
Conference
Salt Lake City
Cybersecurity Conference
Join the Salt Lake City Cybersecurity Conference to connect with your fellow cybersecurity professionals and industry experts for live, in-person sessions. Topic will range from cloud security to protecting your organization from advanced threat actors. You’ll hear from industry experts and luminaries, as well as representatives from some of the world’s top cybersecurity solutions providers.
Attendees will hear from insightful keynotes on vital security topics and learn the skills needed to stay ahead of cyber threats, all while networking with peers at the Salt Lake City Cybersecurity Conference!
Take a look at all Data Connectors has to offer here!
Date
Thu. Feb 02
Location
150 West 500 South
Salt Lake City, UT 84101
+1 801-401-2000
Registration
Thu. Feb 02
Registration for qualified senior cybersecurity professionals. Subject to approval.
-
Featured Speakers
Jason Miller
Protecting Against Cyber Attacks
Charlene IgnacioProtecting Against Cyber Attacks
Stewart MoodyProtecting Against Cyber Attacks
Mathieu GorgeKeynote Presentation: Mathieu Gorge
The Cyber Elephant in the Board RoomSigned Books from Keynote Speaker Mathieu Gorge
Jeff CollinsGuest Keynote Presentation: Jeff Collins, SSA
Steve GentryCyber Executive Panel
Glen SorensenCyber Executive Panel
Brian SeamonsCyber Executive Panel
Sherrie CowleyCyber Executive Panel
Isaac PainterCyber Executive Panel
Dan BowdenCyber Executive Panel
Josh PugmireCyber Executive Panel
Event Schedule
Times for this Event are in Mountain Time (MDT/MST).
The Conference will be open from 8:00 AM to 6:30 PM Thursday, February 2nd.
- Welcome / Introductions
-
Beyond SolarWinds: Supply Chain & Third-Party Risk Management for 2023 8:30 am
Add to Calendar20230202 8:30 am20230202 8:50 amAmerica/DenverBeyond SolarWinds: Supply Chain & Third-Party Risk Management for 2023
Even before SolarWinds Orion Code Compromise, Supply Chain Attacks were up over 400% in 2020. As we go into 2023, this attack vector will continue to receive tremendous attention. Along with third-party risk in general, partner organizations and software systems with unfettered, privileged, deep access to infrastructure create a “perfect storm” threat for modern cyber executives.
In this session we will discuss these challenges in detail, as well as the multiple approaches to identify the best means of using supply chains while keeping the third-party risks at a minimum.
150 West 500 South
Salt Lake City, UT 84101.
Even before SolarWinds Orion Code Compromise, Supply Chain Attacks were up over 400% in 2020. As we go into 2023, this attack vector will continue to receive tremendous attention. Along with third-party risk in general, partner organizations and software systems with unfettered, privileged, deep access to infrastructure create a “perfect storm” threat for modern cyber executives.
In this session we will discuss these challenges in detail, as well as the multiple approaches to identify the best means of using supply chains while keeping the third-party risks at a minimum.
-
How AI Can Think Like An Attacker 8:50 am
Add to Calendar20230202 8:50 am20230202 9:10 amAmerica/DenverHow AI Can Think Like An Attacker
In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.
150 West 500 South
Salt Lake City, UT 84101In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.
Speaker:
-
Never Let An Endpoint Refresh Go To Waste 9:30 am
Add to Calendar20230202 9:30 am20230202 9:50 amAmerica/DenverNever Let An Endpoint Refresh Go To Waste
Did you know nearly 18% the IT operating budget is allocated towards the endpoint (Statistica)? Second, if security operations receive 3% of the IT operating budget, roughly how much is allocated towards cyber innovation? Using simple math, I think you’ll be surprised.
Post pandemic, the endpoint has never been more essential to the business, but CISOs rarely have input on the vendor or possible controls for that investment. This presentation intends to show how using simple math, along with sound security logic, CISOs can embed controls into HP hardware/endpoint without spending a dime.
150 West 500 South
Salt Lake City, UT 84101Did you know nearly 18% the IT operating budget is allocated towards the endpoint (Statistica)? Second, if security operations receive 3% of the IT operating budget, roughly how much is allocated towards cyber innovation? Using simple math, I think you’ll be surprised.
Post pandemic, the endpoint has never been more essential to the business, but CISOs rarely have input on the vendor or possible controls for that investment. This presentation intends to show how using simple math, along with sound security logic, CISOs can embed controls into HP hardware/endpoint without spending a dime.
Speaker:
-
Cloud Clarity in 2023: Strategy, Execution & Alignment 9:50 am
Add to Calendar20230202 9:50 am20230202 10:10 amAmerica/DenverCloud Clarity in 2023: Strategy, Execution & Alignment
Securely optimizing the cloud for better business outcomes is the product of clear communication of terms and expectations, alignment with business processes and functions, and partnerships among multiple internal and external stakeholders. “Activity” does not equal “progress.” In this session, attendees will hear about creating definitional clarity, building adaptability, and creating cross-functional, business-wide alignment.
150 West 500 South
Salt Lake City, UT 84101.
Securely optimizing the cloud for better business outcomes is the product of clear communication of terms and expectations, alignment with business processes and functions, and partnerships among multiple internal and external stakeholders. “Activity” does not equal “progress.” In this session, attendees will hear about creating definitional clarity, building adaptability, and creating cross-functional, business-wide alignment.
-
Protecting Against Cyber Attacks 10:10 am
Add to Calendar20230202 10:10 am20230202 10:35 amAmerica/DenverProtecting Against Cyber Attacks
We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.
Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.
150 West 500 South
Salt Lake City, UT 84101.
We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.
Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.
Panel Participants:
-
Top 10 Features a Modern Backup Solution Must Have 10:55 am
Add to Calendar20230202 10:55 am20230202 11:15 amAmerica/DenverTop 10 Features a Modern Backup Solution Must Have
Your data is a uniquely valuable resource and can be a significant competitive advantage. But the more data you have, the more complex it is to manage. And with rapidly increasing ransomware and other cyber threats, your data – and business – is more vulnerable than ever.
At Cohesity, we believe that technology should work harder and smarter for you, whether it’s reducing complexity, keeping your business secure, or delivering more value.
Come listen to what you should be looking for in a modern-day backup solution and how your backups should be providing you much more than a point in time to restore too.
150 West 500 South
Salt Lake City, UT 84101Your data is a uniquely valuable resource and can be a significant competitive advantage. But the more data you have, the more complex it is to manage. And with rapidly increasing ransomware and other cyber threats, your data – and business – is more vulnerable than ever.
At Cohesity, we believe that technology should work harder and smarter for you, whether it’s reducing complexity, keeping your business secure, or delivering more value.
Come listen to what you should be looking for in a modern-day backup solution and how your backups should be providing you much more than a point in time to restore too.
Speaker:
-
Building Cyber Resilience By Prioritizing 24/7 Threat Detection and Response 11:15 am
Add to Calendar20230202 11:15 am20230202 11:35 amAmerica/DenverBuilding Cyber Resilience By Prioritizing 24/7 Threat Detection and Response
In today’s threat landscape, security leaders must shift their focus to improving their cyber resilience. The ability to anticipate, withstand, recover from, and adapt to the evolving cyber threats will dictate how well-equipped your cybersecurity program is at defending against these threats. However, given the lack of skilled in-house security resources, it can be challenging to balance the number of incoming security alerts with delivering swift response to eliminate known and unknown threats.
In this presentation, join Alan Leavell, Senior Solutions Architect at eSentire, as he shares insights on how you can leverage 24/7 threat detection, investigation, and response capabilities to reduce your cyber risk, build resilience and prevent business disruption.
150 West 500 South
Salt Lake City, UT 84101In today’s threat landscape, security leaders must shift their focus to improving their cyber resilience. The ability to anticipate, withstand, recover from, and adapt to the evolving cyber threats will dictate how well-equipped your cybersecurity program is at defending against these threats. However, given the lack of skilled in-house security resources, it can be challenging to balance the number of incoming security alerts with delivering swift response to eliminate known and unknown threats.
In this presentation, join Alan Leavell, Senior Solutions Architect at eSentire, as he shares insights on how you can leverage 24/7 threat detection, investigation, and response capabilities to reduce your cyber risk, build resilience and prevent business disruption.
Speaker:
- Lunch Break
-
Keynote Presentation: Mathieu Gorge 12:10 pm
Add to Calendar20230202 12:10 pm20230202 12:50 pmAmerica/DenverKeynote Presentation: Mathieu Gorge
There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2022 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2023 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes?
150 West 500 South
Salt Lake City, UT 84101Making sense of Geopoltical Risks in 2022 – Impact on Cybersecurity & Compliance
There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2022 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2023 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes?
Speaker:
-
Signed Books from Keynote Speaker Mathieu Gorge 12:50 pm
Add to Calendar20230202 12:50 pm20230202 1:10 pmAmerica/DenverSigned Books from Keynote Speaker Mathieu Gorge150 West 500 South
Salt Lake City, UT 84101.
About the Book:
-
How to Win Your Penetration Test 1:10 pm
Add to Calendar20230202 1:10 pm20230202 1:30 pmAmerica/DenverHow to Win Your Penetration Test
There are not a lot of industries out there that do not require some sort of penetration testing. Some organizations use penetration testing to discover vulnerabilities or weaknesses in their security. Others treat it as an annual exercise that just needs to be done to meet a requirement. In order to become better at detecting threat actors, organizations should consider treating penetration tests, as well as both red team and purple team engagements, as opportunities to improve their tools, processes and people.
150 West 500 South
Salt Lake City, UT 84101There are not a lot of industries out there that do not require some sort of penetration testing. Some organizations use penetration testing to discover vulnerabilities or weaknesses in their security. Others treat it as an annual exercise that just needs to be done to meet a requirement. In order to become better at detecting threat actors, organizations should consider treating penetration tests, as well as both red team and purple team engagements, as opportunities to improve their tools, processes and people.
Speaker:
-
PCIDSS 4.0 - Whats New in the Future of PCI Compliance 1:30 pm
Add to Calendar20230202 1:30 pm20230202 1:50 pmAmerica/DenverPCIDSS 4.0 - Whats New in the Future of PCI Compliance
Security Metrics, Inc. (Orem, UT) VP of Assessments, Gary Glover (CISSP, CISA, QSA) speaks about the release of PCI DSS 4.0. He will be discuss the new and evolving requirements of PCI DSS 4.0, timelines for compliance to PCI DSS 4.0, and how to prepare for PCI DSS 4.0 now.
150 West 500 South
Salt Lake City, UT 84101Security Metrics, Inc. (Orem, UT) VP of Assessments, Gary Glover (CISSP, CISA, QSA) speaks about the release of PCI DSS 4.0. He will be discuss the new and evolving requirements of PCI DSS 4.0, timelines for compliance to PCI DSS 4.0, and how to prepare for PCI DSS 4.0 now.
Speakers:
-
2023 Trends & Directions 1:50 pm
Add to Calendar20230202 1:50 pm20230202 1:50 pmAmerica/Denver2023 Trends & Directions
If 2022 taught us anything, it’s that cybercriminals are still coming up with new ways to cash in. But with a new year upon us, what can we anticipate for 2023?
Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2023 with a security strategy that will set you up for success during this insightful discussion.
150 West 500 South
Salt Lake City, UT 84101.
If 2022 taught us anything, it’s that cybercriminals are still coming up with new ways to cash in. But with a new year upon us, what can we anticipate for 2023?
Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2023 with a security strategy that will set you up for success during this insightful discussion.
-
Operational Technology (OT) & Industrial Control Systems (ICS): Cybersecurity Concerns 2:35 pm
Add to Calendar20230202 2:35 pm20230202 2:55 pmAmerica/DenverOperational Technology (OT) & Industrial Control Systems (ICS): Cybersecurity Concerns
Since the Stuxnet worm was first discovered back in 2010, attacks related to SCADA systems have been of concern. While manufacturing and utility organizations tend to talk about them more, there are wide implications across the cybersecurity landscape that touch on ICS and OT systems of all kinds.
This session will talk about why these types of attacks represent a primary concern, and what state-of-the-art looks like in terms of building protections.
150 West 500 South
Salt Lake City, UT 84101.
Since the Stuxnet worm was first discovered back in 2010, attacks related to SCADA systems have been of concern. While manufacturing and utility organizations tend to talk about them more, there are wide implications across the cybersecurity landscape that touch on ICS and OT systems of all kinds.
This session will talk about why these types of attacks represent a primary concern, and what state-of-the-art looks like in terms of building protections.
-
The Risk Management “Balance Sheet” 2:55 pm
Add to Calendar20230202 2:55 pm20230202 3:15 pmAmerica/DenverThe Risk Management “Balance Sheet”
Managing risk has always been a part of the CISO responsibility set; however, the ways in which it is managed has no clear definition. With new ransomware threats, supply chain attacks, and third-party risk in the mix – perhaps a new way to budget risk is required. Is there an effective way to have a “risk balance sheet” – a way in which the CISO could communicate risk to the rest of the C-suite in a consistent language they would understand?
Attend this session to get these questions answered and more.
150 West 500 South
Salt Lake City, UT 84101.
Managing risk has always been a part of the CISO responsibility set; however, the ways in which it is managed has no clear definition. With new ransomware threats, supply chain attacks, and third-party risk in the mix – perhaps a new way to budget risk is required. Is there an effective way to have a “risk balance sheet” – a way in which the CISO could communicate risk to the rest of the C-suite in a consistent language they would understand?
Attend this session to get these questions answered and more.
-
Guest Keynote Presentation: Jeff Collins, SSA 3:15 pm
Add to Calendar20230202 3:15 pm20230202 3:45 pmAmerica/DenverGuest Keynote Presentation: Jeff Collins, SSA
The presentation presents a case study of an investigation into the theft of $154 million USD from the Sony Life Insurance Company. The theft was executed by an employee of Sony Life based in Tokyo, Japan, who converted the funds to bitcoin in a Coinbase account, then removed the bitcoin to a cold wallet. The FBI partnered with Japanese law enforcement officials to successfully find the seed phrase of the thief’s cold wallet, reconstitute the cold wallet, seize the bitcoin, and then return all of the money stolen from Sony Life back to the company.
150 West 500 South
Salt Lake City, UT 84101United States of America v. Approximately 3879.16242937 Bitcoin
The presentation presents a case study of an investigation into the theft of $154 million USD from the Sony Life Insurance Company. The theft was executed by an employee of Sony Life based in Tokyo, Japan, who converted the funds to bitcoin in a Coinbase account, then removed the bitcoin to a cold wallet. The FBI partnered with Japanese law enforcement officials to successfully find the seed phrase of the thief’s cold wallet, reconstitute the cold wallet, seize the bitcoin, and then return all of the money stolen from Sony Life back to the company.
Speaker:
-
Cyber Inter-Agency Collaboration Panel 3:45 pm
Add to Calendar20230202 3:45 pm20230202 4:15 pmAmerica/DenverCyber Inter-Agency Collaboration Panel
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
150 West 500 South
Salt Lake City, UT 84101.
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
-
Cyber Executive Panel 4:35 pm
Add to Calendar20230202 4:35 pm20230202 5:20 pmAmerica/DenverCyber Executive Panel
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
150 West 500 South
Salt Lake City, UT 84101.
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
-
Conference Closing Session 5:20 pm
Add to Calendar20230202 5:20 pm20230202 5:30 pmAmerica/DenverConference Closing Session150 West 500 South
Salt Lake City, UT 84101.
-
Happy Hour Networking Reception 5:30 pm
Add to Calendar20230202 5:30 pm20230202 6:30 pmAmerica/DenverHappy Hour Networking Reception 150 West 500 South
Salt Lake City, UT 84101.