
Conference
Phoenix
Cybersecurity Conference
The rate of change in the world of cybersecurity is unlike any other industry, and that’s why it’s so important to continue staying on the leading edge. Join the Phoenix Cybersecurity Conference and ensure that you and your organization are prepared for whatever comes next.
You’ll hear from industry experts, discussing the specific needs of cyber pros in the Phoenix area, and gain access to executive-level insights for the modern cyber landscape. You’ll also collect CPE credits and be invited to join your peers for a networking reception at the Phoenix Cybersecurity Conference!
Take a look at all Data Connectors has to offer here!
Date
Thu. Feb 16
-
Featured Speakers
Mark Sangster
Keynote Presentation: Mark Sangster
Herb Williams2023 Trends & Directions
Jim Christensen2023 Trends & Directions
Charlene Ignacio2023 Trends & Directions
Jason Miller2023 Trends & Directions
Ingrid RushCyber Inter-Agency Collaboration Panel
Michael LettmanCyber Inter-Agency Collaboration Panel
Lester GodseyCyber Executive Panel
Todd DekkingaCyber Executive Panel
James QuinnCyber Executive Panel
Event Schedule
Times for this Event are in Mountain Time (MST).
The Conference will be open from 9:00 AM to 5:00 PM Thursday, February 16th.
- Welcome / Introductions
-
4G/5G Network Security 10:00 am
Protecting organizational infrastructure, networks, and hardware devices is a never-ending pursuit these days. There is a secure network solution that offers a simple to manage alternative to complex VPN infrastructures for securely connecting sites, vehicles, IoT, and remote workers. This session will cover how to secure remote sites with ease, reduce attack surfaces by building undiscoverable network resources, and how to provide any-to-any connectivity. Learn how to unlock operational agility through built-in tunnel orchestration and simplified configuration. It’s all about end-to-end WAN and network security services that tightly integrate with routing and security devices to establish encrypted connections to access applications and resources in the cloud or data center.
Speaker:
-
Keynote Presentation: Mark Sangster 10:30 am
Finding Factors not Fault: Building Cyber Resilience
Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of an organization’s security, or worse, bury the true causes of incidents and lead to repeated data breaches or operations disrupting cyber incidents. Join Mark Sangster, author of No Safe Harbor and Adlumin Chief of Strategy, as he explores a famous aviation accident to identify human biases, best practice root cause analysis, and explores how blaming single factor robs us of the opportunity to identify system causes and make the changes necessary to prevent repeat incidents.
- Explore human biases and how they skew our findings
- Examining a full range of factors and documenting impact
- Continuous improvement through impartial examination
Speaker:
-
Risky Links - It is More Than Just Email 11:35 am
Risky links come to us in several ways; slack, LinkedIn, SMS – it’s almost unending. In fact, it just may be. The good news is that a link opens mostly in one place, the browser. ConcealBrowse will isolate the risky links when they are opening and protect the user from the malware being deployed.
Speaker:
-
Importance of Validating Your Security Posture 11:55 am
For years, organizations have invested millions of dollars into best-of-breed security solutions. Yet, organizations are breached daily. Modern challenges require modern solutions. Stop assuming you are secure and prove security effectiveness before attackers come after your organization.
The audience will gain understanding in:
- Proactive security models vs. reactive models
- Answers to the test is NOT cheating
- Optimizing security solutions to become ransomware resilient
- Quantify risk in your environment with binary artifacts.
Speaker:
- Lunch Break
-
Lunch Demo: ColorTokens Unified Zero Trust Platform 12:40 pm
The industry’s only platform that offers comprehensive Zero Trust cybersecurity coverage across, cloud, containers, micro-services, hybrid, on-premise, data center and remote users – powered by ColorToken’s innovation, agility and execution.
Panel Participants:
-
2023 Trends & Directions 12:50 pm
If 2022 taught us anything, it’s that cybercriminals are still coming up with new ways to cash in. But with a new year upon us, what can we anticipate for 2023?
Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2023 with a security strategy that will set you up for success during this insightful discussion.
Panel Participants:
-
Securing AI 1:45 pm
A CISO’s perspective of the securing of AI and many of the road blocks.
Speaker:
-
How Not To Get Ransomwared or How To Recover ASAP If You're Breached 2:05 pm
According to Sophos & the FBI, 66% of organizations were affected by ransomware last year. Rich provides cybersecurity pro tips for 2023 to counteract phishing attempts, the risks of remote work and business email compromise attempts. Rich presents the pros & cons of leading cybersecurity solutions and 6 ways to make organizations safer with the same or lower IT budget. Rich presents case studies of recent breaches and the key tasks innovative CISOs executed to get their organizations back operational within hours or days.
Speaker:
-
Zero Trust at the Endpoint: Fighting Ransomware 2:45 pm
The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it for endpoints, and the technologies you need to take control of your environment in the fight against ransomware.
Speaker:
-
Cyber Inter-Agency Collaboration Panel 3:05 pm
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
-
Cyber Executive Panel 3:55 pm
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
- Conference Closing Session 4:30 pm
- Happy Hour Networking Reception 4:30 pm
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibitor Partners
Affiliate Partners