Export or edit this event...

Fortinet FortiExpress - Rolling Cyber Security Demo Center Open House + CISSP and Security Presentations!

Oregon Tech Wilsonville
27500 SW Parkway Ave
Wilsonville, OR 97070, US (map)
Public WiFi

The Forti"Express will be parked in the Oregon Tech parking lot.

Website

Description

End-to-End Security; No Hype Performance plus Protection in one Platform—only from Fortinet

Fortinet’s FortiExpress is trucking out of Silicon Valley, headed for cities all over North America. Our custom 18-wheeler offers a state-of-the-art Advanced Threat Detection showcase and demo center. Our industry experts are sharing the latest research on emerging cyber security threats, as well as how to protect your networks while maximizing the impact of your IT infrastructure. Forget the hype; get the facts.

Space is Limited. Register: http://www.xiologix.com/2016/01/fortiexpress2016/

Friday, March 11 9:30am-3:00pm Open House Lunch Provided 12:00-1:30 - Catered by Slick's Big Time BBQ!

9:30-3:00 Open House on the Truck. Stop by when you can and stay as long as you’d like!

10:30-11:30 CISSP Overview - with Kris Rosenberg in room WIL 122 Oregon Tech Program Director for Information Technology and Cybersecurity, Professor Kristopher Rosenberg, will be presenting a high-level overview of the 8 domains that make up the (ISC)2 Certified Information Systems Security Professional (CISSP) certification exam. Prof. Rosenberg will talk about how to prepare for the exam and will provide some helpful tips on ways to study the large volume of information that is covered in the exam.

12:00-1:30 Lunch Provided – Slick’s Big Time BBQ!

1:30-2:30 Identifying and Improving Confidence in your Security Posture with Christopher Kusek and Kris Rosenberg in room WIL 122 With the recent rash of high profile security attacks in the industry the question is raised as to whether your IT security is fit to handle breaches of that magnitude or whether you’re merely practicing security theater. This presentation goes behind the scenes to address whether ‘compliant’ means secure, and how to look beyond the ‘checkbox’ and how to provide a comprehensive secure environment with actionable threat intelligence to quickly identify and mitigate events as they’re occurring.

Share

Tags