
Conference
Denver
Cybersecurity Conference
Join the Denver Cybersecurity Conference to connect with your fellow cybersecurity professionals and industry experts for live, in-person sessions. Topic will range from cloud security to protecting your organization from advanced threat actors. You’ll hear from industry experts and luminaries, as well as representatives from some of the world’s top cybersecurity solutions providers.
Attendees will hear from insightful keynotes on vital security topics and learn the skills needed to stay ahead of cyber threats, all while networking with peers at the Denver Cybersecurity Conference!
Take a look at all Data Connectors has to offer here!
Date
Thu. Mar 16
-
Featured Speakers
Hadas Cassorla
Keynote Presentation: Hadas Cassorla
Donna GregoryGuest Keynote Presentation: Donna Gregory
Mike WrightGuest Keynote: Mike Wright
Donna GregoryCyber Inter-Agency Collaboration Panel
Shawn GraffCyber Inter-Agency Collaboration Panel
Charlie BeansCyber Inter-Agency Collaboration Panel
Monti Knode – USAFCyber Inter-Agency Collaboration Panel
Lee SchoenikeCyber Inter-Agency Collaboration Panel
Michael WrightCyber Executive Panel
Craig HurterCyber Executive Panel
Trent BunnellCyber Executive Panel
Douglas BrushCyber Executive Panel
Steve WinterfeldCyber Executive Panel
Al GardnerCyber Executive Panel
Event Schedule
Times for this Event are in Mountain Time (MDT/MST).
The Conference will be open from 8:00 AM to 6:30 PM Thursday, March 16th .
- Welcome / Introductions
-
From Reactive to Proactive: Exploring the Future of Cybersecurity 8:30 am
As the digital landscape evolves, so do the threats to our cybersecurity. It’s no longer enough to react to attacks as they happen; we must be proactive in our approach to defending our digital assets. In this presentation, we’ll explore the future of cybersecurity and how we can stay ahead of the curve. We’ll examine the latest trends and technologies in managed security services and discuss how these tools can help to identify and respond to threats in real-time, as well as how they can be integrated into a comprehensive security strategy. Whether you’re an IT professional, business owner, or concerned citizen, this presentation will provide you with valuable insights into the rapidly changing world of cybersecurity and how to stay safe in the digital age.
Speaker:
-
So long, thanks for all the phish! 8:50 am
“This is Kevin from IT. I need you to provide me the code that was just sent to your phone so I can provide you with new software.” Mitigate social engineering attacks by removing passwords and passcodes for your users. Learn how you can use technologies like WebAuthn to harden your identity strategy.
Speaker:
-
4G/5G Network Security 9:45 am
Protecting organizational infrastructure, networks, and hardware devices is a never ending pursuit these days. There is a secure network solution that offers a simple to manage alternative to complex VPN infrastructures for securely connecting sites, vehicles, IoT, and remote workers. This session will cover how to secure remote sites with ease, reduce attack surfaces by building undiscoverable network resources, and how to provide any-to-any connectivity. Learn how to unlock operational agility through built-in tunnel orchestration and simplified configuration. It’s all about end-to-end WAN and network security services that tightly integrate with routing and security devices to establish encrypted connections to access applications and resources in the cloud or data center.
Speaker:
-
Developing robust predictive modeling capabilities and reviewing opportunities within TPRM 10:15 am
Understanding our third parties and the risks they pose is becoming an existential part of managing corporate risk. As the average number of third parties used by companies increases, the burden to gather this information has become overwhelming. The risk has never been higher, with over 63% of all breaches linked directly to a third party vendor. The traditional way of gathering assessments is too slow;relying on outside in scanning is insufficient. Using the world’s largest exchange of cybersecurity risk assessments, the power of risk monitoring and cutting edge machine learning technology, CyberGRX has created Predictive Assessments. On day 1, view detailed risk data for your third parties and shift the conversation from data gathering, to risk management. Prevent a breach by actually managing risk.
Speaker:
-
2023 Trends & Directions 10:35 am
If 2022 taught us anything, it’s that cybercriminals are still coming up with new ways to cash in. But with a new year upon us, what can we anticipate for 2023?
Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2023 with a security strategy that will set you up for success during this insightful discussion.
Panel Participants:
-
The State of Fortune 500 Attack Surface Threats: What You Should Know + TakeawaysIn 11:25 am
Cyberpion’s 2022 research, we discovered 148,000 critical vulnerabilities across Fortune 500 organizations. Security leaders face an onslaught of vulnerabilities. In 2021 alone, 18,378 new vulnerabilities were reported. As enterprises become increasingly hyper-connected and internet-facing, the expanding attack surface is a top security concern.
Speaker:
-
State of the Threat 11:45 am
A host of new and evolving threats has the industry on high alert. Organizations are often unprepared to handle communications for security incidents, resulting in role confusion, delays in processing or conflicting messaging. Join Secureworks to discuss insights into emerging threats and developing trends.
Speaker:
- Lunch Break
-
Lunch Demo: ColorTokens - Unified Zero Trust Platform 12:20 pm
The industry’s only platform that offers comprehensive Zero Trust cybersecurity coverage across, cloud, containers, micro-services, hybrid, on-premise, data center and remote users – powered by CokenToken’s innovation, agility and execution.
Speaker:
- Lunch Demo: Darktrace Cyber AI Loop 12:30 pm
-
Keynote Presentation: Hadas Cassorla 12:40 pm
Nobody Cares That You Can Do Your Job: And How To Fix That
A pervasive problem in our industry is that no one thinks the executives or board understand or care about security. That leaves leaders and teams feeling disconnected and ineffective. This keynote will provide the tools and solution on how to tell the security story so that you are better heard and more successful.
Speaker:
-
The Future of Identity and Risk Management in Cloud and Hybrid Environments 1:30 pm
Over the past decades, identity management and access governance has come to refer to managing and controlling access to
applications within an organization. This includes establishing policies and procedures for granting, revoking and auditing access to ensure compliance within security standards. How do you successfully implement a governance program, what are common pitfalls to avoid, and what
happens when an organization must manage multiple ERP systems across a combination of SaaS and on-premise applications? Join us to discuss.
Speakers:
-
Overlooked entry point: preventing supply chain and insider threat attacks 1:50 pm
Moti Shkolnik, Firedome’s CEO will share market trends into the most commonly overlooked entry point to supply chain and insider threat attacks. Based on unique research as an attacker in the field for 15 years, this session will address attacker tactics and explore the unique challenges of securing IoT devices deployed in enterprises to prevent organizational attacks.
Speaker:
-
The Attacker's Value Proposition 2:30 am
What motivates cyber hackers? They are looking to find value in their victims, whether organizations or individuals, often repeatedly. Let’s explore the Attacker’s Value Proposition, the Defender’s Dilemma, and how understanding the attacker’s motivation can help protect organizations from future attacks.
Speaker:
-
Guest Keynote Presentation: Donna Gregory 2:50 pm
FBI IC3: US Cybercrime Reporting (a.k.a. Follow the Money)
Since 2000, the FBI’s Internet Crime Complaint Center (IC3) has received complaints crossing a wide array of cybercrime matters. Cybercrime data collection and analysis not only identifies trends, but enables efforts to control, reduce, mitigate, and prevent cybercrime. In this discussion, Donna Gregory, Unit Chief for the FBI Cyber Division, IC3 will explain more about their mission to provide the public with a reliable and convenient reporting mechanism to submit information to the FBI, the categories of cybercrime, types of cybercrime data collected, criteria used to measure cybercrime, and how these crimes interoperate with other cybercrime activities.
Speaker:
-
Guest Keynote: Mike Wright 3:40 pm
From the Server Room to the Board Room
In today’s information economy, more people are working in highly technical fields than ever before. As these cybersecurity analysts, system administrators, and software engineers move up in the corporate ranks, many find the transition from subject matter expert to leader difficult. Join Mike Wright as he shares what he has learned about people leadership, strategic leadership, and moving from the server room to the board room.
Speaker:
-
Cyber Inter-Agency Collaboration Panel 4:10 pm
Moderator:
Panel Participants:
-
Cyber Executive Panel 4:55 pm
Moderator:
Panel Participants:
- Conference Closing Session 5:25 pm
- Happy Hour Networking Reception 5:30 pm
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibitor Partners
Affiliate Partners