- This event has passed.
August 30 @ 8:00 am - 5:00 pm
About Our Event
The Denver Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Threat Lifecycle Management
Today’s reality is that your organization will continue to be confronted by increasingly frequent and complex cyber threats.
The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to monitor and search across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? Faster time to detect and time to respond, without adding staff to accomplish the job.
Kyle is a Sales Engineer with LogRhythm focusing on Next Gen SIEM and cloud based UEBA. Before moving over to sales, Kyle spent 5 years at LogRhythm consulting organizations on SIEM implementation, maintenance and best practices. Kyle has worked with clients from small to medium businesses all the way up to fortune 500 organizations and helped dozens of organizations to successfully implement SIEM solutions and create security programs to meet a wide variety of use cases and business requirements.
Erich Kron, CISSP
Security Awareness Advocate
Levers of Human Deception: The Science and Methodology Behind Social Engineering
No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.
Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, as he provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by car dealers, to sophisticated social engineering and online scams. Additionally, he’ll look at how to ethically use the very same levers when educating our users.
- The Perception vs. Reality Dilemma
- Understanding the OODA (Observe, Orient, Decide, Act) Loop
- How social engineers and scam artists achieve their goals by subverting OODA Loop’s different components
- How we can defend ourselves and our organizations
An Overview of WLAN Security
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.
So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:
- The 5 tenets of WLAN security
- Choosing the proper authentication and encryption model that doesn’t force user workarounds
- Utilizing Private PSK technology
- Device and user access control
- Future challenges for Wi-Fi security and WPA3
A new approach to email security
Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.
Win Big with IT Resilience
In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.
SecurID Access: Understanding Identity Assurance
From a technology standpoint, as a society the world of business has gone through two distinct stages in the evolution of its information security focus. The first addressed network-based protection and preventative controls such as firewalls and anti-virus. The second looked at data-centric and detective controls such as encryption and intrusion/extrusion monitoring. As breaches continue to occur at a record pace, what is needed today is a new evolution, one that pushes towards individual-focused security through granular user monitoring and management as provided by solutions such as Identity and Access Management. While IAM isn’t a new technology field, it is one whose time has come and CISOs need to begin investing in modern-day, lightweight, easy to implement IAM solutions now to stay ahead of the curve, and to reduce enterprise threats.
Michael Dalton is a Sr Identity Engineer at RSA, the Security Division of Dell/EMC. Over the past 25 years, his work as a security focused field sales engineer has provided a unique insight into common challenges and creative solutions available.
Michael published Network Computing magazine articles on Preparing for a Network Audit, Content Monitoring Suites to prevent Traffic Scams, Identity and Access Management product reviews and wrote the Audit and Monitoring section of the Syngress SSCP Study Guide. He lives in West Hartford, CT with his phenomenal wife Kim, sons Ben and Clark and loves to go hiking!
Manager of Systems Engineering
Delivering Integrated Cyber Defense in the Cloud Generation
Hackers are finding new ways to steal data and infiltrate organizations daily. Integrated Cyber Defense helps you improve security, reduce complexity, and lower cost. Jereme Lee, Manager of Systems Engineering at Symantec, will discuss the inherent challenges affecting integrated cyber defense in the cloud generation including pressures of multiple environments, budget, traffic visibility, and cloud architecture.
Key Takeaway- Understand the blueprint for unifying cloud and on-premises security to provide advanced threat protection and information protection across all endpoints, networks, email, and cloud applications.
Cryptojacking and You
Tianyi Lu is Chief Architect for VirtualArmour, a Managed Security Service Provider focusing on advanced networking and security. Before joining the vendor side, Tianyi held multiple high-level network architecture roles at ISPs, mobile operators, and SaaS providers. Tianyi currently works with large enterprises to securely build complex network infrastructures at internet scale. He is the youngest person to hold their JNCIE certification.
When Tianyi is not architecting cutting edge networks he can be found exploring the outdoors on foot or by bike. He is a avid photographer and loves to travel the globe.
Autonomous Cyber Defense: AI and the Immune System Approach
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network – before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
In this session, learn:
- How new machine learning and mathematics are automating advanced cyber defense
- Why full network visibility allows you to detect and autonomously respond to threats
- How smart prioritization and visualization of threats allows for better resource allocation and lower risk
- Real-world examples of unknown threats detected by ‘immune system’ technology
Sppencer Eppstein is a Cyber Security Account Executive at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from financial services to legal services, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autonomously responding to early-stage cyber-threats. Eppstein graduated with a bachelor’s degree from Yeshiva University in New York City and is based out of Darktrace’s Denver office.