eugene|
|David Clark||Manager, Information Technology||Three Rivers Resort|
|Glenn Gillis||Manager, Information Technology||Environmental Law Alliance Worldwide|
|John Bernert||Chief Technology Officer||BizTech Synergies|
|Kathy Thomason||Network Administrator||Umpqua Community College|
|Keleen Wright||Facility Chief Information Officer||Roseburg VA Medical Center|
|Mark Dietz||Information Technology Manager||Fall Creek Farm & Nursery|
|Michael Guidero||Information Technology & Network Operations Architect||Social Communications Company|
|Mike McClure||Director, Information Technology & Network & User Services||Rogue Community College|
|Paul Sanderson||Network Services Manager||Bi-Mart|
|Richard Rader||Chief Technology Officer||Cow Creek Information Technology Group|
|Roger Shaw||Manager Application Development||Bi-Mart|
|Scott Van Den Elzen||Chief Technology Officer||IP Services|
|Steve Eichen||Chief Information Officer||Pacific Retirement Services|
|Steve Liu||Director, Information Technology||Oregon Medical Group|
|Thomas Winter||Manager, Information Technology||The Ford Family Foundation|
|Tim Hoffman||Network Administrator||Cardinal Services|
|Tim Krupp||Manager, Information Technology||Plexis Healthcare Systems|
|Tony Saxman||Director, Information Technology Programs & Projects||University of Oregon|
|Travis Drennan||Director, Information Technology||Spartan Management, LLC|
66 E 6th Ave
Eugene, OR 97401
Hilton Eugene stands in the heart of downtown Eugene, Oregon. Recent renovations transformed our guest rooms, lounge area, fitness center and exclusive Executive Level. Located just two blocks from the Amtrak station and offering complimentary airport shuttle transportation to the Eugene airport, the hotel is easily accessible.
From Interstate 5
Take Exit 194B onto I-105. Stay on I-105 for 3 miles. I-105 ends at Jefferson Street.
Take the left hand exit onto 7th Avenue as the freeway ends.
Continue straight for 7 blocks.
Turn left on Oak Street and again left on 6th Avenue.
Hotel entrance is immediately on the left.
From Portland International Airport
Depart from Portland International Airport, OR (0.2 mi.)
Bear right onto NE Airport Way (2.2 mi.)
Take ramp right for I-205 South toward Salem / Portland (3.1 mi.)
At exit 21B, take ramp right for I-84 West / US-30 West toward Portland (5.5 mi.)
Take ramp left for I-5 South toward Salem / Beaverton (107.7 mi.)
At exit 194B, take ramp right for I-105 West / OR-126 West toward Eugene (1.3 mi.)
At exit 2, take ramp right for Coburg Rd. toward City CTR. – Mall / Univ. of Ore. (0.4 mi.)
Turn right onto Coburg Rd (0.7 mi.)
Turn right onto OR-99 N / OR-126 W Branch / E 6th Ave (0.3 mi.)
Arrive at OR-99 N / OR-126 W Branch / E 6th Ave (0.0 mi.)