Event Schedule

Times for this Event are in Mountain Time (MDT/MST)

The Summit will be open from 8AM to 6PM.

  • Welcome
  • Disrupting Lateral Movement by Securing Active Directory 9:05 am

    Presented by Attivo

    Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. A common tactic among most of these Ransomware and Advanced Threat Actors today involves leveraging Active Directory.  AD contains all of the information that an attacker needs to successfully move laterally and accomplish their mission. 

     In this session, Tom Atkins will explore a new method for securing Active Directory that can (for the first time) actually prevent an attacker from progressing laterally through your enterprise network.  Some key highlights include:

    • How Threat Actors use AD to accomplish their goals
    • Why Monitoring Active Directory is not enough
    • What simple tools you can deploy to dramatically improve your security posture by better securing AD
    Click to Expand

    Panel Participants:

    Tom Atkins
    Tom Atkins

    Tom Atkins

    Area VP

    Collapse This Item

  • Tackling User Behavior Head-On 9:30 am

    Presented by Proofpoint

    Today’s popular attacks like phishing, credential compromise, and business email compromise have one thing in common: they need people to work. InfoSec professionals add technology on top of technology, but still the problems persist. How do you take people from the weakest link to active defenders of your organization? Based on our experiences with tens of millions of users, we’ll share with you best practices, strategies, and benchmarks to be successful. 

    Join our presentation to learn about: 

    • Best practices for running an effective security awareness program 
    • Strategies for driving behavior change and improving security culture 
    • Benchmarks for making real impacts to your risk posture
    Click to Expand

    Panel Participants:

    Mike Bailey
    Mike Bailey

    Mike Bailey

    Senior Product Manager

    Collapse This Item

  • THE LAST LINE OF DEFENSE: DATA PROTECTION 10:10 am

    Presented by Pure Storage

    With the growth of Ransomware and cybercrime, Data protection is experiencing a resurgence. Organizations are quickly having to modernize their data protection architecture and strategies to meet not only these demands but also the demand that digital transformation is placing upon them; current approaches are designed around a backup centric approach, whereas a new approach centered around restore and getting organizations back up and running as quickly as possible are critical. Join this session to learn about the latest innovations in the data protection space and how they can be implemented to provide a restore centric approach and provide a true last line of defense. 

    Click to Expand

    Panel Participants:

    David Huskisson
    David Huskisson

    David Huskisson

    Rapid Restore Solutions Lead

    Collapse This Item

  • Subject Matter Expert Session - More Details To Come 10:30 am

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • Expert Panel Discussion: DevOps & The Cloud 10:45 am

    DevOps Security and the Cloud

    DevOps enables you to release features and bug fixes faster than ever before. However, traditional security activities can’t seem to keep up with this fast-paced tempo. How can you make sure security doesn’t get left behind? Ignoring security bugs won’t make them go away. Slowing down the DevOps team isn’t an option. How can we make DevOps, and DevSecOps work well in the fast-paced cloud environment we live in?

    I think the challenges with devops fall into a couple buckets—

    Click to Expand

    Collapse This Item

  • Rethinking data protection in the age of ransomware 11:30 am

    Presented by Zerto

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist

    Collapse This Item

  • Latest network-layer DDoS trends and the rise of ransom-driven attacks 11:50 am

    Presented by Cloudflare

    Unprecedented changes in how people live and work around the world since the COVID-19 pandemic led to changing patterns of Internet usage. And as our reliance on the Internet surged, so did the frequency, sophistication, and distribution of cyberattacks. 

    In this talk, Cloudflare’s Head of Solution Engineering will discuss the latest DDoS attack trends observed over Cloudflare’s network. Join this talk to understand:

    • Key trends and shifts in the DDoS landscape
    • Ransom-based attacks: what are they and how to respond?
    • Steps organizations can take to better protect their networks
    Click to Expand

    Panel Participants:

    Trey Guinn
    Trey Guinn

    Trey Guinn

    Head of Solution Engineering

    Collapse This Item

  • Lunch Break
  • Keynote: Evolving Nature of CyberCrime in the Southwest 12:45 pm

    U.S. Secret Service Supervisory Special Agent Ingrid Rush will be shedding light on the work of the agency alongside the Arizona Cybersecurity Task Force, and their efforts to protect organizations and individuals from cyber criminals across the Southwest. Calling upon her years of experience in the agency, particularly in her role as a digital forensics examiner, she will offer guidance on managing and mitigating cyber incidents.

    During her talk, SSA Rush will provide insight on how organizations can prepare for all types of attacks, including Phishing, Ransomware, and Business Email Compromise (BEC), with a particular focus on the threats facing the greater Phoenix area. From her post in the Phoenix Field Office, Rush will take questions from the community, as well as provide her thoughts on how companies can work with government organizations like the Secret Service to stay on top of cyber threats.

    Click to Expand

    Panel Participants:

    Ingrid Rush
    Ingrid Rush

    Ingrid Rush

    Special Agent US Secret Service

    Collapse This Item

  • Faking It: Stopping Impersonation Attacks with Cyber AI 1:30 pm

    Presented by Darktrace

    Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. 

    Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. 

    In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done. 

    Find out how in this session.

    Click to Expand

    Panel Participants:

    Marianna Pereira
    Marianna Pereira

    Marianna Pereira

    Director of Email Security Products

    Collapse This Item

  • Earn More Trust Through Vulnerability Management Best Practices 1:50 pm

    Presented by Synack

    COVID has brought on a set of security challenges that has security teams pivoting and spinning up new applications to meet the unique demands of quarantine and remote work. When external and even internal environments demand that you move quickly, how do you measure and communicate changes? And how do you build trust with customers, staff and the board, ensuring data and other investments are protected? Join Synack’s VP of Operations, Nick Harrahill, for a discussion on how to meet these unique demands.

    You’ll learn: 

    • Best practices security leaders can pursue to harden vulnerability programs
    • How leveraging a continuous crowdsourced testing model can help measure and communicate security posture
    • How to maximize trust with customers and throughout organizations
    Click to Expand

    Panel Participants:

    Nick Harrahill
    Nick Harrahill

    Nick Harrahill

    VP of Operations

    Collapse This Item

  • Expert Panel Discussion: Recover from Ransomware – What’s Next? 2:15 pm

    Recover from Ransomware/Ransomware Ex Post Facto: Coming Back After an Attack: What’s Next?

    Whether you chose to pay the ransomware or not, industry experts tell you to treat your entire network as contaminated.  Rebuilding images, devices, re-formatting storage, and all the rest is part of this process.  In this panel, our experts will talk about what to do first – and what to avoid, and where the traps may lie.

    Click to Expand

    Panel Participants:

    David Huskisson
    David Huskisson

    David Huskisson

    Rapid Restore Solutions Lead

    Collapse This Item

  • Subject Matter Expert Session - More Details To Come 2:40 pm
  • Subject Matter Expert Session - More Details To Come 3:00 pm

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • Expert Panel Discussion: User-Centric Security 3:30 pm

    User-Centric Security

    Users, those carbon-based life forms usually roaming the halls of your buildings, are the last line of defense.  Data suggests that CEOs are ready to spend more money to contravene against attacks aimed at users. Training, tools, and education help – but what are we doing to make sure they are not the weakest link?

    Our Subject Matter Experts will look at the problem from multiple angles… Business Email Compromises (BEC)/Phishing and Account Takeover…  as well as Endpoint Security, Identity and Access Management, and Password (-less) solutions.  Attendees will understand the myriad of challenges from multiple perspectives, and different concepts on how to address.

     

     

    Click to Expand

    Collapse This Item

  • Subject Matter Expert Session - More Details To Come 4:05 pm

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • CISO Panel 4:25 pm

    Submit your bio for consideration to participate on our CISO Panel

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Luis Brown
    Luis Brown

    Luis Brown

    Chief Information Security Officer (CISO) - Central New Mexico Community College

    Chris Lawrence
    Chris Lawrence

    Chris Lawrence

    CIO, CISO - Risas Dental and Braces

    Shannon M. Lawson
    Shannon M. Lawson

    Shannon M. Lawson

    CISO, Senior Executive, Navy Veteran, Servant Leader - City of Phoenix

    Chris Richardson
    Chris Richardson

    Chris Richardson

    Deputy CIO of IT Development, Mobility, and Smart Cities - Arizona State University

    Lester Godsey
    Lester Godsey

    Lester Godsey

    CISO - Maricopa County

    Kristen Sanders
    Kristen Sanders

    Kristen Sanders

    CISO - Albuquerque Bernalillo County Water Utility Authority

    Collapse This Item

  • Summit Final closing Session

Registration

Thu. Apr 29

Data Connectors events are for IT professionals only. Required fields are marked with an asterisk (*).

Register