
Conference
Phoenix 2022
Cybersecurity Conference
The 14th Annual Phoenix Cybersecurity Conference returns as a physical gathering for January, 2022. From a long history with senior cyber executives in the region, Community Members in attendance will reconnect with peers, and convene with the many local CISOs, government agency representatives, and meet John Kindervag, the creator of “Zero Trust” live and in-person!
Sit alongside thought leaders and luminaries, and hear from experts to gather insights on the latest insights in cybersecurity. These conferences gather cyber professionals from the local community and feature extensive training sessions, live Q&A panels, access to solution providers, and networking opportunities.
Take a look at all Data Connectors has to offer here!
Date
Wed. Jan 12
-
Featured Speakers
Frank J. Boudreaux, Jr.
Special Welcome with SAC F. Boudreaux
Dr. Jonathan D. T. WardKeynote Fireside Chat: Dr. Jonathan Ward - Author, “China’s Vision of Victory”
Suzanne AllenKeynote Presentation: Micro-Cap Fraud: An Exercise in Complex Financial Crimes
Craig MoringielloKeynote Presentation: Micro-Cap Fraud: An Exercise in Complex Financial Crimes
Ingrid RushGuest Keynote: Evolving Nature of CyberCrime in the Southwest
Lester GodseyCISO RoundTable
Chris LawrenceCISO RoundTable
Shannon M. LawsonCISO RoundTable
Seema SewellCISO RoundTable
Michael LettmanCISO RoundTable
Chris RichardsonCISO RoundTable
Event Schedule
Times for this Event are in Mountain Standard Time (MST).
The Conference will be open from 8:30 AM to 5 PM, January 12th.
- Welcome / Introductions
- Special Welcome with SAC F. Boudreaux 9:05 am
-
Demystifying Zero Trust and Its Role in Cybersecurity 9:10 am
The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it, and the technologies you need to take control of your environment in the fight against ransomware.
Speaker:
-
Keynote Fireside Chat: Dr. Jonathan Ward - Author, “China’s Vision of Victory” 9:40 am
In this fireside chat discussion, Author, consultant and frequent television commentator for Bloomberg, MSNBC, and CNN, Dr. Ward will discuss the geopolitical intricacies related to cyberthreats coming from Communist China and Russia. Based on the ground-breaking work in his book “China’s Vision of Victory,” and his work with the US Department of Defense, other agencies and consulting for Fortune 500 organizations, Dr. Ward will take questions from the audience and discuss in more detail some of the key threats from afar.
Expect this talk to touch on state-sponsored hacking, and consider the government support for this type of “grey crime,” as well as how the rise of military and economic power in the Indo-Pacific affects the world’s new strategic balance.
Speaker:
-
The State of Secure Identity 10:45 am
Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies.
During this session, we’ll provide greater insight into which industries are:
– Most highly targeted by credential stuffing attacks
– Most highly targeted by SQL injection attacks
– Leading the way in MFA adoption to improve overall security posture
We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.
Panel Participants:
-
CIS Controls in the Real World 11:10 am
As a vendor, we witness first-hand the tangible effect that best practices like the CIS Controls have on our customers’ network security. From our perspective, it’s easy to see who is on top of their security game… and who could really benefit from the guidance these controls provide. In this discussion, we’ll walk through several of the CIS Controls, review the changes to the new V8, and provide real-world case studies to illustrate how different security tools and services can work together – sometimes in not-so-obvious ways – to reduce risk, and keep your network safe and secure.
Speaker:
-
Expert Panel Discussion: Defense in Depth: New Strategies for 2022 11:35 am
Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations preparing to defend against inventive hackers penetrating their systems in 2022?
Panel Participants:
- Lunch Break
-
Keynote Presentation: Micro-Cap Fraud: An Exercise in Complex Financial Crimes 1:00 pm
Special Agent Suzanne Allen will take us through one of her market manipulation that has all the hallmark words of a securities fraud case: conspiracy, wire fraud, money laundering. Learn how her investigation revealed several individuals acting together to execute a debt conversion scheme in the microcap stock market.
Speakers:
-
Remote Work – The Wild West of Endpoint Management 2:00 pm
The pandemic forced many of us to switch to working remotely overnight. At the time this was and continues to be an ongoing challenge for IT Departments that need to manage and maintain their remote endpoints. Now that companies are trending towards long-term remote work options, IT Infrastructure has to continue to adapt to the new and demanding ways of working from home. During this session we will cover what remote work has to do with the Wild West and what you need to be aware of to tame these challenges.
Panel Participants:
-
Stopping Ransomware with Autonomous Response 2:25 pm
New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.
Join Brianna Leddy, Darktrace’s Director of Analysis, as she unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.
This presentation will discuss:
- Recent ransomware threat trends, including double extortion and RDP attacks
- How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office
Speaker:
-
Expert Panel Discussion: What You Left Out of Your 2022 Cybersecurity Plan (& How to Fix it!) 2:50 pm
While the 2021 headlines certainly facilitated easier discussions on expanded 2022 budget for cybersecurity, the “unknown unknowns” are a part of every cybersec leaders’ life. New threats will always arise, and bad actors didn’t take a planning break during the holiday season.
In this panel discussion, our experts offer advice and opinions on how to best build out budget requests and add in padding for potential disruptions. They will also discuss how to best “translate” business requirements into meaningful budget items for finance and procurement teams, who are less “read-in” on cybersecurity in general.
Panel Participants:
-
Guest Keynote: Evolving Nature of CyberCrime in the Southwest 3:45 pm
U.S. Secret Service Supervisory Special Agent Ingrid Rush will be shedding light on the work of the agency alongside the Arizona Cybersecurity Task Force and their efforts to protect organizations and individuals from cyber criminals across the Southwest. Calling upon her years of experience in the agency, particularly in her role as a digital forensics examiner, she will offer guidance on managing and mitigating cyber incidents.
During her talk, SSA Rush will provide insight on how organizations can prepare for all types of attacks, including Phishing, Ransomware, and Business Email Compromise (BEC), with a particular focus on the threats facing the greater Phoenix area. From her post in the Phoenix Field Office, Rush will take questions from the community, as well as provide her thoughts on how companies can work with government organizations like the Secret Service to stay on top of cyber threats.
Panel Participants:
-
Security Considerations: Before, During and After and Attack 4:20 pm
The world of data backup and recovery has evolved with ransomware to highlight the need for a resiliency architecture that gives an organization the ability to quickly and reliably get back up and running after a cyber attack. This session will dive into how an attack (such as ransomware) unfolds and key considerations to give before, during and after so that the post-event recovery needs of the business can be achieved.
Speaker:
-
CISO RoundTable 4:45 pm
Submit your bio for consideration to participate on our CISO RoundTable
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
- Conference Closing Session
- Networking Reception
-
Partners
Platinum Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners