• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Mountain Standard Time (MST).

The Conference will be open from 8:30 AM to 5 PM, January 12th.

  • Welcome / Introductions
  • Special Welcome with SAC F. Boudreaux 9:05 am

    Speaker:

    Frank J. Boudreaux, Jr.
    Frank J. Boudreaux, Jr.

    Frank J. Boudreaux, Jr.

    Special Agent in Charge at US Secret Service

    Collapse This Item

  • Demystifying Zero Trust and Its Role in Cybersecurity 9:10 am

    Presented by ThreatLocker

    The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it, and the technologies you need to take control of your environment in the fight against ransomware.

    Click to Expand

    Speaker:

    Danny Jenkins
    Danny Jenkins

    Danny Jenkins

    CEO at ThreatLocker

    Collapse This Item

  • Keynote Fireside Chat: Dr. Jonathan Ward - Author, “China’s Vision of Victory” 9:40 am

    In this fireside chat discussion, Author, consultant and frequent television commentator for Bloomberg, MSNBC, and CNN, Dr. Ward will discuss the geopolitical intricacies related to cyberthreats coming from Communist China and Russia.  Based on the ground-breaking work in his book “China’s Vision of Victory,” and his work with the US Department of Defense, other agencies and consulting for Fortune 500 organizations, Dr. Ward will take questions from the audience and discuss in more detail some of the key threats from afar. 

    Expect this talk to touch on state-sponsored hacking, and consider the government support for this type of “grey crime,” as well as how the rise of military and economic power in the Indo-Pacific affects the world’s new strategic balance.

    Click to Expand

    Speaker:

    Dr. Jonathan D. T. Ward
    Dr. Jonathan D. T. Ward

    Dr. Jonathan D. T. Ward

    Founder & Author - Atlas Organization

    Collapse This Item

  • The State of Secure Identity 10:45 am

    Presented by Auth0

    Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies. 

    During this session, we’ll provide greater insight into which industries are: 

    – Most highly targeted by credential stuffing attacks 

    – Most highly targeted by SQL injection attacks 

    – Leading the way in MFA adoption to improve overall security posture 

    We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

    Click to Expand

    Panel Participants:

    Gatewood Green
    Gatewood Green

    Gatewood Green

    Principal Security Architect at Auth0

    Collapse This Item

  • CIS Controls in the Real World 11:10 am

    Presented by Sentinel IPS

    As a vendor, we witness first-hand the tangible effect that best practices like the CIS Controls have on our customers’ network security. From our perspective, it’s easy to see who is on top of their security game… and who could really benefit from the guidance these controls provide. In this discussion, we’ll walk through several of the CIS Controls, review the changes to the new V8, and provide real-world case studies to illustrate how different security tools and services can work together – sometimes in not-so-obvious ways – to reduce risk, and keep your network safe and secure.

    Click to Expand

    Speaker:

    Ted Gruenloh
    Ted Gruenloh

    Ted Gruenloh

    CEO at Sentinel IPS

    Collapse This Item

  • Expert Panel Discussion: Defense in Depth: New Strategies for 2022 11:35 am

    Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations preparing to defend against inventive hackers penetrating their systems in 2022?

    Click to Expand

    Panel Participants:

    Gatewood Green
    Gatewood Green

    Gatewood Green

    Principal Security Architect at Auth0

    Danny Jenkins
    Danny Jenkins

    Danny Jenkins

    CEO at ThreatLocker

    Ted Gruenloh
    Ted Gruenloh

    Ted Gruenloh

    CEO at Sentinel IPS

    Andy Stone
    Andy Stone

    Andy Stone

    CTO - Americas at Pure Storage

    Collapse This Item

  • Lunch Break
  • Keynote Presentation: Micro-Cap Fraud: An Exercise in Complex Financial Crimes 1:00 pm

    Special Agent Suzanne Allen will take us through one of her market manipulation that has all the hallmark words of a securities fraud case: conspiracy, wire fraud, money laundering. Learn how her investigation revealed several individuals acting together to execute a debt conversion scheme in the microcap stock market.

    Click to Expand

    Speakers:

    Suzanne Allen
    Suzanne Allen

    Suzanne Allen

    Special Agent, Private Sector & InfraGard Coordinator at FBI - Phoenix Field Office

    Craig Moringiello
    Craig Moringiello

    Craig Moringiello

    Assistant Special Agent in Charge at FBI

    Collapse This Item

  • Remote Work – The Wild West of Endpoint Management 2:00 pm

    Presented by Baramundi

    The pandemic forced many of us to switch to working remotely overnight. At the time this was and continues to be an ongoing challenge for IT Departments that need to manage and maintain their remote endpoints. Now that companies are trending towards long-term remote work options, IT Infrastructure has to continue to adapt to the new and demanding ways of working from home. During this session we will cover what remote work has to do with the Wild West and what you need to be aware of to tame these challenges.

    Click to Expand

    Panel Participants:

    Alfredo Contreras
    Alfredo Contreras

    Alfredo Contreras

    Senior Consultant at baramundi

    Collapse This Item

  • Stopping Ransomware with Autonomous Response 2:25 pm

    Presented by Darktrace

    New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.

    Join Brianna Leddy, Darktrace’s Director of Analysis, as she unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.

    This presentation will discuss:

    • Recent ransomware threat trends, including double extortion and RDP attacks
    • How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office
    Click to Expand

    Speaker:

    Brianna Leddy
    Brianna Leddy

    Brianna Leddy

    Director of Analysis at Darktrace

    Collapse This Item

  • Expert Panel Discussion: What You Left Out of Your 2022 Cybersecurity Plan (& How to Fix it!) 2:50 pm

    While the 2021 headlines certainly facilitated easier discussions on expanded 2022 budget for cybersecurity, the “unknown unknowns” are a part of every cybersec leaders’ life. New threats will always arise, and bad actors didn’t take a planning break during the holiday season.

    In this panel discussion, our experts offer advice and opinions on how to best build out budget requests and add in padding for potential disruptions. They will also discuss how to best “translate” business requirements into meaningful budget items for finance and procurement teams, who are less “read-in” on cybersecurity in general.

    Click to Expand

    Panel Participants:

    Adam Fisher
    Adam Fisher

    Adam Fisher

    Principal Security Engineer at Salt Security

    Bradley Thurman
    Bradley Thurman

    Bradley Thurman

    Special Agent at Infragard MO (FBI partner)

    Harry Steward
    Harry Steward

    Harry Steward

    CFCE Network Intrusion Forensic Analyst at United States Secret Service - Phoenix Field Office

    Michael Lettman
    Michael Lettman

    Michael Lettman

    Cybersecurity Advisor at DHS-CISA and former CISO at State of Arizona

    Collapse This Item

  • Guest Keynote: Evolving Nature of CyberCrime in the Southwest 3:45 pm

    U.S. Secret Service Supervisory Special Agent Ingrid Rush will be shedding light on the work of the agency alongside the Arizona Cybersecurity Task Force and their efforts to protect organizations and individuals from cyber criminals across the Southwest. Calling upon her years of experience in the agency, particularly in her role as a digital forensics examiner, she will offer guidance on managing and mitigating cyber incidents.

    During her talk, SSA Rush will provide insight on how organizations can prepare for all types of attacks, including Phishing, Ransomware, and Business Email Compromise (BEC), with a particular focus on the threats facing the greater Phoenix area. From her post in the Phoenix Field Office, Rush will take questions from the community, as well as provide her thoughts on how companies can work with government organizations like the Secret Service to stay on top of cyber threats.

    Click to Expand

    Panel Participants:

    Ingrid Rush
    Ingrid Rush

    Ingrid Rush

    Supervisory Special Agent at US Secret Service

    Collapse This Item

  • Security Considerations: Before, During and After and Attack 4:20 pm

    Presented by Pure Storage

    The world of data backup and recovery has evolved with ransomware to highlight the need for a resiliency architecture that gives an organization the ability to quickly and reliably get back up and running after a cyber attack. This session will dive into how an attack (such as ransomware) unfolds and key considerations to give before, during and after so that the post-event recovery needs of the business can be achieved.

    Click to Expand

    Speaker:

    Andy Stone
    Andy Stone

    Andy Stone

    CTO - Americas at Pure Storage

    Collapse This Item

  • CISO RoundTable 4:45 pm

    Submit your bio for consideration to participate on our CISO RoundTable

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Lester Godsey
    Lester Godsey

    Lester Godsey

    CISO at Maricopa County

    Chris Lawrence
    Chris Lawrence

    Chris Lawrence

    CIO, CISO at Risas Dental and Braces

    Shannon M. Lawson
    Shannon M. Lawson

    Shannon M. Lawson

    ACIO/CISO at City of Phoenix

    Seema Sewell
    Seema Sewell

    Seema Sewell

    Assistant CISO at Maricopa County

    Michael Lettman
    Michael Lettman

    Michael Lettman

    Cybersecurity Advisor at DHS-CISA and former CISO at State of Arizona

    Chris Richardson
    Chris Richardson

    Chris Richardson

    Deputy CIO at Arizona State University

    Collapse This Item

  • Conference Closing Session
  • Networking Reception
  • Partners

    Platinum Partners

    ThreatLocker

    Gold Partners

    Auth0
    Pure Storage - Alternate

    Silver Partners

    baramundi - Alternate
    Darktrace
    Sentinel Intrusion Prevention Systems

    Bronze Partners

    Salt Security

    Exhibiting Partners

    AccountabilIT
    BlackCloak
    Safe Security

    Affiliate Partners

    (ISC)<sup>2</sup> Phoenix
    (ISC)<sup>2</sup> Southern Arizona Chapter
    Infragard Arizona
    ISSA Phoenix
    WiCyS Phoenix Affiliate

    Collapse This Item

Partners