
Virtual Summit
Denver Cybersecurity Conference
The Denver Cybersecurity Conference is the best way to connect with industry executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, attendees have the ability to connect and network with their peers.
Date
Thu. Feb 20
Event Schedule
-
Why Does Asset Management Matter for Cybersecurity? 8:15 am
Presented by Axonius
Today, security professionals encounter many cybersecurity asset management challenges, from aggregating disparate data sets to establishing real-time visibility in a fluid environment. Trends in emerging technologies, such as IoT deployments, and in workplace modernization, like BYOD, continue to complicate the situation. Enterprises have a wide range of security solutions at their disposal to help tackle security challenges, but few resources to manage them. In this session, you’ll discover 3 modern asset trends, learn from 5 real-life asset management challenges, and gain a 6-step checklist on how to successfully manage your company’s assets.
Speaker:
-
Threat Intelligence and Modern Layered Security 9:15 am
Presented by Sentinel IPS
The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.
Speaker:
- Coffee Break
- Trends in Cybercrime 10:00 am
- Break
-
Real Talk on Ransomware 11:15 am
Presented by Arcserve
We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, Arcserve dives into the realities of ransomware attacks and the real impacts on organizations. We offer participants an opportunity to “sound off” on ransomware and share experiences and challenges with your peers to better understand how prepared organizations are to defend against ransomware attacks.
Speaker:
- Lunch Break
-
The Paradox of Securing Workloads 12:15 pm
Presented by Morphisec
Servers contain an organization’s most valuable assets and underpin its operational capabilities. These are the ultimate targets of many cybercriminals. Yet strategies for defending them often rely on client-grade technologies like AV and EDR. This exposes the enterprise at a time when many companies are migrating workloads to the cloud. Gartner’s model for Cloud Workload Protection Platforms offers insights on the must-haves and nice-to-haves of server protection, on-prem and in the cloud. It also points to ways of safeguarding them from unknown attacks by using deterministic technology like moving target defense.
Speaker:
- Break
-
Protect Your Keys or Don’t Waste Your Time Encrypting Your Data 1:15 pm
Presented by nCipher Security
For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.
Speaker:
-
Overcoming Today’s Most Common Security & Privacy Challenges 1:45 pm
Presented by OneTrust Vendorpedia
Managing third-party vendor risk before, during and after on-boarding is a continuous effort under global privacy laws and security regulations. While outsourcing operations to vendors can alleviate business challenges, managing the associated risk with manual tools like spreadsheets is complex and time consuming. To streamline this process, organizations must put procedures in place to secure sufficient vendor guarantees and effectively work together during an audit, incident – or much more. In this session, we’ll breakdown a practical approach for automating third-party vendor risk management and explore helpful tips and real-world practical advice to automate third-party privacy and security risk programs.
Speaker:
- Break
-
Cybercrime, Inc: Exposing the Business of the Dark Web 2:30 pm
Presented by Armor
The Dark Web is growing at an exponential rate, with hackers doubling down on cybercrime-as-a-service – allowing non-traditional and unskilled hackers to wreak havoc in ways previously impossible. Criminals don’t have to be skilled to get your data; they just have to hire someone who is.
The session aims to expose the inner workings and business of the cyber underground, focusing on the following:
- Cryptocurrency – the impact digital currency has had on the rate of growth of cybercrime
- Cybercrime-as-a-service – the expansion of services offered by skilled hackers & for low costs
- Money laundering & money mules – ways criminals are skirting around laws/regulations to get paid
- How businesses can protect themselves from all levels of cybercriminals; emphasis on the importance of investing in proactive threat hunting
Speaker:
-
Digital Transformation – Knowing the Threat Landscape 3:00 pm
Presented by RSA
Digital Transformation is real. How prepared is your business to understand the associated risks within your organization across the threat landscape.
Speaker:
-
A Risk Based Privacy Approach 3:30 pm
Presented by Truvantis
A privacy program in this environment must take into account: An understanding of what current requirements are applicable to each business process which involves personal information, and the business reasons for the use of that personal information; how those requirements translate into technical and process changes, and how those changes are best addressed from the application level to the organizational level; future-proofing against changing applications and business needs, additional regulatory requirements, increased customer and partner expectations, and peer competitor strategies. This program must be risk based and designed to achieve an MVP defensible position in the shortest amount of time, without boiling the ocean, and should include a road map for continuous improvement and recurring risk and privacy assessments.
Understand how to create an operational approach to privacy compliance, including business and technical impacts, create a prioritized assessment and implementation plan, and be able to demonstrate compliance and comply with privacy rights requests in a timely and efficient manner.Speaker:
- Networking / Happy Hour