Loading Events

« All Events

  • This event has passed.

Salt Lake City (Cybersecurity)

March 8 @ 8:00 am - 3:00 pm

Event Navigation


March 8
8:00 am - 3:00 pm
Event Category:


Hilton Salt Lake City Center
255 South West Temple
Salt Lake City, UT 84101
United States
  + Google Map


The Salt Lake City Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

8:45am - 9:15amSession One

Ginny Turley
Sr. Vice President

9 Pitfalls To Avoid When Implementing an IAM Solution

IAM implementations are fraught with both technical and career challenges and dangers. In this 30-minute briefing, we’ll review some of the most common pitfalls encountered by teams implementing IAM solutions and review the best practices in order to avoid them – and be a hero.

9:15am - 9:45amSession Two

Alexandra Gates
Senior Product Marketing Manager

What Comes Next in Wi-Fi: Why Increasing Speed Isn’t Enough

Optimizing user mobile experience requires more than high speed Wi-Fi. IT professionals are facing challenges of capacity, flexibility, security, privacy, and visibility as they evaluate complex combinations of WLAN standards, management, and technology like MU-MIMO. This session covers 802.11ac and upcoming WLAN standards, iBeacons, and building robust wireless networks.

Speaker’s Bio:

Alexandra Gates is a Senior Product Marketing Manager at Aerohive Networks, where she helps define market strategy and vision for the cloud and WLAN products. She is a CWNA with a comprehensive background in wireless technology, including capacity and management planning, RF design, network implementation, and general industry knowledge.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

John Morton
Senior Sales Engineer

The History & Current State of Fileless Malware

Malware-free and fileless malware attacks are on the rise. Cybereason research shows that almost a quarter of organizations worldwide were victims of fileless malware attacks in the past year.

In this presentation, we’ll discuss the various mechanisms used by attackers and review effective approaches for detection & response. You’ll learn:

  • About fileless malware techniques, such as PowerShell and Windows Management Instrumentation (WMI)
  • Why these attacks are hard to detect & mitigate
  • How you can successfully detect & respond to such attacks

Speaker’s Bio:

John Morton is a Senior Sales Engineer at Cybereason. Having been on both sides of the fence, now as a solutions provider and previously as a practitioner for the US Navy & federal government, John is a veteran in merging day-to-day cybersecurity efforts – always protecting the endpoints and actively hunting for the threat.

10:45am - 11:15amSession Four

Amber Houston
Executive Account Manager

Why attackers love email and what you can do about it

Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?

In this session, you’ll learn:

  • How your email can be used as an entry point for multiple types of attack
  • The damaging impact attacks have on organizations
  • Why your employees could be the weakest link in your email security
  • How to enhance your email security and thus your overall cyber resilience
11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Shelby Mastovich
Account Executive

State of the Phish™ 2018: – What Your Peers Are Doing to Reduce Successful Phishing Attacks

Hear key findings from the 2018 State of the Phish™ Report. In this session you will gain insight into current vulnerabilities, industry-specific phishing metrics, and emerging threats. This collection of data is taken from tens of millions of simulated phishing attacks sent through Wombat’s Security Education Platform over a 12-month period, responses from quarterly surveys, and an international survey of working adults who were queried about social engineering threats and their cybersecurity behaviors.

Download the Presentation

12::15pm - 12:30pmVendor Break / Booth Time
12:30pm - 1:00pmSession Six

Sean Hoekzema
Territory Manager

Kevin Wen
Sales Engineer


Cyber Exposure – The Next Frontier

The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join us for a discussion on how companies can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.

Download the Presentation

1:00pm - 1:30pmSession Seven

Ken Liao
VP Product Management

Cybercrime Tactics and Techniques: The State of Malware

1:30pm - 1:45pmVendor Break / Booth Time
1:45pm - 2:15pmSession Eight

Justin Strong
Account Manager

Win Big with IT Resilience

In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.

2:15pm - 2:30pmBreak / Vendor Booth Time
Prize Drawings for All in Attendance
2:30pm - 3:00pmSession Nine


Troy Drewry
Product Manager, Micro Focus


Future-proofing Multi-Factor Authentication

Are your remote access needs growing or becoming more diverse? Are you having challenges supporting access from a variety of devices? How do you make sure that their policies are consistent? Do multiple authentication policies create a security risk for your organization? We’ll address these questions and more during our session.

Prize Drawings for All in Attendance