Agenda

Date and TimeTitle
May 11, 2022
8:00am - 9:00am (Mountain)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

May 11, 2022
8:00am - 8:07am (Mountain)
Opening Introductions
May 11, 2022
9:00am - 9:28am (Mountain)
Exterro | Conducting forensic investigations in a zero-trust environment. | Justin Tolman, Forensic Evangelist
The Zero-Trust security approach is quickly becoming the standard for corporations

and agencies. Within the United State government agencies, and those doing business with government agencies have been mandated to adopt a zero-trust level of security by 2024. This presentation will cover what Zero-Trust is, how it may impact the legitimate security work being carried out by you, and how investigations may be carried out in a Zero-Trust environment.

May 11, 2022
9:27am - 10:02am (Mountain)
Exabeam | Seize The Breach: Why breaches still occur and how to mitigate them | Bob Reny CTO and Principal SE

Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a presentation on:

  • Why breaches are usually occurring
  • How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage
  • A simple maturity model based on outcomes and use cases that can vastly improve Security Operations
May 11, 2022
10:00am - 10:30am (Mountain)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

May 11, 2022
10:30am - 11:00am (Mountain)
Forescout | Monitoring RUSSIAN Cyber Activities | Nisaa Maragh Head Regional Evangelist

What three things you should do to prepare your defenses:

Keeping our customers safe and protected is our highest priority.  The US Federal Gov’t recently issued a warning to the private sector to harden their cyber security infrastructure and defenses based on new intelligence around potential Russia cybersecurity attacks.

What can you do to prepare?

There is no way to know for certain what an attack may look like, but you can prepare.  Join us on and learn what three steps you should immediately take to protect your networks and infrastructure.

May 11, 2022
11:00am - 11:30am (Mountain)
Darktrace | Fast and Furious Attacks: Using AI to Surgically Respond | Nicholas Cantoni Cyber Security Team Leader, US-West

Fast-moving cyberattacks can strike at any time, and security teams are often unable to react quickly enough. Join Nicholas Cantoni, Darktrace’s US-West Cyber Security Team Lead, to learn how Autonomous Response takes targeted action to stop in-progress attacks without disrupting your business. The discussion includes real-world threat finds.

Explore today’s threats and challenges and learn how advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough.

 
May 11, 2022
11:30am - 12:00pm (Mountain)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

May 11, 2022
12:00pm - 1:00pm (Mountain)
Keynote | Welcome to the Dark Side, we own EVERYONE’S Cookies... | Chris Roberts vCISO, Researcher, Hacker, Consultant, Devil’s Advocate HillBilly Hit Squad

There you are! So, how’s it going? Good?

Y’all caught up on your awareness training?

Know what to click and what to avoid?

Figured out your passwords yet? (Summer20201! Doesn’t count)

Sorted out the OWASP top 10 yet?

Great!

So, feeling all good, protected, ready to fight the good fight, and do battle?

Splendid…

What if I told you it doesn’t make a damm difference…?

Really.

Like, not a difference. I mean you get that warm fuzzy feeling, and we all get a check in the audit box and go along on our merry way and feel good about things…

But it’s not going to change a damm thing.

Your ass belongs to me, and there’s nothing you can do to stop me from getting in.

Our record (March 2021) for breaking into a fully patched, XDR, UBA, NGFW, ABC, AI, ML target was 2 minutes and 6 seconds…

Our record for breaking through your web application with its containers, dockers, WAF’s and MFA’s…. about 5 minutes and that’s only because we got lost in the Amazon along the way…

So, now we’ve burst your bubble and introduced you to reality what CAN you do? What SHOULD you be doing? AND how can you reduce risks in the digital realm? WHERE is it most effective to build out security AND what the hell DO you do to make sure when I’m inside you know I’m there AND can do something about it BEFORE I wander off with all YOUR data, leaving behind a nice set of ransomed systems with an I-love-you note for $10m

Oh, and all of this is yesterday. Today we’re dealing with human hacking, tomorrow we must worry about the very fabric of space and time

Join us for a thought-provoking discussion

May 11, 2022
1:00pm - 1:30pm (Mountain)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

May 11, 2022
1:30pm - 2:00pm (Mountain)
SafeBreach | Continuous Breach Attack Simulation - A Pragmatic Approach to Your Security Portfolio | Avishai Avivi CISO

Avi Avivi, SafeBreach Chief Information Security Officer, looks at some guiding principles that make a case for using continuous breach attack simulation as one of the best ways to test and exercise your security posture. He examines the notion of abiding by the spirit of the compliance framework vs. the letter of that framework.

 
May 11, 2022
2:00pm - 2:30pm (Mountain)
Illumio | Zero Trust and Microsegmentation – Easier Than You Think | Jeff Francis Staff Technology Exploration Engineer, Office of the CTO

Zero Trust has got to be one of the most talked about themes in cyber security.  While the term means different things to different people, there are two things that can be agreed on:  it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?

Regardless of the sophistication of ransomware, the end goal is always the same:  get in through a vulnerability and move laterally through your network.  Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.

 
May 11, 2022
2:30pm - 2:50pm (Mountain)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

May 11, 2022
2:50pm - 3:20pm (Mountain)
CyberRes | The importance of understanding and knowing what’s in your software supply chain | Stan Wisseman Chief Security Strategist

Modern software applications and products are assembled from dozens if not hundreds of components, many of which nowadays are open-source projects.  Vulnerabilities like Log4J and Spring4Shell that came to light this year reinforce the need for organizations to rapidly mature the security of their software supply chains. The software industry is still early in our collective adoption of mature software supply chain controls. In this talk, Mr. Wisseman will share some of the best practices that organizations can take to mitigate their software supply chain exposure.

 
May 11, 2022
3:20pm - 3:50pm (Mountain)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

May 11, 2022
3:50pm - 5:00pm (Mountain)
Panel Discussion - “Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
May 11, 2022
5:00pm - 5:10pm (Mountain)
Closing Remarks