- This event has passed.
Salt Lake City (Cybersecurity)
March 8 @ 8:00 am - 3:00 pm
The Salt Lake City Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Sr. Vice President
9 Pitfalls To Avoid When Implementing an IAM Solution
IAM implementations are fraught with both technical and career challenges and dangers. In this 30-minute briefing, we’ll review some of the most common pitfalls encountered by teams implementing IAM solutions and review the best practices in order to avoid them – and be a hero.
Senior Product Marketing Manager
What Comes Next in Wi-Fi: Why Increasing Speed Isn’t Enough
Optimizing user mobile experience requires more than high speed Wi-Fi. IT professionals are facing challenges of capacity, flexibility, security, privacy, and visibility as they evaluate complex combinations of WLAN standards, management, and technology like MU-MIMO. This session covers 802.11ac and upcoming WLAN standards, iBeacons, and building robust wireless networks.
Alexandra Gates is a Senior Product Marketing Manager at Aerohive Networks, where she helps define market strategy and vision for the cloud and WLAN products. She is a CWNA with a comprehensive background in wireless technology, including capacity and management planning, RF design, network implementation, and general industry knowledge.
Senior Sales Engineer
The History & Current State of Fileless Malware
Malware-free and fileless malware attacks are on the rise. Cybereason research shows that almost a quarter of organizations worldwide were victims of fileless malware attacks in the past year.
In this presentation, we’ll discuss the various mechanisms used by attackers and review effective approaches for detection & response. You’ll learn:
- About fileless malware techniques, such as PowerShell and Windows Management Instrumentation (WMI)
- Why these attacks are hard to detect & mitigate
- How you can successfully detect & respond to such attacks
John Morton is a Senior Sales Engineer at Cybereason. Having been on both sides of the fence, now as a solutions provider and previously as a practitioner for the US Navy & federal government, John is a veteran in merging day-to-day cybersecurity efforts – always protecting the endpoints and actively hunting for the threat.
Executive Account Manager
Why attackers love email and what you can do about it
Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
State of the Phish™ 2018: – What Your Peers Are Doing to Reduce Successful Phishing Attacks
Hear key findings from the 2018 State of the Phish™ Report. In this session you will gain insight into current vulnerabilities, industry-specific phishing metrics, and emerging threats. This collection of data is taken from tens of millions of simulated phishing attacks sent through Wombat’s Security Education Platform over a 12-month period, responses from quarterly surveys, and an international survey of working adults who were queried about social engineering threats and their cybersecurity behaviors.
Cyber Exposure – The Next Frontier
The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join us for a discussion on how companies can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.
VP Product Management
Cybercrime Tactics and Techniques: The State of Malware
Win Big with IT Resilience
In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.
Future-proofing Multi-Factor Authentication
Are your remote access needs growing or becoming more diverse? Are you having challenges supporting access from a variety of devices? How do you make sure that their policies are consistent? Do multiple authentication policies create a security risk for your organization? We’ll address these questions and more during our session.