Salt Lake City (Cybersecurity)
March 8 @ 8:00 am - 5:00 pm
The Salt Lake City Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Sr. Vice President
9 Pitfalls To Avoid When Implementing an IAM Solution
IAM implementations are fraught with both technical and career challenges and dangers. In this 30-minute briefing, we’ll review some of the most common pitfalls encountered by teams implementing IAM solutions and review the best practices in order to avoid them – and be a hero.
Senior Product Marketing Manager
What Comes Next in Wi-Fi: Why Increasing Speed Isn’t Enough
Optimizing user mobile experience requires more than high speed Wi-Fi. IT professionals are facing challenges of capacity, flexibility, security, privacy, and visibility as they evaluate complex combinations of WLAN standards, management, and technology like MU-MIMO. This session covers 802.11ac and upcoming WLAN standards, iBeacons, and building robust wireless networks.
Alexandra Gates is a Senior Product Marketing Manager at Aerohive Networks, where she helps define market strategy and vision for the cloud and WLAN products. She is a CWNA with a comprehensive background in wireless technology, including capacity and management planning, RF design, network implementation, and general industry knowledge.
Senior Sales Engineer
The History & Current State of Fileless Malware
Malware-free and fileless malware attacks are on the rise. Cybereason research shows that almost a quarter of organizations worldwide were victims of fileless malware attacks in the past year.
In this presentation, we’ll discuss the various mechanisms used by attackers and review effective approaches for detection & response. You’ll learn:
- About fileless malware techniques, such as PowerShell and Windows Management Instrumentation (WMI)
- Why these attacks are hard to detect & mitigate
- How you can successfully detect & respond to such attacks
John Morton is a Senior Sales Engineer at Cybereason. Having been on both sides of the fence, now as a solutions provider and previously as a practitioner for the US Navy & federal government, John is a veteran in merging day-to-day cybersecurity efforts – always protecting the endpoints and actively hunting for the threat.
Why attackers love email and what you can do about it
Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
VP Product Management
Cybercrime Tactics and Techniques: The State of Malware
Product Manager, Micro Focus
Future-proofing Multi-Factor Authentication
Are your remote access needs growing or becoming more diverse? Are you having challenges supporting access from a variety of devices? How do you make sure that their policies are consistent? Do multiple authentication policies create a security risk for your organization? We’ll address these questions and more during our session.