
Conference
Salt Lake City
Cybersecurity Conference
Join the Salt Lake City Cybersecurity Conference to connect with your fellow cybersecurity professionals and industry experts for live, in-person sessions. Topic will range from cloud security to protecting your organization from advanced threat actors. You’ll hear from industry experts and luminaries, as well as representatives from some of the world’s top cybersecurity solutions providers.
Attendees will hear from insightful keynotes on vital security topics and learn the skills needed to stay ahead of cyber threats, all while networking with peers at the Salt Lake City Cybersecurity Conference!
Take a look at all Data Connectors has to offer here!
Date
Thu. Feb 02
Location
150 West 500 South
Salt Lake City, UT 84101
+1 801-401-2000
-
Featured Speakers
Jason Miller
Protecting Against Cyber Attacks
Charlene IgnacioProtecting Against Cyber Attacks
Stewart MoodyProtecting Against Cyber Attacks
Jeffrey ThalhammerProtecting Against Cyber Attacks
Mathieu GorgeKeynote Presentation: Mathieu Gorge
The Cyber Elephant in the Board RoomSigned Books from Keynote Speaker Mathieu Gorge
Jeff CollinsGuest Keynote Presentation: Jeff Collins, SSA
Steve GentryCyber Executive Panel
Glen SorensenCyber Executive Panel
Brian SeamonsCyber Executive Panel
Sherrie CowleyCyber Executive Panel
Isaac PainterCyber Executive Panel
Dan BowdenCyber Executive Panel
Josh PugmireCyber Executive Panel
Event Schedule
Times for this Event are in Mountain Time (MDT/MST).
The Conference will be open from 8:00 AM to 6:30 PM Thursday, February 2nd.
- Welcome / Introductions
-
How AI Can Think Like An Attacker 9:30 am
In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.
Speaker:
-
Never Let An Endpoint Refresh Go To Waste 10:00 am
Did you know nearly 18% the IT operating budget is allocated towards the endpoint (Statistica)? Second, if security operations receive 3% of the IT operating budget, roughly how much is allocated towards cyber innovation? Using simple math, I think you’ll be surprised.
Post pandemic, the endpoint has never been more essential to the business, but CISOs rarely have input on the vendor or possible controls for that investment. This presentation intends to show how using simple math, along with sound security logic, CISOs can embed controls into HP hardware/endpoint without spending a dime.
Speaker:
-
Top 10 Features a Modern Backup Solution Must Have 10:55 am
Your data is a uniquely valuable resource and can be a significant competitive advantage. But the more data you have, the more complex it is to manage. And with rapidly increasing ransomware and other cyber threats, your data – and business – is more vulnerable than ever.
At Cohesity, we believe that technology should work harder and smarter for you, whether it’s reducing complexity, keeping your business secure, or delivering more value.
Come listen to what you should be looking for in a modern-day backup solution and how your backups should be providing you much more than a point in time to restore too.
Speaker:
-
Building Cyber Resilience By Prioritizing 24/7 Threat Detection and Response 11:15 am
In today’s threat landscape, security leaders must shift their focus to improving their cyber resilience. The ability to anticipate, withstand, recover from, and adapt to the evolving cyber threats will dictate how well-equipped your cybersecurity program is at defending against these threats. However, given the lack of skilled in-house security resources, it can be challenging to balance the number of incoming security alerts with delivering swift response to eliminate known and unknown threats.
In this presentation, join Alan Leavell, Senior Solutions Architect at eSentire, as he shares insights on how you can leverage 24/7 threat detection, investigation, and response capabilities to reduce your cyber risk, build resilience and prevent business disruption.
Speaker:
-
Protecting Against Cyber Attacks 11:35 am
We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.
Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.
Panel Participants:
- Lunch Break
-
Keynote Presentation: Mathieu Gorge 12:45 pm
Making sense of Geopolitical Risks in 2023 – Impact on Cybersecurity & Compliance
There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2022 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2023 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes?
Speaker:
- Signed Books from Keynote Speaker Mathieu Gorge 1:30 pm
-
How to Win Your Penetration Test 1:50 pm
There are not a lot of industries out there that do not require some sort of penetration testing. Some organizations use penetration testing to discover vulnerabilities or weaknesses in their security. Others treat it as an annual exercise that just needs to be done to meet a requirement. In order to become better at detecting threat actors, organizations should consider treating penetration tests, as well as both red team and purple team engagements, as opportunities to improve their tools, processes and people.
Speaker:
-
PCIDSS 4.0 - Whats New in the Future of PCI Compliance 2:10 pm
Security Metrics, Inc. (Orem, UT) VP of Assessments, Gary Glover (CISSP, CISA, QSA) speaks about the release of PCI DSS 4.0. He will be discuss the new and evolving requirements of PCI DSS 4.0, timelines for compliance to PCI DSS 4.0, and how to prepare for PCI DSS 4.0 now.
Speakers:
-
Guest Keynote Presentation: Jeff Collins, SSA 2:50 pm
United States of America v. Approximately 3879.16242937 Bitcoin
The presentation presents a case study of an investigation into the theft of $154 million USD from the Sony Life Insurance Company. The theft was executed by an employee of Sony Life based in Tokyo, Japan, who converted the funds to bitcoin in a Coinbase account, then removed the bitcoin to a cold wallet. The FBI partnered with Japanese law enforcement officials to successfully find the seed phrase of the thief’s cold wallet, reconstitute the cold wallet, seize the bitcoin, and then return all of the money stolen from Sony Life back to the company.
Speaker:
-
Cyber Executive Panel 3:40 pm
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
- Conference Closing Session 4:25 pm
- Happy Hour Networking Reception 4:30 pm