Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:00 am - 8:30 am
Session One8:30 am - 9:00 am
For over the past 10 years Steven has built and matured security operations, and hunt teams for companies across the globe.
Steven Wimmer has provided strategic and operational consulting to over 20 companies globally, including end to end SOC builds, hunt teams, and incident response. Prior to his role as Senior Technical Account Manager at Respond Software, Steven worked on developing hunt operations and cyber intelligence services at HP Enterprise.
Steven is a seasoned cyber security veteran with a focus on developing and improving security operations in all verticals.
Session Two9:00 am - 9:30 am
Segmentation Made Simple
Most networks are really good at making you feel overwhelmed , ill-equipped and exposed. Meanwhile, you’re being tasked with connecting virtually every ‘ thing’, including machines and endpoints never intended to be networked. How can you securely connect such a wide array of distributed systems, devices and equipment, at scale?
The practical way forward is networking endpoints with provable identities, using automated, policy-based orchestration for enterprise scale. Now, local and wide area micro-segmentation is not only possible, but simple.
As more machines require secure connectivity, networking seems to have become a black-magic, since it’s impossible to give every device its own unique IP address. There are an assortment of workarounds using multi-NAT environments, or Carrier Grade Nat, but it’s now virtually impossible to punch through and connect distributed systems. IP address limitations are prohibitive, making functions such as cloud peering between VPCs virtually impossible.
In this session, you’ll learn how to overcome previously impossible networking hurdles by giving your machines and endpoints a unique and provable identity. You can now easily and instantly provision, connect, failover or guaranteeing any connected resource using simple point-and-click orchestration for all of your “things” – on the ground, on the move, or in the cloud.
Robert Kern is a Regional Sales Director for Tempered Networks with nearly thirty years of experience providing network and security solutions for customers in multiple market verticals throughout the central United States as well as Mexico.
Robert has tenure with several notable and innovative companies, including SynOptics (Bay Networks) and F5 Networks. With his pioneering attitude and keen sense of business, Robert was instrumental in bringing their disruptive solutions to market.
Based in Dallas, Robert has cultivated long-standing relationships with Fortune 500 accounts, from oil and gas to global transportation companies, and is well-respected for his ability to map solutions to meet critical business challenges.
His other interests include a passion for restoring and collecting Pontiac muscle cars, raising funds for wounded veterans, and working on family ancestry.
Break9:30 am - 10:00 am
Break / Vendor Booth Time
Session Three10:00 am - 10:30 am
Sophos EDR – Add Expertise, Not Headcount
Just under a year ago, Anthony joined the Sophos family after being in the tech space for the past 18 years. Anthony came to us from the public sector, where he spent seven (7) years, of which the last two and a half (2.5) years he was the Chief Technical Architect out of the CTO’s Office, for the Department of Technology Services with the State of Utah. Prior to his State employment, Anthony worked as an IT Consultant, a Home Technology Integrator and served 7 years in the Australian Army (full-time) as a Telecommunications Engineer. Anthony discharged from the Australian Army in 2008 to pursue new opportunities in the United States. Anthony is the Sophos Channel Sales Engineer for Utah and New Mexico.
Session Four10:30 am - 11:00 am
A new approach to email security for Office 365
For hackers, Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Todd Howard is an experienced cybersecurity adviser with more than 10 years’ experience helping protect companies against the most sophisticated known and unknown threats. His pedigree spans across a multitude of well-known firms, such as Symantec, McAfee, Websense, and most recently Vade Secure. He is passionate about representing a true world-class product so he can set the course for excellence for his customers, enabling them to have visibility, predictability, thus creating successful repeatable processes.
Lunch11:00 am - 11:30 am
Break / Vendor Booth Time / Lunch
Keynote Session11:30 am - 12:30 pm
Supervisory Special Agent Jeffrey Collins joined the FBI in 2009. He is currently the supervisor for the Salt Lake City Cyber Task Force. He has worked in Honolulu, FBI Headquarters, and Salt Lake City. He was the primary investigator of the Mariposa botnet, which caused approximately a billion dollars in worldwide damages. He has subject matter expertise in the dark web and matters affecting the financial industry. He has traveled to 36 countries and trained foreign law enforcement and prosecutors on cyber investigative matters. In addition to his cyber work, SA Collins was a SWAT team operator for four years. He holds a Master of Science degree in Computer Information Systems with a security concentration. He is the recipient of the Hawaii Law Enforcement Officer of the Year, Microsoft Global Hero, and the FBI Director’s awards.
Break12:30 pm - 1:00 pm
Break / Vendor Booth Time
Session Six1:00 pm - 1:30 pm
Navigating the Noise – How to Evaluate and Select a Managed Detection and Response (MDR) Provider
Managed Detection and Response (MDR) is a hot topic in cybersecurity today — these four words describe a singular solution that means so many things to different people. Despite differing definitions and viewpoints, the end goal is to keep your environment safe from advanced adversaries and undetected threats.
Secureworks suggests that any MDR provider be evaluated first and foremost on the following five key areas. Any solution without this suite of capabilities is not MDR, no matter what you call it.
- Endpoint Detection and Response
- Incident Response Capabilities
- Intellectual Property
- Beyond Endpoints
- Global Threat Visibility and Threat Intelligence
MDR can be a nebulous label with a definition that depends on who you ask. Secureworks uses telemetry from a variety of sources, including infrastructure, network and endpoint devices, and also can take response actions across different devices. Machine learning and artificial intelligence help identify anomalous events and continuous threat hunting with specialized capabilities.
In this session, Ryan Heath will walk through the 5 key components of a robust MDR solution and give guidance on what to look for as you evaluate the viability of MDR in your organization.
Session Seven1:30 pm - 2:00 pm
The Evolution of IRM: Protecting Sensitive Data In Today’s Collaborative, Digital Economy
In order to do business today, organizations have to externally collaborate & share data. Traditional security has struggled with how to easily address this – whether with onprem or cloud collaboration repositories, such as OneDrive or Box.
IRM, or Information Rights Management, has evolved so business’ can easily secure, track & monitor their data anywhere it travels – and revoke it back in real-time! Learn how this space is changing to adapt to the collaborative, digital economy we do business in today – and why traditional security is only able to fulfill part of the requirement.
Break2:00 pm - 2:20 pm
Break / Vendor Booth Time
Session Eight2:20 pm - 2:50 pm
The Human Firewall Is On Fire
What Do You Do When The Smoke Clears?
Adam has been in the IT solutions world for 10+ years and has provided expert guidance with cloud adoption projects, software asset management, and helping organizations create a cyber resilience for e-mail strategy. Although based in Denver, Adam travels throughout the central and west regions to meet with partners and customers to help increase the need for industry leading e-mail security, continuity, and archiving.
Session Eleven4:00 pm - 4:20 pm
DDoS: Updates from the Battlefield
What is the state of DDoS, as observed by network and security professionals directly responsible for operating and securing global networks?
Distributed denial-of-service attacks have morphed from being political statements to a diversionary tactic while other forms of attacks are occurring.
Recent changes in the characteristics of DDoS attacks and understanding the newest threats to environments
Mike Boose currently serves as a Channel Sales Engineer, supporting Arbor Networks’ Central and Western regions. Having served in similar positions across a number of top vendor organizations from network security, forensics, incident response, malware discovery / sandboxing, and security analytics.
Mike is able to draw from his years of experience to devise and relate to custom security solutions for any scenario.
CISO PANEL4:20 pm - 5:00 pm
Moderator- Dan AndersonCISO & CEOMark V Security
Kate RileyDirector of Information Security and ComplianceBraintrace
Matt SorensenChief Information Security OfficerSecuvant
Navpreet JatanaDeputy Chief Information Security OfficerZions Bancorporation
Matt ChristensenDirector of CybersecurityIntermountain Healthcare
8:00 pm - 5:00 pm75 S W TempleSalt Lake City, UT 84101801-531-0800