• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Mountain Time (MDT/MST).

The Conference will be open from 8:00 AM to 6:30 PM Thursday, February 2nd.

  • Welcome / Introductions
  • How AI Can Think Like An Attacker 9:30 am

    Presented by Darktrace

    In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

    Click to Expand

    Speaker:

    Lujain Winters
    Lujain Winters

    Lujain Winters

    Cybersecurity Executive

    Collapse This Item

  • Never Let An Endpoint Refresh Go To Waste 10:00 am

    Presented by HP

    Did you know nearly 18% the IT operating budget is allocated towards the endpoint (Statistica)? Second, if security operations receive 3% of the IT operating budget, roughly how much is allocated towards cyber innovation? Using simple math, I think you’ll be surprised.

    Post pandemic, the endpoint has never been more essential to the business, but CISOs rarely have input on the vendor or possible controls for that investment. This presentation intends to show how using simple math, along with sound security logic, CISOs can embed controls into HP hardware/endpoint without spending a dime.

    Click to Expand

    Speaker:

    Tom Masucci
    Tom Masucci

    Tom Masucci

    North America Security Specialist

    Collapse This Item

  • Top 10 Features a Modern Backup Solution Must Have 10:55 am

    Presented by Cohesity

    Your data is a uniquely valuable resource and can be a significant competitive advantage. But the more data you have, the more complex it is to manage. And with rapidly increasing ransomware and other cyber threats, your data – and business – is more vulnerable than ever.

    At Cohesity, we believe that technology should work harder and smarter for you, whether it’s reducing complexity, keeping your business secure, or delivering more value.

    Come listen to what you should be looking for in a modern-day backup solution and how your backups should be providing you much more than a point in time to restore too.

    Click to Expand

    Speaker:

    Chris Null
    Chris Null

    Chris Null

    Systems Engineer

    Collapse This Item

  • Building Cyber Resilience By Prioritizing 24/7 Threat Detection and Response 11:15 am

    Presented by eSentire

    In today’s threat landscape, security leaders must shift their focus to improving their cyber resilience. The ability to anticipate, withstand, recover from, and adapt to the evolving cyber threats will dictate how well-equipped your cybersecurity program is at defending against these threats. However, given the lack of skilled in-house security resources, it can be challenging to balance the number of incoming security alerts with delivering swift response to eliminate known and unknown threats.

    In this presentation, join Alan Leavell, Senior Solutions Architect at eSentire, as he shares insights on how you can leverage 24/7 threat detection, investigation, and response capabilities to reduce your cyber risk, build resilience and prevent business disruption.

    Click to Expand

    Speaker:

    Alan Leavell
    Alan Leavell

    Alan Leavell

    Senior Solutions Architect at eSentire

    Collapse This Item

  • Protecting Against Cyber Attacks 11:35 am

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    Click to Expand

    Panel Participants:

    Jason Miller
    Jason Miller

    Jason Miller

    Founder & CEO at BitLyft

    Charlene Ignacio
    Charlene Ignacio

    Charlene Ignacio

    CEO at The CMO Guru

    Stewart Moody
    Stewart Moody

    Stewart Moody

    Solutions Architect at Security Scorecard

    Jeffrey Thalhammer
    Jeffrey Thalhammer

    Jeffrey Thalhammer

    Solutions Engineer at Synopsys

    Collapse This Item

  • Lunch Break
  • Keynote Presentation: Mathieu Gorge 12:45 pm

    Making sense of Geopolitical Risks in 2023 – Impact on Cybersecurity & Compliance

    There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2022 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2023 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes?

    Click to Expand

    Speaker:

    Mathieu Gorge
    Mathieu Gorge

    Mathieu Gorge

    CEO, VigiTrust

    Collapse This Item

  • Signed Books from Keynote Speaker Mathieu Gorge 1:30 pm

    About the Book:

    The Cyber Elephant in the Board Room
    The Cyber Elephant in the Board Room

    The Cyber Elephant in the Board Room

    Cyber-Accountability with the Five Pillars of Security Framework by Mathieu Gorge

    Collapse This Item

  • How to Win Your Penetration Test 1:50 pm

    Presented by SecureWorks

    There are not a lot of industries out there that do not require some sort of penetration testing. Some organizations use penetration testing to discover vulnerabilities or weaknesses in their security. Others treat it as an annual exercise that just needs to be done to meet a requirement. In order to become better at detecting threat actors, organizations should consider treating penetration tests, as well as both red team and purple team engagements, as opportunities to improve their tools, processes and people.

    Click to Expand

    Speaker:

    Michael Bryant
    Michael Bryant

    Michael Bryant

    Senior Penetration Testing Consultant at Secureworks

    Collapse This Item

  • PCIDSS 4.0 - Whats New in the Future of PCI Compliance 2:10 pm

    Presented by SecurityMetrics

    Security Metrics, Inc. (Orem, UT) VP of Assessments, Gary Glover (CISSP, CISA, QSA) speaks about the release of PCI DSS 4.0. He will be discuss the new and evolving requirements of PCI DSS 4.0, timelines for compliance to PCI DSS 4.0, and how to prepare for PCI DSS 4.0 now.

    Click to Expand

    Speakers:

    Gary Glover
    Gary Glover

    Gary Glover

    VP of Assessments, (CISSP, CISA, QSA)

    Collapse This Item

  • Guest Keynote Presentation: Jeff Collins, SSA 2:50 pm

    United States of America v. Approximately 3879.16242937 Bitcoin

    The presentation presents a case study of an investigation into the theft of $154 million USD from the Sony Life Insurance Company. The theft was executed by an employee of Sony Life based in Tokyo, Japan, who converted the funds to bitcoin in a Coinbase account, then removed the bitcoin to a cold wallet. The FBI partnered with Japanese law enforcement officials to successfully find the seed phrase of the thief’s cold wallet, reconstitute the cold wallet, seize the bitcoin, and then return all of the money stolen from Sony Life back to the company.

    Click to Expand

    Speaker:

    Jeff Collins
    Jeff Collins

    Jeff Collins

    SSA, FBI

    Collapse This Item

  • Cyber Executive Panel 3:40 pm

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Steve Gentry
    Steve Gentry

    Steve Gentry

    Chief Security Officer at Clari

    Glen Sorensen
    Glen Sorensen

    Glen Sorensen

    Information Security Officer at TwinStar Credit Union

    Brian Seamons
    Brian Seamons

    Brian Seamons

    Board Member at SL|CISO

    Sherrie Cowley
    Sherrie Cowley

    Sherrie Cowley

    Head of Security Operations at 3M Health Care

    Isaac Painter
    Isaac Painter

    Isaac Painter

    VP, IT & Security at Aumni

    Dan Bowden
    Dan Bowden

    Dan Bowden

    Global CISO at Marsh

    Josh Pugmire
    Josh Pugmire

    Josh Pugmire

    Head of Compliance and Information Security at Entrata

    Collapse This Item

  • Conference Closing Session 4:25 pm
  • Happy Hour Networking Reception 4:30 pm
Partners Register