Registration

Thu. Feb 02

Registration for qualified senior cybersecurity professionals. Subject to approval.

I agree to Data Connectors Terms and Conditions *

ENTER VIP CODE HERE


  • Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Mountain Time (MDT/MST).

The Conference will be open from 8:00 AM to 6:30 PM Thursday, February 2nd.

  • Welcome / Introductions
  • Beyond SolarWinds: Supply Chain & Third-Party Risk Management for 2023 8:30 am
    Add to Calendar20230202 8:30 am20230202 8:50 amAmerica/DenverBeyond SolarWinds: Supply Chain & Third-Party Risk Management for 2023

    Even before SolarWinds Orion Code Compromise, Supply Chain Attacks were up over 400% in 2020. As we go into 2023, this attack vector will continue to  receive tremendous attention. Along with third-party risk in general, partner organizations and software systems with unfettered, privileged, deep access to infrastructure create a “perfect storm” threat for modern cyber executives.  

    In this session we will discuss these challenges in detail, as well as the multiple approaches to identify the best means of using supply chains while keeping the third-party risks at a minimum.

    150 West 500 South
    Salt Lake City, UT 84101

    .

    Even before SolarWinds Orion Code Compromise, Supply Chain Attacks were up over 400% in 2020. As we go into 2023, this attack vector will continue to  receive tremendous attention. Along with third-party risk in general, partner organizations and software systems with unfettered, privileged, deep access to infrastructure create a “perfect storm” threat for modern cyber executives.  

    In this session we will discuss these challenges in detail, as well as the multiple approaches to identify the best means of using supply chains while keeping the third-party risks at a minimum.

    Click to Expand

    Collapse This Item

  • How AI Can Think Like An Attacker 8:50 am
    Add to Calendar20230202 8:50 am20230202 9:10 amAmerica/DenverHow AI Can Think Like An Attacker

    In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

    150 West 500 South
    Salt Lake City, UT 84101

    Presented by Darktrace

    In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

    Click to Expand

    Speaker:

    Lujain Winters
    Lujain Winters

    Lujain Winters

    Cybersecurity Executive

    Collapse This Item

  • Never Let An Endpoint Refresh Go To Waste 9:30 am
    Add to Calendar20230202 9:30 am20230202 9:50 amAmerica/DenverNever Let An Endpoint Refresh Go To Waste

    Did you know nearly 18% the IT operating budget is allocated towards the endpoint (Statistica)? Second, if security operations receive 3% of the IT operating budget, roughly how much is allocated towards cyber innovation? Using simple math, I think you’ll be surprised.

    Post pandemic, the endpoint has never been more essential to the business, but CISOs rarely have input on the vendor or possible controls for that investment. This presentation intends to show how using simple math, along with sound security logic, CISOs can embed controls into HP hardware/endpoint without spending a dime.

    150 West 500 South
    Salt Lake City, UT 84101

    Presented by HP

    Did you know nearly 18% the IT operating budget is allocated towards the endpoint (Statistica)? Second, if security operations receive 3% of the IT operating budget, roughly how much is allocated towards cyber innovation? Using simple math, I think you’ll be surprised.

    Post pandemic, the endpoint has never been more essential to the business, but CISOs rarely have input on the vendor or possible controls for that investment. This presentation intends to show how using simple math, along with sound security logic, CISOs can embed controls into HP hardware/endpoint without spending a dime.

    Click to Expand

    Speaker:

    Tom Masucci
    Tom Masucci

    Tom Masucci

    North America Security Specialist

    Collapse This Item

  • Cloud Clarity in 2023: Strategy, Execution & Alignment 9:50 am
    Add to Calendar20230202 9:50 am20230202 10:10 amAmerica/DenverCloud Clarity in 2023: Strategy, Execution & Alignment

    Securely optimizing the cloud for better business outcomes is the product of clear communication of terms and expectations, alignment with business processes and functions, and partnerships among multiple internal and external stakeholders. “Activity” does not equal “progress.”  In this session, attendees will hear about creating definitional clarity, building adaptability, and creating cross-functional, business-wide alignment. 

    150 West 500 South
    Salt Lake City, UT 84101

    .

    Securely optimizing the cloud for better business outcomes is the product of clear communication of terms and expectations, alignment with business processes and functions, and partnerships among multiple internal and external stakeholders. “Activity” does not equal “progress.”  In this session, attendees will hear about creating definitional clarity, building adaptability, and creating cross-functional, business-wide alignment. 

    Click to Expand

    Collapse This Item

  • Protecting Against Cyber Attacks 10:10 am
    Add to Calendar20230202 10:10 am20230202 10:35 amAmerica/DenverProtecting Against Cyber Attacks

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    150 West 500 South
    Salt Lake City, UT 84101

    .

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    Click to Expand

    Panel Participants:

    Jason Miller
    Jason Miller

    Jason Miller

    Founder & CEO at BitLyft

    Charlene Ignacio
    Charlene Ignacio

    Charlene Ignacio

    CEO at The CMO Guru

    Stewart Moody
    Stewart Moody

    Stewart Moody

    Solutions Architect at Security Scorecard

    Collapse This Item

  • Top 10 Features a Modern Backup Solution Must Have 10:55 am
    Add to Calendar20230202 10:55 am20230202 11:15 amAmerica/DenverTop 10 Features a Modern Backup Solution Must Have

    Your data is a uniquely valuable resource and can be a significant competitive advantage. But the more data you have, the more complex it is to manage. And with rapidly increasing ransomware and other cyber threats, your data – and business – is more vulnerable than ever.

    At Cohesity, we believe that technology should work harder and smarter for you, whether it’s reducing complexity, keeping your business secure, or delivering more value.

    Come listen to what you should be looking for in a modern-day backup solution and how your backups should be providing you much more than a point in time to restore too.

    150 West 500 South
    Salt Lake City, UT 84101

    Presented by Cohesity

    Your data is a uniquely valuable resource and can be a significant competitive advantage. But the more data you have, the more complex it is to manage. And with rapidly increasing ransomware and other cyber threats, your data – and business – is more vulnerable than ever.

    At Cohesity, we believe that technology should work harder and smarter for you, whether it’s reducing complexity, keeping your business secure, or delivering more value.

    Come listen to what you should be looking for in a modern-day backup solution and how your backups should be providing you much more than a point in time to restore too.

    Click to Expand

    Speaker:

    Chris Null
    Chris Null

    Chris Null

    Systems Engineer

    Collapse This Item

  • Building Cyber Resilience By Prioritizing 24/7 Threat Detection and Response 11:15 am
    Add to Calendar20230202 11:15 am20230202 11:35 amAmerica/DenverBuilding Cyber Resilience By Prioritizing 24/7 Threat Detection and Response

    In today’s threat landscape, security leaders must shift their focus to improving their cyber resilience. The ability to anticipate, withstand, recover from, and adapt to the evolving cyber threats will dictate how well-equipped your cybersecurity program is at defending against these threats. However, given the lack of skilled in-house security resources, it can be challenging to balance the number of incoming security alerts with delivering swift response to eliminate known and unknown threats.

    In this presentation, join Alan Leavell, Senior Solutions Architect at eSentire, as he shares insights on how you can leverage 24/7 threat detection, investigation, and response capabilities to reduce your cyber risk, build resilience and prevent business disruption.

    150 West 500 South
    Salt Lake City, UT 84101

    Presented by eSentire

    In today’s threat landscape, security leaders must shift their focus to improving their cyber resilience. The ability to anticipate, withstand, recover from, and adapt to the evolving cyber threats will dictate how well-equipped your cybersecurity program is at defending against these threats. However, given the lack of skilled in-house security resources, it can be challenging to balance the number of incoming security alerts with delivering swift response to eliminate known and unknown threats.

    In this presentation, join Alan Leavell, Senior Solutions Architect at eSentire, as he shares insights on how you can leverage 24/7 threat detection, investigation, and response capabilities to reduce your cyber risk, build resilience and prevent business disruption.

    Click to Expand

    Speaker:

    Alan Leavell
    Alan Leavell

    Alan Leavell

    Senior Solutions Architect at eSentire

    Collapse This Item

  • Lunch Break
  • Keynote Presentation: Mathieu Gorge 12:10 pm
    Add to Calendar20230202 12:10 pm20230202 12:50 pmAmerica/DenverKeynote Presentation: Mathieu Gorge

    There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2022 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2023 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes?

    150 West 500 South
    Salt Lake City, UT 84101

    Making sense of Geopoltical Risks in 2022 – Impact on Cybersecurity & Compliance

    There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2022 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2023 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes?

    Click to Expand

    Speaker:

    Mathieu Gorge
    Mathieu Gorge

    Mathieu Gorge

    CEO, VigiTrust

    Collapse This Item

  • Signed Books from Keynote Speaker Mathieu Gorge 12:50 pm
    Add to Calendar20230202 12:50 pm20230202 1:10 pmAmerica/DenverSigned Books from Keynote Speaker Mathieu Gorge150 West 500 South
    Salt Lake City, UT 84101

    .

    About the Book:

    The Cyber Elephant in the Board Room
    The Cyber Elephant in the Board Room

    The Cyber Elephant in the Board Room

    Cyber-Accountability with the Five Pillars of Security Framework by Mathieu Gorge

    Collapse This Item

  • How to Win Your Penetration Test 1:10 pm
    Add to Calendar20230202 1:10 pm20230202 1:30 pmAmerica/DenverHow to Win Your Penetration Test

    There are not a lot of industries out there that do not require some sort of penetration testing. Some organizations use penetration testing to discover vulnerabilities or weaknesses in their security. Others treat it as an annual exercise that just needs to be done to meet a requirement. In order to become better at detecting threat actors, organizations should consider treating penetration tests, as well as both red team and purple team engagements, as opportunities to improve their tools, processes and people.

    150 West 500 South
    Salt Lake City, UT 84101

    Presented by SecureWorks

    There are not a lot of industries out there that do not require some sort of penetration testing. Some organizations use penetration testing to discover vulnerabilities or weaknesses in their security. Others treat it as an annual exercise that just needs to be done to meet a requirement. In order to become better at detecting threat actors, organizations should consider treating penetration tests, as well as both red team and purple team engagements, as opportunities to improve their tools, processes and people.

    Click to Expand

    Speaker:

    Michael Bryant
    Michael Bryant

    Michael Bryant

    Senior Penetration Testing Consultant at Secureworks

    Collapse This Item

  • PCIDSS 4.0 - Whats New in the Future of PCI Compliance 1:30 pm
    Add to Calendar20230202 1:30 pm20230202 1:50 pmAmerica/DenverPCIDSS 4.0 - Whats New in the Future of PCI Compliance

    Security Metrics, Inc. (Orem, UT) VP of Assessments, Gary Glover (CISSP, CISA, QSA) speaks about the release of PCI DSS 4.0. He will be discuss the new and evolving requirements of PCI DSS 4.0, timelines for compliance to PCI DSS 4.0, and how to prepare for PCI DSS 4.0 now.

    150 West 500 South
    Salt Lake City, UT 84101

    Presented by SecurityMetrics

    Security Metrics, Inc. (Orem, UT) VP of Assessments, Gary Glover (CISSP, CISA, QSA) speaks about the release of PCI DSS 4.0. He will be discuss the new and evolving requirements of PCI DSS 4.0, timelines for compliance to PCI DSS 4.0, and how to prepare for PCI DSS 4.0 now.

    Click to Expand

    Speakers:

    Gary Glover
    Gary Glover

    Gary Glover

    VP of Assessments, (CISSP, CISA, QSA)

    Collapse This Item

  • 2023 Trends & Directions 1:50 pm
    Add to Calendar20230202 1:50 pm20230202 1:50 pmAmerica/Denver2023 Trends & Directions

    If 2022 taught us anything, it’s that cybercriminals are still coming up with new ways to cash in. But with a new year upon us, what can we anticipate for 2023? 

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2023 with a security strategy that will set you up for success during this insightful discussion. 

    150 West 500 South
    Salt Lake City, UT 84101

    .

    If 2022 taught us anything, it’s that cybercriminals are still coming up with new ways to cash in. But with a new year upon us, what can we anticipate for 2023? 

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2023 with a security strategy that will set you up for success during this insightful discussion. 

    Click to Expand

    Collapse This Item

  • Operational Technology (OT) & Industrial Control Systems (ICS): Cybersecurity Concerns 2:35 pm
    Add to Calendar20230202 2:35 pm20230202 2:55 pmAmerica/DenverOperational Technology (OT) & Industrial Control Systems (ICS): Cybersecurity Concerns

    Since the Stuxnet worm was first discovered back in 2010, attacks related to SCADA systems have been of concern. While manufacturing and utility organizations tend to talk about them more, there are wide implications across the cybersecurity landscape that touch on ICS and OT systems of all kinds. 

    This session will talk about why these types of attacks represent a primary concern, and what state-of-the-art looks like in terms of building protections. 

    150 West 500 South
    Salt Lake City, UT 84101

    .

    Since the Stuxnet worm was first discovered back in 2010, attacks related to SCADA systems have been of concern. While manufacturing and utility organizations tend to talk about them more, there are wide implications across the cybersecurity landscape that touch on ICS and OT systems of all kinds. 

    This session will talk about why these types of attacks represent a primary concern, and what state-of-the-art looks like in terms of building protections. 

    Click to Expand

    Collapse This Item

  • The Risk Management “Balance Sheet” 2:55 pm
    Add to Calendar20230202 2:55 pm20230202 3:15 pmAmerica/DenverThe Risk Management “Balance Sheet”

    Managing risk has always been a part of the CISO responsibility set; however, the ways in which it is managed has no clear definition. With new ransomware threats, supply chain attacks, and third-party risk in the mix – perhaps a new way to budget risk is required.  Is there an effective way to have a “risk balance sheet” – a way in which the CISO could communicate risk to the rest of the C-suite in a consistent language they would understand? 

    Attend this session to get these questions answered and more.

    150 West 500 South
    Salt Lake City, UT 84101

    .

    Managing risk has always been a part of the CISO responsibility set; however, the ways in which it is managed has no clear definition. With new ransomware threats, supply chain attacks, and third-party risk in the mix – perhaps a new way to budget risk is required.  Is there an effective way to have a “risk balance sheet” – a way in which the CISO could communicate risk to the rest of the C-suite in a consistent language they would understand? 

    Attend this session to get these questions answered and more.

    Click to Expand

    Collapse This Item

  • Guest Keynote Presentation: Jeff Collins, SSA 3:15 pm
    Add to Calendar20230202 3:15 pm20230202 3:45 pmAmerica/DenverGuest Keynote Presentation: Jeff Collins, SSA

    The presentation presents a case study of an investigation into the theft of $154 million USD from the Sony Life Insurance Company. The theft was executed by an employee of Sony Life based in Tokyo, Japan, who converted the funds to bitcoin in a Coinbase account, then removed the bitcoin to a cold wallet. The FBI partnered with Japanese law enforcement officials to successfully find the seed phrase of the thief’s cold wallet, reconstitute the cold wallet, seize the bitcoin, and then return all of the money stolen from Sony Life back to the company.

    150 West 500 South
    Salt Lake City, UT 84101

    United States of America v. Approximately 3879.16242937 Bitcoin

    The presentation presents a case study of an investigation into the theft of $154 million USD from the Sony Life Insurance Company. The theft was executed by an employee of Sony Life based in Tokyo, Japan, who converted the funds to bitcoin in a Coinbase account, then removed the bitcoin to a cold wallet. The FBI partnered with Japanese law enforcement officials to successfully find the seed phrase of the thief’s cold wallet, reconstitute the cold wallet, seize the bitcoin, and then return all of the money stolen from Sony Life back to the company.

    Click to Expand

    Speaker:

    Jeff Collins
    Jeff Collins

    Jeff Collins

    SSA, FBI

    Collapse This Item

  • Cyber Inter-Agency Collaboration Panel 3:45 pm
    Add to Calendar20230202 3:45 pm20230202 4:15 pmAmerica/DenverCyber Inter-Agency Collaboration Panel

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    150 West 500 South
    Salt Lake City, UT 84101

    .

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Jeff Collins
    Jeff Collins

    Jeff Collins

    SSA, FBI

    Collapse This Item

  • Cyber Executive Panel 4:35 pm
    Add to Calendar20230202 4:35 pm20230202 5:20 pmAmerica/DenverCyber Executive Panel

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    150 West 500 South
    Salt Lake City, UT 84101

    .

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Steve Gentry
    Steve Gentry

    Steve Gentry

    Chief Security Officer at Clari

    Glen Sorensen
    Glen Sorensen

    Glen Sorensen

    Information Security Officer at TwinStar Credit Union

    Brian Seamons
    Brian Seamons

    Brian Seamons

    Board Member at SL|CISO

    Sherrie Cowley
    Sherrie Cowley

    Sherrie Cowley

    Head of Security Operations at 3M Health Care

    Isaac Painter
    Isaac Painter

    Isaac Painter

    VP, IT & Security at Aumni

    Dan Bowden
    Dan Bowden

    Dan Bowden

    Global CISO at Marsh

    Josh Pugmire
    Josh Pugmire

    Josh Pugmire

    Head of Compliance and Information Security at Entrata

    Collapse This Item

  • Conference Closing Session 5:20 pm
    Add to Calendar20230202 5:20 pm20230202 5:30 pmAmerica/DenverConference Closing Session150 West 500 South
    Salt Lake City, UT 84101

    .

    Collapse This Item

  • Happy Hour Networking Reception 5:30 pm
    Add to Calendar20230202 5:30 pm20230202 6:30 pmAmerica/DenverHappy Hour Networking Reception 150 West 500 South
    Salt Lake City, UT 84101

    .

    Collapse This Item

Partners Register