Data Connectors is proud to host the Cybersecurity Strategies Conference.
8:15 am - 5:00 pm75 S W TempleSalt Lake City, UT 84101801-531-0800
CHECK-IN AND OPENING INTRODUCTIONS
Session One8:45 am - 9:15 am
About Respond Software
Respond Software delivers instant ROI to organizations in their battle against cyber crime. With its patent-pending intelligent decision engine, PGO, Respond Software’s product uniquely combines the best of human expert judgement with the scale, thoroughness, and consistency of software. This quick-to-implement, cyber-security decision automation software delivers the equivalent of a virtual, best-of-breed analyst team that dramatically increases capacity and improves monitoring and triage capabilities at a fraction of the cost.
Respond Software was founded in 2016 by security and software industry veterans.
Session Two9:15 am - 9:45 amRobert KernDirector, Regional Sales
Segmentation Made Simple
Most networks are really good at making you feel overwhelmed , ill-equipped and exposed. Meanwhile, you’re being tasked with connecting virtually every ‘ thing’, including machines and endpoints never intended to be networked. How can you securely connect such a wide array of distributed systems, devices and equipment, at scale?
The practical way forward is networking endpoints with provable identities, using automated, policy-based orchestration for enterprise scale. Now, local and wide area micro-segmentation is not only possible, but simple.
As more machines require secure connectivity, networking seems to have become a black-magic, since it’s impossible to give every device its own unique IP address. There are an assortment of workarounds using multi-NAT environments, or Carrier Grade Nat, but it’s now virtually impossible to punch through and connect distributed systems. IP address limitations are prohibitive, making functions such as cloud peering between VPCs virtually impossible.
In this session, you’ll learn how to overcome previously impossible networking hurdles by giving your machines and endpoints a unique and provable identity. You can now easily and instantly provision, connect, failover or guaranteeing any connected resource using simple point-and-click orchestration for all of your “things” – on the ground, on the move, or in the cloud.
Robert Kern is a Regional Sales Director for Tempered Networks with nearly thirty years of experience providing network and security solutions for customers in multiple market verticals throughout the central United States as well as Mexico.
Robert has tenure with several notable and innovative companies, including SynOptics (Bay Networks) and F5 Networks. With his pioneering attitude and keen sense of business, Robert was instrumental in bringing their disruptive solutions to market.
Based in Dallas, Robert has cultivated long-standing relationships with Fortune 500 accounts, from oil and gas to global transportation companies, and is well-respected for his ability to map solutions to meet critical business challenges.
His other interests include a passion for restoring and collecting Pontiac muscle cars, raising funds for wounded veterans, and working on family ancestry.
Session Three10:15 am - 10:45 amAnthony BooyseChannel Sales Engineer
Sophos EDR – Add Expertise, Not Headcount
Just under a year ago, Anthony joined the Sophos family after being in the tech space for the past 18 years. Anthony came to us from the public sector, where he spent seven (7) years, of which the last two and a half (2.5) years he was the Chief Technical Architect out of the CTO’s Office, for the Department of Technology Services with the State of Utah. Prior to his State employment, Anthony worked as an IT Consultant, a Home Technology Integrator and served 7 years in the Australian Army (full-time) as a Telecommunications Engineer. Anthony discharged from the Australian Army in 2008 to pursue new opportunities in the United States. Anthony is the Sophos Channel Sales Engineer for Utah and New Mexico.
Session Four10:45 am - 11:15 amTodd HowardRegional Manager – West
A new approach to email security for Office 365
For hackers, Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Todd Howard is an experienced cybersecurity adviser with more than 10 years’ experience helping protect companies against the most sophisticated known and unknown threats. His pedigree spans across a multitude of well-known firms, such as Symantec, McAfee, Websense, and most recently Vade Secure. He is passionate about representing a true world-class product so he can set the course for excellence for his customers, enabling them to have visibility, predictability, thus creating successful repeatable processes.
Keynote Session11:45 pm - 12:45 pmSupervisory Special Agent Jeff CollinsFBI, Salt Lake City Division
Supervisory Special Agent Jeffrey Collins joined the FBI in 2009. He is currently the supervisor for the Salt Lake City Cyber Task Force. He has worked in Honolulu, FBI Headquarters, and Salt Lake City. He was the primary investigator of the Mariposa botnet, which caused approximately a billion dollars in worldwide damages. He has subject matter expertise in the dark web and matters affecting the financial industry. He has traveled to 36 countries and trained foreign law enforcement and prosecutors on cyber investigative matters. In addition to his cyber work, SA Collins was a SWAT team operator for four years. He holds a Master of Science degree in Computer Information Systems with a security concentration. He is the recipient of the Hawaii Law Enforcement Officer of the Year, Microsoft Global Hero, and the FBI Director’s awards.
Session Seven1:30 pm - 2:00 pm
The Vera Platform gives developers the power to build advanced data security and control into any business application, extending protections beyond the borders of an organization. Leverage our SDK and REST APIs to encrypt, track, and revoke access to files, and give your security team complete visibility over how confidential information is used, and the tools to manage access anywhere it travels.
Session Eight2:15 pm - 2:45 pm
Security breaches, data leaks and email-based attacks are a real threat to your organization. Now, more than ever, you need a new approach to email security and management. Don’t let the limitations of traditional technologies prevent you from protecting email and corporate information.
We have made it our mission to mitigate the risks you face from email, and support you in reducing the cost and complexity of protecting yourself by moving this workload to the cloud. We live and breathe cloud technology. We developed our proprietary cloud architecture to offer you comprehensive email security, service continuity and archiving in a single subscription service. Our goal is to make it easier for you to protect your business in today’s fast-changing security and risk environment.
Session Nine3:00 pm - 3:30 pm
Founded in 1982, Symantec has evolved to become the global leader in cyber security, with more than 11,000 employees in more than 35 countries. Operating one of the world’s largest cyber intelligence networks, we see more threats, and protect more customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives.