• Home
  • Attend
  • Sponsor
  • Call for Speakers
  • Our Partners
  • News
  • Subscribe
Data Connectors Logo
  • Home
  • Attend
  • Sponsor
  • Call for Speakers
  • Our Partners
  • News
  • Subscribe

    Salt Lake City Cybersecurity Conference
    January 31, 2019

    Includes Keynote Session and CISO Panel
    • Register Now

    CHECK-IN AND OPENING INTRODUCTIONS

    8:00 am - 8:30 am

    Data Connectors is proud to host the Cybersecurity Strategies Conference.

    Session Two

    9:00 am - 9:30 am
    • Robert Kern
      Director, Regional Sales

    Segmentation Made Simple

    Most networks are really good at making you feel overwhelmed , ill-equipped and exposed. Meanwhile, you’re being tasked with connecting virtually every ‘ thing’, including machines and endpoints never intended to be networked. How can you securely connect such a wide array of distributed systems, devices and equipment, at scale?

    The practical way forward is networking endpoints with provable identities, using automated, policy-based orchestration for enterprise scale. Now, local and wide area micro-segmentation is not only possible, but simple.

    As more machines require secure connectivity, networking seems to have become a black-magic, since it’s impossible to give every device its own unique IP address. There are an assortment of workarounds using multi-NAT environments, or Carrier Grade Nat, but it’s now virtually impossible to punch through and connect distributed systems. IP address limitations are prohibitive, making functions such as cloud peering between VPCs virtually impossible.

    In this session, you’ll learn how to overcome previously impossible networking hurdles by giving your machines and endpoints a unique and provable identity. You can now easily and instantly provision, connect, failover or guaranteeing any connected resource using simple point-and-click orchestration for all of your “things” – on the ground, on the move, or in the cloud.

    Download the Presentation

     

    Speaker’s Bio:

    Robert Kern is a Regional Sales Director for Tempered Networks with nearly thirty years of experience providing network and security solutions for customers in multiple market verticals throughout the central United States as well as Mexico.

    Robert has tenure with several notable and innovative companies, including SynOptics (Bay Networks) and F5 Networks. With his pioneering attitude and keen sense of business, Robert was instrumental in bringing their disruptive solutions to market.

    Based in Dallas, Robert has cultivated long-standing relationships with Fortune 500 accounts, from oil and gas to global transportation companies, and is well-respected for his ability to map solutions to meet critical business challenges.

    His other interests include a passion for restoring and collecting Pontiac muscle cars, raising funds for wounded veterans, and working on family ancestry.

    Break

    9:30 am - 10:00 am

    Break / Vendor Booth Time

    Session Three

    10:00 am - 10:30 am
    • Anthony Booyse
      Channel Sales Engineer

    Sophos EDR – Add Expertise, Not Headcount

     

    Speaker’s Bio:

    Just under a year ago, Anthony joined the Sophos family after being in the tech space for the past 18 years. Anthony came to us from the public sector, where he spent seven (7) years, of which the last two and a half (2.5) years he was the Chief Technical Architect out of the CTO’s Office, for the Department of Technology Services with the State of Utah. Prior to his State employment, Anthony worked as an IT Consultant, a Home Technology Integrator and served 7 years in the Australian Army (full-time) as a Telecommunications Engineer. Anthony discharged from the Australian Army in 2008 to pursue new opportunities in the United States. Anthony is the Sophos Channel Sales Engineer for Utah and New Mexico.

    Session Four

    10:30 am - 11:00 am
    • Todd Howard
      Regional Manager – West

    A new approach to email security for Office 365

    For hackers, Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.

    Speaker’s Bio:

    Todd Howard is an experienced cybersecurity adviser with more than 10 years’ experience helping protect companies against the most sophisticated known and unknown threats. His pedigree spans across a multitude of well-known firms, such as Symantec, McAfee, Websense, and most recently Vade Secure. He is passionate about representing a true world-class product so he can set the course for excellence for his customers, enabling them to have visibility, predictability, thus creating successful repeatable processes.

    Lunch

    11:00 am - 11:30 am

    Break / Vendor Booth Time / Lunch

    Keynote Session

    11:30 am - 12:30 pm
    • Supervisory Special Agent Jeff Collins
      FBI, Salt Lake City Division

    Supervisory Special Agent Jeffrey Collins joined the FBI in 2009. He is currently the supervisor for the Salt Lake City Cyber Task Force. He has worked in Honolulu, FBI Headquarters, and Salt Lake City. He was the primary investigator of the Mariposa botnet, which caused approximately a billion dollars in worldwide damages. He has subject matter expertise in the dark web and matters affecting the financial industry. He has traveled to 36 countries and trained foreign law enforcement and prosecutors on cyber investigative matters. In addition to his cyber work, SA Collins was a SWAT team operator for four years. He holds a Master of Science degree in Computer Information Systems with a security concentration. He is the recipient of the Hawaii Law Enforcement Officer of the Year, Microsoft Global Hero, and the FBI Director’s awards.

    Break

    12:30 pm - 1:00 pm

    Break / Vendor Booth Time

    Session Six

    1:00 pm - 1:30 pm
    • Ryan Heath

    Navigating the Noise – How to Evaluate and Select a Managed Detection and Response (MDR) Provider

    Managed Detection and Response (MDR) is a hot topic in cybersecurity today — these four words describe a singular solution that means so many things to different people. Despite differing definitions and viewpoints, the end goal is to keep your environment safe from advanced adversaries and undetected threats.

    Secureworks suggests that any MDR provider be evaluated first and foremost on the following five key areas. Any solution without this suite of capabilities is not MDR, no matter what you call it.

    1. Endpoint Detection and Response
    2. Incident Response Capabilities
    3. Intellectual Property
    4. Beyond Endpoints
    5. Global Threat Visibility and Threat Intelligence

    MDR can be a nebulous label with a definition that depends on who you ask. Secureworks uses telemetry from a variety of sources, including infrastructure, network and endpoint devices, and also can take response actions across different devices. Machine learning and artificial intelligence help identify anomalous events and continuous threat hunting with specialized capabilities.

    In this session, Ryan Heath will walk through the 5 key components of a robust MDR solution and give guidance on what to look for as you evaluate the viability of MDR in your organization.

    Download the Presentation

    Session Seven

    1:30 pm - 2:00 pm

    The Evolution of IRM: Protecting Sensitive Data In Today’s Collaborative, Digital Economy

    In order to do business today, organizations have to externally collaborate & share data. Traditional security has struggled with how to easily address this – whether with onprem or cloud collaboration repositories, such as OneDrive or Box.

    IRM, or Information Rights Management, has evolved so business’ can easily secure, track & monitor their data anywhere it travels – and revoke it back in real-time! Learn how this space is changing to adapt to the collaborative, digital economy we do business in today – and why traditional security is only able to fulfill part of the requirement.

    Break

    2:00 pm - 2:20 pm

    Break / Vendor Booth Time

    Session Eight

    2:20 pm - 2:50 pm
    • Adam Gnoth
      Account Manager

    The Human Firewall Is On Fire

    What Do You Do When The Smoke Clears?

     

    Speaker’s Bio:

    Adam has been in the IT solutions world for 10+ years and has provided expert guidance with cloud adoption projects, software asset management, and helping organizations create a cyber resilience for e-mail strategy.  Although based in Denver, Adam travels throughout the central and west regions to meet with partners and customers to help increase the need for industry leading e-mail security, continuity, and archiving.

    Session Nine

    2:50 pm - 3:20 pm
    • Rees Johnson
      SVP Product Management

    How have US sanctions against rogue nations impacted our world of Cyber Security?  What InfoSec model should we use to respond? 

    Session Ten

    3:20 am - 3:50 pm
    • Omar Masri 
      CTO

    Can we stop playing the cat and mouse game with hackers?

    How to stop being on the losing end.

    Session Eleven

    4:00 pm - 4:20 pm
    • Mike Boose
      Channel Engineering

    DDoS: Updates from the Battlefield

    What is the state of DDoS, as observed by network and security professionals directly responsible for operating and securing global networks?

    Distributed denial-of-service attacks have morphed from being political statements to a diversionary tactic while other forms of attacks are occurring.

    Recent changes in the characteristics of DDoS attacks and understanding the newest threats to environments

     

    Speaker’s Bio:

    Mike Boose currently serves as a Channel Sales Engineer, supporting Arbor Networks’ Central and Western regions. Having served in similar positions across a number of top vendor organizations from network security, forensics, incident response, malware discovery / sandboxing, and security analytics.

    Mike is able to draw from his years of experience to devise and relate to custom security solutions for any scenario.

    Networking / Happy Hour

    5:00 pm - 6:00 pm
  • Salt Lake Marriott Downtown at City Creek
    8:00 pm - 5:00 pm
    75 S W Temple
    Salt Lake City, UT 84101
    801-531-0800

    Event Sponsors

    • Secureworks
    • Darktrace
    • Symantec
    • Mimecast-logo-colored-no-UEM-e1493164102952
    • Tempered Networks
    • Respond-Software-e1520273059171
    • Sophos
    • Acalvio
    • Arctic Wolf
    • Array Networks
    • Netscout-Arbor-e1522679790911
    • ESET
    • Lockpath
    • Code42-e1525885926109
    • Vera
    • Synopsys
    • Circadence-e1533914602524
    • Cloudflare
    • Cirro-vertical-col-RGB
    • CI-Security-e1533139983491
    • Print
    • PMI Northern Utah
    • proactive-hi-res-logo
    • Quorum_Logo_wotag_110316
    • Silent Break
    • Talariax-logo-e1494279604964
    • VadeSecure
    • VLCM
    Become a sponsor
Contact Us
Privacy Policy
Media Kit
500 Chesterfield Center, Suite 320
Chesterfield MO 63017
636-778-9495
[email protected]
Data Connectors Logo
Data Connectors - 2018