
Conference
Salt Lake City Cybersecurity Conference 2020
The Salt Lake Cybersecurity Conference is the best way to connect with industry executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, attendees have the ability to connect and network with their peers.
Date
Wed. Jan 29
Event Schedule
-
Applying Probability Theory to Security Event Analysis 9:00 am
Presented by Respond Software
In this talk, we’ll discuss how new approaches and technology advances allow Security Operations teams of all sizes to finally have the capacity of Fortune 100 Companies. Your small team can analyze billions of incoming security events daily using state-of-the-art techniques such as probabilistic math, AI, ML, and correlation. We’ll also discuss the pros and cons of each of these approaches.
Speaker:
-
How Hackers Bypass Office 365 Security: A Guide for the Uninitiated 9:30 am
Presented by Avanan
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
Email-based phishing, spoofing, and malware
Account takeover, insider threats, compromised Microsoft credentials
Loss of sensitive data from OneDrive, SharePoint and Office 365Speaker:
- Coffee Break
-
Cybercrime Tactics and Techniques Report 10:30 am
Presented by Malwarebytes
A significant uptick in threats aimed at businesses were reported in Q2 2019 from the same time last year. Companies need to take control against these increases in cyberthreats by remediating at scale, quickly mitigating attack impacts through isolation, and proactively hunting for threats before they execute.
Key takeaways:
- Significant increases in overall threats, Emotet, ransomware, and its impact on your enterprise
- How Mac, mobile malware, and especially adware are on the rise
- User concern about the safety of their personal information, and how organizations are failing to protect their data
- What it takes to create a resilient enterprise
Speaker:
-
It’s a SOAR Topic 11:00 am
Presented by Sophos
From Endpoint Detection and Response (EDR) to Security Orchestration, Automation and Response (SOAR), this presentation will pose question which will cause reflection and spur action, enabling you to take the leap into applying tools in your security ecosystem that will assist you in your daily battle of keeping the bad folks out!
Speaker:
- Lunch Break
- Trends in Cybercrime 12:00 pm
- Dessert and Coffee Break
-
The Evolving Convergence of Information Security with Governance & Compliance 1:30 pm
Presented by Egnyte
Once highly isolated from each other, information governance and information security is experiencing a convergence where the market is realizing they both need each other more than ever to respond to the explosion of unstructured data, digital transformation and expanding privacy regulations.
Speaker:
-
The Secret to Winning IT Security Roulette 2:00 pm
Presented by SaltStack
There is too much talk in IT security and not enough action. But the reality is you probably don’t have the people or the tools to effectively act to secure your IT infrastructure. There is hope. Let’s fix IT. Join the CTO of SaltStack, Thomas Hatch, for a presentation on hope for the future of IT security.
The pace of infrastructure growth and resulting complexity is overwhelming. Old security tech and processes, combined with overwhelmed and understaffed IT and security teams, simply can’t protect against a new and evolving threat landscape. Security exploits are proliferating faster than ever before.
You already know this, but according to SC Magazine in the first half of 2019 there were almost 4000 unique data breaches resulting in more than 4 billion records being compromised.
The hard truth is almost all of these security breaches could’ve been avoided. Gartner said 99% of exploited vulnerabilities occur on misconfigured, unpatched systems KNOWN to IT security teams.
Security and IT teams need help winning security roulette. Let’s fix IT with fully automated, truly collaborative vulnerability remediation.
Speaker:
- Break
- CISA Is Working With Partners to Defend Against Today’s Threats 2:45 pm
- Networking / Happy Hour