Data Connectors is proud to host the Salt Lake City Cybersecurity Conference.
Data Connectors is proud to host the Salt Lake City Cybersecurity Conference.
Applying Probability theory to Security Event Analysis
In this talk, we’ll discuss how new approaches and technology advances allow Security Operations teams of all sizes to finally have the capacity of Fortune 100 Companies. Your small team can analyze billions of incoming security events daily using state-of-the-art techniques such as probabilistic math, AI, ML, and correlation. We’ll also discuss the pros and cons of each of these approaches.
Tim is an experienced product manager with a strong passion for design and user experience. He has separately managed innovative security monitoring products as the market evolved – beginning with SIEM, then User and Entity Behavior Analysis (UEBA), to now security decision automation with Respond Software.
Tim is a graduate of Princeton University, studying Operations Research & Financial Engineering.
How Hackers Bypass Office 365 Security: A Guide for the Uninitiated
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
• Email-based phishing, spoofing, and malware
• Account takeover, insider threats, compromised Microsoft credentials
• Loss of sensitive data from OneDrive, SharePoint and Office 365
Jeff Raymond is a Seattle, WA based Cloud Security Engineer at Avanan. While working for companies ranging from security giants to start-ups, he has found his passion in protecting organizations from phishing attacks and securing their cloud applications. Outside of work, he can either be found snowboarding or wakeboarding (depending on the season) or geeking out in his home lab.
Coffee Break / Vendor Exhibit Time
Cybercrime Tactics and Techniques Report
A significant uptick in threats aimed at businesses were reported in Q2 2019 from the same time last year. Companies need to take control against these increases in cyberthreats by remediating at scale, quickly mitigating attack impacts through isolation, and proactively hunting for threats before they execute.
It’s a SOAR topic
From Endpoint Detection and Response (EDR) to Security Orchestration, Automation and Response (SOAR), this presentation will pose question which will cause reflection and spur action, enabling you to take the leap into applying tools in your security ecosystem that will assist you in your daily battle of keeping the bad folks out!
Anthony has enjoyed the last 19 months at Sophos as a Channel Sales Engineer covering Utah and New Mexico. He has been in the technology industry for the past 18 years, fulfilling various technical roles. 14 years of this professional life has been spent in public/military service. 7 years with the State of Utah state government and 7 years serving his home country in the Royal Australian Army. Anthony brings a passion for all things technology and will talk your ear off if you let him.
Lunch / Vendor Exhibit Time
Trends in Cybercrime
Assistant to the Special Agent in Charge (ATSAIC) Ike Barnes is a graduate of the United States Military Academy at West Point. After serving in the US Army, ATSAIC Barnes became a Special Agent with the Secret Service in 2000 and was assigned to the New York Field Office. While there, ATSAIC Barnes was a member of the New York Electronic Crimes Task Force and other criminal investigative squads. After his assignment to the New York Field Office, ATSAIC Barnes was assigned to the Presidential Protective Division. After the Presidential Protective Division, ATSAIC Barnes was assigned to Secret Service Headquarters. ATSAIC Barnes is currently assigned to the Denver Field Office and is in charge of the Colorado Electronic Crimes Task Force.
Dessert and Coffee Break / Vendor Exhibit Time
The Evolving Convergence of Information Security with Governance & Compliance
Once highly isolated from each other, information governance and information security is experiencing a convergence where the market is realizing they both need each other more than ever to respond to the explosion of unstructured data, digital transformation and expanding privacy regulations.
Jeff Jones has over 20 years of experience enabling enterprises to secure digital assets. Throughout his career, Jeff has served as a trusted advisor leading sales and delivery teams to assist enterprises to securely enable their business while protecting them from cyber threats and aiding with regulatory compliance.
Prior to joining Egnyte, Jeff was as a national architect for AI-based data management startup DocAuthority. At Ionic Security, he helped build a professional services team that assisted customers in deploying data protection solutions along with overseeing technical partnerships. Previously, he worked as a Product Manager for Symantec’s Norton Zone (secure sync-n-share) offering and also served as a National Architect for Symantec’s Identity and Information Protection pre-sales division. Jeff joined Symantec via acquisition of PGP, a leader in data protection, where he lead the technical pre-sales team for North America and was responsible for strategic enterprise accounts.
Jeff holds MCSE and CISSP industry certifications as well as a BA from BYU. https://www.linkedin.com/in/jeffreyjones/
The Secret to Winning IT Security Roulette
There is too much talk in IT security and not enough action. But the reality is you probably don’t have the people or the tools to effectively act to secure your IT infrastructure. There is hope. Let’s fix IT. Join the CTO of SaltStack, Thomas Hatch, for a presentation on hope for the future of IT security.
The pace of infrastructure growth and resulting complexity is overwhelming. Old security tech and processes, combined with overwhelmed and understaffed IT and security teams, simply can’t protect against a new and evolving threat landscape. Security exploits are proliferating faster than ever before.
You already know this, but according to SC Magazine in the first half of 2019 there were almost 4000 unique data breaches resulting in more than 4 billion records being compromised.
The hard truth is almost all of these security breaches could’ve been avoided. Gartner said 99% of exploited vulnerabilities occur on misconfigured, unpatched systems KNOWN to IT security teams.
Security and IT teams need help winning security roulette. Let’s fix IT with fully automated, truly collaborative vulnerability remediation.
Thomas is the creator of the Salt open source software project and the CTO of SaltStack, the company behind Salt. He has spent his career writing software to orchestrate and automate the work of securing and maintaining enterprise IT infrastructure from core data center systems to the very edge of the network and IoT. Thomas built fully automated, secure IT environments for the U.S. intelligence community in addition to decades of experience implementing global infrastructures for the largest businesses in the world. Thomas’ knowledge and hands-on experience with dozens of new and old infrastructure management technologies helped establish the vision for SaltStack. He has shared his knowledge of IT security and management automation with tens of thousands of practitioners at more than 100 industry events. Thomas and SaltStack have been recognized with numerous awards ranging from open source community growth to innovation in automation and cybersecurity. For his work on Salt, in 2012 Tom received the Black Duck “Rookie of the Year” award and was named to the GitHub Octoverse list in both 2012 and 2013 for leading a project with the highest number of unique contributors, rubbing shoulders with projects from Android, Mozilla, and OpenStack. More recently, SaltStack SecOps was chosen by CSO Magazine as one of the hottest new products at RSA Conference 2019.
Break / Vendor Exhibit Time