Loading Events

« All Events

Denver (Cybersecurity)

August 30 @ 8:00 am - 5:00 pm

Event Navigation


August 30
8:00 am - 5:00 pm
Event Category:


The Curtis, a DoubleTree by Hilton
1405 Curtis Street CO 80202
United States
  + Google Map


About Our Event

The Denver Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cyber Security Strategies Conference.

8:45am - 9:15amSession One

Kyle Senescu
Sales Engineer


Speaker’s Bio:

Kyle is a Sales Engineer with LogRhythm focusing on Next Gen SIEM and cloud based UEBA.  Before moving over to sales, Kyle spent 5 years at LogRhythm consulting organizations on SIEM implementation, maintenance and best practices.  Kyle has worked with clients from small to medium businesses all the way up to fortune 500 organizations and helped dozens of organizations to successfully implement SIEM solutions and create security programs to meet a wide variety of use cases and business requirements.

9:15am - 9:45amSession Two

Erich Kron, CISSP
Security Awareness Advocate

Levers of Human Deception: The Science and Methodology Behind Social Engineering

No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.

Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, as he provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by car dealers, to sophisticated social engineering and online scams. Additionally, he’ll look at how to ethically use the very same levers when educating our users.

Key Takeaways:

  • The Perception vs. Reality Dilemma
  • Understanding the OODA (Observe, Orient, Decide, Act) Loop
  • How social engineers and scam artists achieve their goals by subverting OODA Loop’s different components
  • How we can defend ourselves and our organizations
9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

David Coleman
Senior Product Evangelist

An Overview of WLAN Security

As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.

So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:

  • The 5 tenets of WLAN security
  • Choosing the proper authentication and encryption model that doesn’t force user workarounds
  • Utilizing Private PSK technology
  • Device and user access control
  • Future challenges for Wi-Fi security and WPA3
10:45am - 11:15amSession Four

Mitch Webb

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:30pmSession Five
12:30pm - 12:45pmBreak / Vendor Booth Time
12:45pm - 1:15pmSession Six
1:15pm - 1:45pmSession Seven

Michael Dalton
Senior Identity Engineer


SecurID Access: Understanding Identity Assurance

From a technology standpoint, as a society the world of business has gone through two distinct stages in the evolution of its information security focus. The first addressed network-based protection and preventative controls such as firewalls and anti-virus. The second looked at data-centric and detective controls such as encryption and intrusion/extrusion monitoring. As breaches continue to occur at a record pace, what is needed today is a new evolution, one that pushes towards individual-focused security through granular user monitoring and management as provided by solutions such as Identity and Access Management. While IAM isn’t a new technology field, it is one whose time has come and CISOs need to begin investing in modern-day, lightweight, easy to implement IAM solutions now to stay ahead of the curve, and to reduce enterprise threats.

Speaker’s Bio:

Michael Dalton is a Sr Identity Engineer at RSA, the Security Division of Dell/EMC.  Over the past 25 years, his work as a security focused field sales engineer has provided a unique insight into common challenges and creative solutions available.

Michael published Network Computing magazine articles on Preparing for a Network Audit, Content Monitoring Suites to prevent Traffic Scams, Identity and Access Management product reviews and wrote the Audit and Monitoring section of the Syngress SSCP Study Guide. He lives in West Hartford, CT with his phenomenal wife Kim, sons Ben and Clark and loves to go hiking!

1:45pm - 2:00pmBreak / Vendor Booth Time
2:00pm - 2:30pmSession Eight

Bryan Lares
Director of Cybersecurity Products



Speaker’s Bio:

Bryan Lares is a seasoned enterprise technology executive with experience in corporate strategy, M&A, and product development. He has an extensive background building high growth businesses as both an executive at Dell Technologies and for his clients at global management consultancy Strategy&.

As head of cybersecurity business at SparkCognition, Lares is leading a team of engineers, data scientists, and threat intelligence experts to reinvent how enterprise and IoT devices are protected from global cyber threats.

2:30pm -2:45pmBreak / Vendor Booth Time
2:45pm - 3:15pmSession Nine
3:15pm - 3:45pmSession Ten

Tianyi Lu
Chief Architect

Cryptojacking and You

Download the Presentation

Speaker’s Bio:

Tianyi Lu is Chief Architect for VirtualArmour, a Managed Security Service Provider focusing on advanced networking and security. Before joining the vendor side, Tianyi held multiple high-level network architecture roles at ISPs, mobile operators, and SaaS providers. Tianyi currently works with large enterprises to securely build complex network infrastructures at internet scale. He is the youngest person to hold their JNCIE certification.

When Tianyi is not architecting cutting edge networks he can be found exploring the outdoors on foot or by bike. He is a avid photographer and loves to travel the globe.

3:45pm - 4:15pmSession Eleven