Presidio presents:

Presidio's Red Sky Security Conference 2019

October 9, 2019
The Colorado Convention Center

Denver, CO

There has never been a time where Cybersecurity has had so much to consider; from big data, artificial intelligence, and machine learning to cybercrime, intelligent malware, and global compliance. It’s clear that every IT role is now a security role.

The purpose of the Red Sky Security Conference is to educate, elevate, and influence the discussion and practice of information security in this ever-changing landscape. Expect top security speakers, expert education, peer interactions, and both established and emerging technology demonstrations.

More Details

Why Attend?

Best Practices
Come learn from the experts who are here to share stories and lessons learned. From CISO to CTO to Whitehat Hacker, we've assembled an incredible cross-section of cyber-security talent.
Security Trends
It is an ever growing and changing landscape. Learning the latest threats and trends helps you and your organization be more prepared for them.
 
Top & Emerging Technologies
We have brought together a fantastic collection of established and emerging technology companies - All ready to discuss cutting-edge tools that better secure and protect your company data.
SHOW
YOUR EXPERTISE.
BUILD
YOUR NETWORK.
DISCOVER
THE LATEST TRENDS.
FREE LUNCH & SNACKS
DON'T MISS IT.

Keynote Speakers

Speakers

Expo Sponsors

Experience the Hacker Lounge

Join us at the Hacker Lounge where you can rest, recharge, learn, and have some fun. We will be hosting a number of self-paced workshops to hone an existing skill or maybe learn a new one. Presidio’s security engineers will be on hand for mingling or Q&A. We’ll be having a contest with prizes for the winners (hint – work on your typing skills).

Schedule

  • 09 October

Transportation

Don’t want to drive? Take RTD LightRail or the free Mallride
  • LightRail- Line D (Littleton), Line F (Lone Tree-I25 S. Corridor), and Line H (Aurora) all stop at the Theatre District-Convention Center
  • LightRail- Line G (Wheat Ridge), Line W (Golden), Line B (Westminster), Line FF (Boulder-US 36 corridor) all go to Union Station
  • From Union Station take the Free 16th st. Mallride to California St. Then walk just 2 blocks south to the Convention Center.

More Information

Location

700 14th St, Denver, CO 80202

Theresa Payton

President & CEO / Founder
Fortalice Solutions, LLC and Dark3
Former White House CIO & Cybersecurity Authority

In the wake of recent, debilitating cyberattacks at Equifax, Sony Pictures, Target and privacy breaches against prominent individuals in the public eye, Theresa Payton remains the cybersecurity and intelligence operations expert that people and companies turn to in order to strengthen their privacy and cybersecurity. She is featured in the 100 Fascinating Women Fighting Cybercrime book. Theresa is named by IFSEC Global as the 4th among the top 50 of the world's cybersecurity professionals and by Security Magazine as one of the top 25 Most Influential People in Security, she is one of America's most respected authorities on security and intelligence operations.

The first female to serve as White House Chief Information Officer, Payton oversaw IT operations for the President and his staff from 2006 to 2008 during a period of unprecedented technological change and escalating threats. Previously, she held executive roles in banking technology at Bank of America and Wells Fargo.

Currently, as the founder, president and CEO of a world class cybersecurity consulting company, Fortalice Solutions, LLC and co-Founder of Dark3, a cybersecurity product company, she remains the expert that organizations call for discretion, proactive solutions, and incident response/crisis management. Fortalice was recently named one of the Top 5 Innovative Cybersecurity companies in the D.C./MD/NoVa region and Theresa was recently awarded the Enterprising Women of the Year Award for the 2nd year in a row.

Payton was recently featured as the Deputy Director of Intelligence Operations in the new hit reality show CBSʼ Hunted. Payton collaborated with cybersecurity and privacy attorney, Ted Claypoole, to author two books focused on helping others learn how to protect their privacy
online. Hailed as ʻmust-reads,ʼ by Jon Stewart when he talked to Payton on The Daily Show and by Katie Couric on her show Katie's Take the books assist the laymen with the security and privacy challenges of our times.

Payton is often sought out by national and international media news outlets to explain complex security issues in business and consumer terms to get behind the hype to understand, in laymanʼs terms, how to protect your privacy and security. She has been a repeat guest on the
Today Show, Good Morning America, Fox Business Shows, Fox News Shows, CBS Morning & Evening News, BBC TV News and Radio, CBSN, CNN, NBC News, MSNBC, and NPR. Recognized as a 2015 William J. Clinton distinguished lecturer by the Clinton School of Public Service, Payton passionately protects her clients, from the boardroom to the server room, and helps them understand the business risks to their organizations cybersecurity. She and her team provide insight and methods critical to protecting people and organizations from rapidly evolving cyberattacks.

09 October

Ash Valeski

Director, Product Management
Proofpoint
Ash has spent his career building software products that facilitate digital communications for companies like Microsoft, Skype, and Tellme Networks, and is based in Denver, Colorado.

09 October

Cameron Williams

CTO & Co-Founder, Interim CEO
OverwatchID
For more than 25 years, Cameron Williams has helped enterprise clients like IBM, Wells Fargo (WAMU), Sony, BP, KPMG, Boeing, Spirt Aero, LAM, and dozens others keep their data safe and secure from data breaches, hacks, ransomware, and spear-phishing. As OverWatchID’s CTO, Cam leads all product design and product development, and is responsible for ensuring that that OverWatchID’s cloud-based converged identity security platform is meeting existing and future threats to identity security.

Cam has leveraged his deep expertise in high-profile data breach mitigation efforts on behalf of the entertainment industry, oil and gas, finance, high tech, and other Fortune 500 firms. Prior to co-founding OverWatchID, Cam held senior positions with InteliSecure, Juniper Networks, Pulse Secure, Virtela Technology Services, IBM, and MCI. Cam studied computer science at North Carolina State University and pre-med at Penn State University. Cam lives in Denver with his daughter Alaura and dog Zoe. He is a competitive Ironman and is an internationally ranked parathlete.

09 October

Chris Morales

Head of Security Analytics
Vectra
Chris is Head of Security Analytics at Vectra, where he analyzes attacker behaviors that occur across millions of hosts inside enterprise networks globally to identify patterns and trends in cybersecurity. He has nearly two decades of information security experience in an array of cybersecurity architecture, consulting, sales, and research roles with a primary focus on incident response and security operations. Chris is a widely respected expert on cybersecurity issues and technologies and has researched, written and presented numerous information security architecture programs and processes.

09 October

Chris Petersen

Chief Product and Technology Officer
LogRhythm
Chris Petersen co-founded LogRhythm in March 2003 and has served as a member of our board of directors and Chief Technology Officer (CTO) since our inception. Mr. Petersen currently serves as LogRhythm’s Chief Product and Technology Officer (CPO/CTO). In his current role, he is responsible for product from concept to delivery as the executive leader for Product Management, Engineering, and LogRhythm Labs. Mr. Petersen has served in a variety of other executive roles at LogRhythm including SVP of Products, SVP of Research & Development and SVP of Customer Care.

09 October

Christian Gilby

Director of Product Marketing
Mist, a Juniper Company
Christian has 20+ years of product marketing, management and engineering experience in the networking industry with a strong focus on mobility, cloud and wireless and speaks often at industry events globally. He currently leads product marketing for Mist (acquired by Juniper). Previously he led product marketing for wired, wireless and branch solutions at Aruba (acquired by HPE). He led product marketing and product management for Agito Networks product line (acquired by ShoreTel). Prior to Agito, he was an early member of the Meru Networks team leading product management and partnerships in VoWLAN and Wi-Fi Access Point solutions. Christian started his career at Nortel Networks where he held several networking and VoIP project lead and software architect positions and was also granted a patent.


09 October

Craig Sanderson

VP Product Management
Infoblox
Craig Sanderson is the Vice President of Product Management for Infoblox. Craig has been in the security industry for 19 years in variety of roles including: Technical Consultant, Solution Architect, Product Manager, and Business Development Manager. Having worked on a range of security technologies, Craig is now focused on developing solutions that prevent the abuse of DNS and enabling customers to leverage their network infrastructure to better secure their data, assets, and people.

09 October

Dan DesRosiers

Security Specialist
Aruba
As Director of Security Sales for Aruba Southwest Area, Dan is responsible for driving product preference and adoption of the Aruba Cyber Security Solutions. Engaging with Customers, Partners and Aruba Sales Teams for mutual success. Dan started in networking and compute technologies over 25 years ago and has served in many technical, consulting, sales and leadership roles. He’s had the privilege of running his own technology firm, and has worked for Xerox, Cisco Systems, IBM, NEC, Cylance and Aruba, an HPE Company.

09 October

Danielle Wood

Senior Director of Advisory Services
Cybereason
Danielle Wood, Senior Director of Advisory Services has extensive experience in eDiscovery, Digital Forensics & Incident Response. Her career spans 30 years including 15 years of experience in investigations for Federal, State and Local law enforcement as well as Fortune 500. Ms. Wood holds the following certifications: GCFA, GCIH, GREM & GPEN. She currently helps customers work with EDR platform integration to support such efforts as IR and integration of the Mitre Att&ck framework into Security Operations Processes.

09 October

Dave Trader

Cyber Security Consultant
Presidio
Dave Trader has been in CyberSecurity for over 15 years now. Dave began his career as United States Marine serving in both OIF (Operation Iraqi Freedom) and OEF (Operation Enduring Freedom) where Dave specialized in encryption as a Signals Intelligence and Communications expert.

Dave is certified in over 70 different areas of CyberSecurity; most notably CISSP, CISM, and as an Ethical Hacker. Dave has an MBA with a specialty in Information Technology and a Bachelor’s Degree in Criminal Justice. Dave is most recently a graduate of the FBI CISO Academy out of Quantico, VA. Dave also serves on the University of Detroit Mercy NSA Center of Excellence CyberSecurity Advisory Board, and is a coach for the USAF Cyber Patriot Program.

Prior to joining Presidio, Dave was a CISO for seven years at a technology company out of Detroit. Dave specializes in high-security design and architecture and has been a preferred consultant for the financial sector for securing their environments.

09 October

Garrett Weber

Director, Sales Engineering
Guardicore
Garrett Weber is the Director of Sales Engineering at Guardicore, where he works with organizations to design solutions to solve their complex security and infrastructure challenges. Prior to Guardicore, Garrett spent the last 10 years working in various security roles, in the Insurance, Healthcare and Consulting industries. Garrett also spent 12 years in the Air National Guard as part of an elite Network Warfare Squadron that worked alongside both the Air Force Computer Emergency Response Team (AFCERT) and the Defense Information Systems Agency (DISA).

09 October

Geoff Shukin

Staff Systems Engineer, Networking and Security Business Unit
VMware
Geoff Shukin is a technical subject matter expert in Cyber Security within VMware’s NSBU organization. Geoff provides thought leadership and relevant real-world experience to help drive infrastructure cyber security maturity improvements across organizations, in line with the changing Threat Landscape as well as Regulatory and Compliance requirements.

Prior to joining VMware, Geoff worked with Palo Alto Networks, Cisco and Nortel with a strong focus on security.

09 October

Jason Teplitz

Manager, Sales Engineering, Public Sector
Crowdstrike
Jason Teplitz has spent 16+ years working for Computer Security software manufacturers, including Check Point, Symantec & CrowdStrike, in Sales Engineering, Architecture and Consultative roles. Jason possesses expertise in several areas of Cybersecurity including Network, EndPoint and Mobile technologies, but his latest roles have focused on EndPoint and Incident Response. Mr. Teplitz lives in Boulder, Colorado, but is originally from the Chicagoland area.

09 October

Jess Fuquay

Technical Partner Manager
Veeam
Jess Fuquay is the Technical Partner Manager for Presidio at Veeam Software. He has been in the data protection space for 18 of his 30 years in Information Technology. His presales engineering experience covers SLED, Commercial, Enterprise, and Partner relationships. He lives in Nazareth PA with his wife for 22 years, his two sons, and two dogs. Favorite pastime – cooking. Ask him for a recipe!

09 October

Joe Martin

Security Solutions Architect
F5
Joe is a Security Solutions Architect for F5 Networks where he consults with organizations to identify security weaknesses in their infrastructure and applications. He has over 25 years’ experience, focusing on network and application security.

09 October

Jonathan Nguyen-Duy

Vice President, Strategy & Analytics
Fortinet
Jonathan Nguyen-Duy leads Strategy and Analytics Programs at Fortinet where he focuses on emerging technologies and partnerships. With extensive experience working with global enterprises and nation-states, Jonathan is responsible for developing innovative security solutions addressing the challenges of digital transformation – from the IoT edge to the cloud.
Prior to joining Fortinet, Jonathan served as the Security CTO at Verizon Enterprise Solutions where he was responsible for strategic technology partnerships, the Verizon Cyber Intelligence Center, and the data science team that produces the annual Verizon Data Breach Investigations Report. Before that role, he led the Security Services line-of-business and was responsible for data analytics and solutions supporting military-grade continuous diagnostics and mitigation. Jonathan also led the development of Verizon’s hosting services and business continuity practice. His research experience spans more than 10,000 data breach investigations and dozens of published reports.
Before Verizon, Jonathan served with the U.S. Foreign Service in Central America working on economic development and disarmament initiatives. He has more than 20 years of cybersecurity and BCDR/COOP experience – working through many business challenges including armed conflict, civil strife, labor strikes, natural disasters, terrorist attacks, network outages and a wide range of cyber attacks.
Jonathan is a widely published security expert and frequent speaker at industry conferences. Jonathan holds a BA in International Economics, as well as an MBA in IT Marketing and International Business from the George Washington University.
Specialties: Cybersecurity, SIEM, Data Analytics, Artificial Intelligence, Machine Learning, Continuous Monitoring, Physical Security, Business Continuity/COOP, Managed Services, Risk Management and Digital Transformation.

09 October

Justin Douglas

Global SE Director, Prisma Access and SaaS
Palo Alto Networks
Justin is the Systems Engineering Director for the Prisma Access and SaaS Sales Organization at Palo Alto Networks, joining the company in 2016. In his current role, he works with organizations to solve security challenges through cloud-delivered services.

He is passionate about helping customers rethink how they adopt and consume new technologies. Justin has a diverse IT background in Networking, Collaboration and Security. He has spent his career working as an Engineer and Engineering leader at companies like Avaya, Cisco and World Wide Technologies .

09 October

Kevin Kornblith

Systems Engineer
Zerto
Kevin Kornblith has over 16 years of IT experience with server administration, backups, storage, and monitoring with a
focus on virtualization as both an system administrator and in various engineering consulting roles. For the last 4 years he has been both learning and educating in a new era of IT Resilience working as a Solutions Engineer for Zerto.

09 October

Larry Lunetta

Vice President, Security Solutions Marketing
Aruba
Larry Lunetta is Vice President, Security Solutions Marketing and is a technology veteran with a track record of executive management in both public and private companies. He is responsible for the overall marketing strategy and go to market execution for the Aruba security portfolio including ClearPass Device Insight and Policy Manager and the IntroSpect AI-based attack detection and response product. This includes positioning, messaging, asset development, field enablement and global marketing campaign support.

Prior to joining Aruba Larry was VP Marketing and Business Development for Niara. Before that, he held a range of C-level positions in venture-backed companies including VP Marketing for ArcSight, where he launched the company, brand and product while helping grow the company from pre-revenue to IPO.

Larry holds a BS in Electrical Engineering from Rutgers College and advanced degrees in engineering and business from Arizona State University where he currently is a guest lecturer in venture studies for the WP Carey School of Business.

09 October

Matt Bossom

Senior Security Solutions Architect
Presidio
Matthew Bossom is a Senior Security Solutions Architect for Presidio. Mr. Bossom is an industry veteran with over 18 years of experience. He has overall leadership responsibility for the security line of business in Southern California at Presidio. Prior to joining Presidio, Mr. Bossom was Senior Manager of Presales Engineering at Carbon Black, a position he held since 2016. In this role he was instrumental in driving operational excellence across Carbon Black’s $165 million business and in leading Carbon Black’s presales agenda. He maintains current knowledge of best practices and leading products from intense security experience working with large public agencies, telecommunications companies, universities and enterprises integrating networking and information security solutions.

09 October

09 October

Micah San Antonio

Director of Sales Engineering
Signal Sciences
Micah San Antonio serves as Director of Sales Engineering for Signal Sciences where he works with organizations to solve application security challenges for modern architectures. Having joined the company in 2016, Micah has 20 years combined experience in information security spanning AppSec, Email Protection and Advanced Persistent Threats.

09 October

Michael Beck

Chief Marketing Officer
DVL / Vertiv
Since 1984, Mike has served in many roles at DVL. Starting as a sales engineer, he successfully helped grow DVL through great customer relationships and successful projects. In the early 2000’s as President, he managed and grew DVL’s team of Data Center Engineers. From 2012 through 2016 he served as the CEO of DVL, managing the company through many industry transitions. In 2017, he is excited to focus on his passion for the marketing of DVL, using his 33 years of experience to best serve the customers and all employee owners.
Mike earned his Architectural Engineering degree from Penn State in 1978. He enjoys free time with his family, Penn State football, golfing, and skiing.

09 October

MB

Michael Breen

Consulting Engineer
Palo Alto Networks

09 October

Mike Ronan

Security Engineer, Global Security Sales Organization
Cisco
Mike Ronan is a Security Engineer with the Cisco Global Security Sales Organization partner team. Mike has been with Cisco 18 years working in various engineering and architecture roles. Mike is located in New York

Nancy Phillips

Chief Information Security Officer (CISO)
Centura Health
Nancy Phillips is the Chief Information Security Officer (CISO) responsible for providing leadership and strategic direction for proactively combating data security risks for the evolving digital and health care needs of Centura Health.

Nancy has more than 30 years of experience in all aspects of the data security arena from architecting secure solutions, establishing security programs or running large organizations responsible for security operations delivery. She began her career in the military intelligence community and then transitioned to consulting, where she designed and implemented security technologies and programs including multiple 24x7 security service capabilities for managed services or for organizations. Her most recent role before joining Centura Health was as the CISO for Datavail where Nancy was responsible for the execution of security controls as well as maintaining a strong governance, risk and compliance program.

Nancy holds a bachelor’s in computer information systems management from Colorado Christian University as well as her Certified Information Systems Security Professional (CISSP) certificate. Nancy is a founding member of a special interest group through Information Systems Security Association (ISSA) Denver Chapter called Women in Security, and serves as a Community Outreach Chair.

09 October

Quince Rickard

Enterprise SE
LogRhythm

09 October

Rich Bakos

Director of Solutions Engineering
LogRhythm

09 October

Robert Wagner

Security Strategist
Splunk
Robert Wagner is a security professional with 15+ years of InfoSec experience. He is a co-founder of the “Hak4Kidz” charity and a co-founder of BurbSecCon in Chicago, and is on the Board of Directors of the ISSA Chicago Chapter.

09 October

Ryan Shevchik

Senior Solutions Architect
AWS
Ryan Shevchik is a Senior Solutions Architect with AWS. At AWS, Ryan focuses on the partner community, enabling strategic consulting partners to deliver solutions on AWS following best practices. Prior to joining AWS Ryan spent 16 years with large and small consulting firms, helping customers solve problems using his expertise around database, NoSQL, and big data technologies.

09 October

Tommy Hui

Sr. Director of Solutions Engineers
SentinelOne
Tommy Hui serves as a Sr. Director of Solutions Engineers for SentinelOne where he is responsible for managing technical sales activities for the western half of the US. Previously, Tommy was the Director of Sales Engineering for Fidelis, also overseeing activities for the Western US and supporting cross functional activities related to product management and development. Prior to Fidelis, he worked as a civil service employee for the Federal Government supporting the United States Air Force Cyber Weapon System Programs as a Lead Defensive Cyber Systems Engineer. Tommy is also a Certified Information Systems Security Professional (CISSP).

09 October

09 October

Tyler Theys

Vice President of Security Consulting
Presidio
Tyler Theys is an Information Security Executive with over 2 decades of experience in the Cyber Security industry. Tyler specializes in Security Program development with a major emphasis on CISO consulting. Tyler is an active participant in several industry trends and commonly drives new direction for organizations and the industry in general. Tyler has traveled the globe consulting with CIO and CISO's across every industry vertical.

In his spare time, Tyler enjoys walking, hiking and spending time with his wife of 19 years and their 4 dogs.

09 October

Presidio

Host
Presidio is a leading North American IT solutions provider focused on Digital Infrastructure, Business Analytics, Cloud, Security & Emerging solutions. We deliver this technology expertise through a full life cycle model of professional, managed, and support services including strategy, consulting, implementation and design. By taking the time to deeply understand how our clients define success, we help them harness technology advances, simplify IT complexity and optimize their environments today while enabling future applications, user experiences, and revenue models.

Palo Alto Networks

Platinum

LogRhythm

Gold

SentinelOne

Gold

Amazon Web Services

Silver

Crowdstrike

Silver

Fortinet

Silver

OverWatchID

Silver

Cybereason

Bronze

F5

Bronze

Guardicore

Bronze

Infoblox

Bronze

Proofpoint

Bronze

Splunk

Bronze

Vectra

Bronze

Veeam

Bronze

Vertiv

Bronze

Vmware

Bronze

Zerto

Bronze

Apcon

Booth

Armis

Booth

BeyondTrust

Booth

Bitdefender

Booth

Bitglass

Booth

Bitsight

Booth

Capsule 8

Booth

Carbon Black

Booth

Checkpoint

Booth

Citrix

Booth

Cyber-X

Booth

Cymatic

Booth

Exabeam

Booth

Extrahop

Booth

Firemon

Booth

Idaptive

Booth

Ixia

Booth

Keyfactor

Booth

Mimecast

Booth

NetApp

Booth

Netscout

Booth

Netskope

Booth

Radware

Booth

Rapid7

Booth

Red Canary

Booth

Redseal

Booth

Rubrik

Booth

Signal Sciences

Booth

Silverpeak

Booth

Spirion

Booth

Tenable

Booth

Thales

Booth

ThreatX

Booth

Trendmicro

Booth

Unitrends

Booth

Varonis

Booth

VERA

Booth

Western Digital

Booth

Zscaler

Booth

Riverbed

Supporting

Snyk

Supporting

Sumo Logic

Supporting

Registration

07:30 AM 08:00 AM

Presidio - The Future of CyberSecurity

08:00 AM 08:50 AM Room 501

CE Credit (1) Join Advisory CISO Dave Trader, FBI CISO Academy, as he presents a connected smart world where automation of IoT makes historically arduous tasks simple and efficient. You will see the benefits of this connected world, initially through the eyes of a CIO. The capabilities you design are soon threatened by would be attackers, and Dave steps you into the mind of a CISO to ensure your design remains secure.

Speakers

Palo Alto - Your Journey to the Cloud, Secured

09:00 AM 10:00 AM Main Stage - Mile High Ballroom

Cloud adoption is a matter of “when”, not “if” for every organization. The companies that develop core competencies at cloud adoption will have a distinct advantage at driving value, managing costs and avoiding risk compared to those that don’t. How should organizations think about security and maximize their cloud potential?

In this session, you'll learn about the key requirements for cloud security:

- Controlling access to the cloud from anywhere
- Protect data stored within cloud applications
- Secure applications built in the cloud

Speakers

Splunk - Defense on a Budget: Free Security Tips and Tricks You Can Use Today

10:00 AM 10:50 AM Room 501

CE Credit (1) There is never enough budget or time to solve every security problem an organization faces. However, there are a lot of free or inexpensive tactics and techniques that every organization can leverage to make it harder for attackers to enter your environment. This presentation is a collection of basic tips and tricks learned from security professionals around the world These are tactics that either stop attackers in their tracks, or make it more difficult for them to succeed. You’ll walk away with actionable tips to fill your security gaps and help reduce your attack surface.

Speakers

OverwatchID - How a Password Vaulting Centric Approach to Privilege can Become a Warm Blanket In a Forest Fire

10:00 AM 10:50 AM Room 502

CE Credit (1) Emerging Risk with current technology trends like Cloud Transformation, MicroServices/Container architecture adoption, Workflow Automation tools, bots for hire (RPA's), and other automated tools present new challenges. Emerging/new attack vectors come with these challenges. Hackers are targeting Biomedical systems, IoT devices, and Industrial Systems, these vectors require Automation and a Governance Centric, session management approach. Password vault-centric solutions no longer solve these problems. Automated problems require automated solutions.

Speakers

Presidio - Security Strategy for Today's Expanded Attack Surface

10:00 AM 10:50 AM Room 503

CE Credit (1) 

Most organizations are unaware of the possible ways an attacker could compromise them. We will explore today's attack surface and discuss cybersecurity frameworks you can use to devise attack and defense strategies to protect your organization.

Speakers

SentinelOne - Active EDR vs Passive EDR – A Simple Automated Approach to Visibility and Protection

10:00 AM 10:50 AM Room 504

CE Credit (1) Passive EDR tools were designed to focus on the detection of suspicious activities on endpoints. These tools were different from earlier security solutions in that they did not necessarily focus on identifying specific malware but instead looked for anomalous activities. However, increased visibility means an increased amount of data that requires an increased amount of analysis and resources – time, money, bandwidth, a skilled workforce – that are in short supply. In addition, EDR, as it is known today, requires cloud connectivity, and as such will always be late with protecting endpoints. There will inevitably be some dwell time. A successful attack can compromise a machine, exfiltrate or encrypt data, and remove traces of itself in seconds. Waiting for a response from the cloud or for an analyst to take action in a timely manner is simply not feasible in the modern threat landscape. These drawbacks led SentinelOne to develop ActiveEDR, a technology that is capable of correlating the story in real-time on the device itself. ActiveEDR is an automated capability that takes the burden off the SOC team. It allows security teams to quickly understand the story and root cause behind a threat. ActiveEDR can autonomously attribute each event on the endpoint to its root cause alleviating any manual searching, hunting, correlating, and in some cases - guessing. This revolutionizes enterprise security. It can be used by businesses regardless of resources, from advanced SOC analysts to novice security teams, providing them with the ability to automatically remediate threats and defend against advanced attacks. In this session – - Discover the value and effectiveness of ActiveEDR - See a Live Attack Demonstration, Investigation and Remediation

Speakers

Veeam - Data Management for AWS and Azure

10:00 AM 10:50 AM Room 505

CE Credit (1) When making decisions to use AWS & Azure, moving & protecting workloads is a major factor in the decision-making process. Veeam’s Data Management Capabilities for AWS & Azure allows seamless backup and restoration for current AWS & Azure workloads and transformations for workloads from VMWare, Hyper-V, & Acropolis to AWS. Having a tool that will mesh the boundaries between On-Prem and Cloud will allow administrators speed of movement and managers flexibility in their data locality decisions. Come see this live demo where we will show these capabilities!

Speakers

Vectra - Building Security That Thinks – Machine Learning Fundamentals for Cybersecurity Professionals

10:00 AM 10:50 AM Room 506

CE Credit (1) Machine learning is the new hype in security to defend, detect, and respond. Equip yourself to critically evaluate the foundations of next generation AI-powered cybersecurity tools by understanding key machine learning algorithms, training methodologies, development options, and machine learning examples for attacker behavior detection. Cut through the hyperbole and empower yourself to ask insightful and probing questions that validate or expose vendor claims around AI.

Speakers

Cybereason - Indicators of Behavior: The New Way to Detect Advanced Attacks

11:00 AM 11:50 AM Room 501

CE Credit (1) For many cybercrime investigators, it’s all about indicators of compromise – hashes, URLs and other crime scene artifacts that can be gathered and compared to evidence from other crime scenes to determine what has occurred. But what if you were to shift away from gathering evidence and toward cataloging behaviors – indicators of behavior - what people, applications and systems are doing that could indicate an attack is ongoing or imminent? How does one make a strategic shift from IoC to IoB? What tools and skills are needed? What new standards and language must be developed? If you’re looking for answers to these questions, then please join me for an exclusive executive roundtable on Indicators of Behavior: The New Way to Detect Advanced Attacks. Join Dani Wood, Senior Director of Advisory Services at Cybereason, to hear insights about IoB and the massive attack on telecommunications providers that we exposed.

Speakers

Mist a Juniper Company - Transforming Experiences with the AI-Driven Enterprise

11:00 AM 11:50 AM Room 502

CE Credit (1) Today’s networks and IT teams are challenged by the soaring numbers of mobile and IoT devices and apps. Learn how data science, AI and a modern microservices cloud architecture can deliver the agility, scale and reliability that businesses need to succeed. Mist, a Juniper Company, is transforming user and IT experiences with its AI-Driven Enterprise through proactive automation and relevant insights while ultimately evolving towards a self-driving network. In this session, you’ll learn why three of the Fortune 10 companies, along with thousands of other organizations, are adopting Mist to deliver new services, assure network performance, and streamline help-desk operations.

Speakers

Infoblox - Bridging Islands of Security

11:00 AM 11:50 AM Room 503

CE Credit (1) To handle their network security needs, most organizations rely on many different products and services from multiple vendors. Often these solutions lack integration and are not able to quickly and easily share critical security information. The resulting silos can create costly delays, hinder agility and visibility, and result in a diminished security posture. Join Infoblox for a session on how to bridge the islands of security that expose your network to ongoing risk. During this discussion, you’ll see firsthand how solutions from Infoblox empower your security teams to: - Enhance visibility across your extended network regardless of infrastructure complexity - Automatically share indicators of compromise across multivendor security systems - Get the most out of your cyber threat intelligence and network data to prioritize responses using rich context - Detect, contain, and remediate threats faster through response integration Attend this session to learn how to unify your threat response and find ways to more rapidly and efficiently respond to cyber threats.

Speakers

Vertiv - How to Create Your Own Secure Critical Space

11:00 AM 11:50 AM Room 504

CE Credit (1) Are you considering building a new server/IT room at your facility for edge computing or disaster recovery? Join Kelley Babin, VP of ?? at Aimco (one of the nation’s largest apartment operators and developer) and Mike Beck, CMO of DVL (local Vertiv/Liebert office) as they present on why and how Aimco recently installed a new server room in their Corporate Headquarters in Centennial. Kelley will cover the business need and the solutions they considered. He will also cover the applications they are intending to support from this location. Mike will cover the Liebert Smart Row from Vertiv and how it works. They will wrap it up with lessons learned and Q and A.

Speakers

LogRhythm - A Roadmap to Security Operations Maturity

11:00 AM 11:50 AM Room 505

CE Credit (1) Effective security operations are the first line of defense when it comes to preventing cyberattacks. To accomplish this, organizations need mature and measurable programs that leverage people, process, and technology to rapidly detect and respond to sophisticated attacks. This session introduces a model that explores how to assess and evolve the principle programs of an organization’s security operations center (SOC). Organizations can use this model as a basis to evaluate their current security operations maturity level and develop a roadmap to achieve the level that is appropriate in the light of their specific resources, budget, and risk tolerance.

Speakers

Vmware - Securing your most Critical Assets in the Data Center

11:00 AM 11:50 AM Room 506

CE Credit (1) The Network perimeter is gone. A Perimeter centric approach to security is not working so what should you do? Ensuring that Security is an integral part of your platform is critical to success for the future.

Speakers

Centura Health - On Prem to Cloud - Governing the Risk

11:00 AM 11:50 AM Room 507

CE Credit (1)

Speakers

Tradeshow

11:45 AM 12:15 PM Mile High Ballroom

Aruba - Artificial Intelligence for Cybersecurity

12:15 PM 01:15 PM Main Stage - Mile High Ballroom

We are living in an era of relentless cyberattacks. Cyberthreats are a grave national security challenge facing the U.S. today, and they have a significant impact on our economy. In 2016, cyber criminals stole more than 4 billion records, and cybercrimes were estimated to cost the American economy between $57 and $109 billion. In 2019, cybercrimes are expected to be a $2.1 trillion problem for the global economy. In recent years, new cybersecurity threats have emerged and evolved, and new kinds of threats that we haven't even imagined yet are on the horizon, fueled by Artificial Intelligence. In this presentation we'll explore the landscape of AI and how it applies to cybersecurity, some of the special risks involved with deploying AI from a practitioners perspective, and also useful questions to ask potential vendors as they position solutions that utilize AI.

Speakers

Tradeshow

01:15 PM 01:45 PM Mile High Ballroom

Crowdstrike - 1/10/60 Minute Challenge: Defenders Win, Adversaries Lose

01:45 PM 02:35 PM Room 501

CE Credit (1) CrowdStrike's 2018 Global Threat Report details how adversaries typically dwell for 1 hour and 58minutes before taking action after they've initially gained access to a machine. This "Breakout time", is all the time until an intruder jumps from the machine that’s initially compromised and moves laterally through your network.
This is a crucial window to stop the breach, but is not the only metric you need to know. When an attack is in progress, you have on average of one minute to detect it, 10 minutes to understand it and one hour to contain it. Is your organization ready to meet the 1/10/60 minute challenge?
Join CrowdStrike security experts for an important, in-depth discussion of the common hurdles organizations face in establishing an effective IR process. You will also learn how next-gen
technology including endpoint detection and response (EDR) can help you overcome them.
Attend this session to hear CrowdStrike experts discuss:
What breakout time is and what it means for defenders that are responding to attacks in real time
How the incident response process unfolds and the barriers that keep organizations from mounting a rapid and efficient response
The key steps you can take to improve your organization’s ability to rapidly detect, investigate and remediate threats
Best practices for preventing, detecting in less than 1 minute, analyzing in less than 10 minutes, and responding in less than 60 minutes to stop adversaries

When you can detect, analyze, and recover before the 1 hour and 58 minutes from initial compromise, you WIN, and the adversaries LOSE!

Speakers

AWS - The Fundamentals of AWS Cloud Security

01:45 PM 02:35 PM Room 502

CE Credit (1) The services that make up AWS are many and varied, but the set of concepts you need to secure your data and infrastructure is simple and straightforward. By the end of this session, you will know the fundamental patterns that you can apply to secure any workload you run in AWS with confidence. We cover the basics of network security, the process of reading and writing access management policies, and data encryption.

Speakers

Fortinet - Digital Transformation – Securing the Connected Enterprise and Nation

01:45 PM 02:35 PM Room 503

CE Credit (1) The risk management methodology is based on measuring cybersecurity effectiveness based on the reasonable care standard. The reasonable care standard is embodied in nearly all best practices and compliance frameworks including NIST CSF, ISO, GDPR etc. The presenter will outline elements of a reasonable level of effort and an updated approach based on Continuous Adaptive Risk and Trust assessment (CARTA) which addresses the root causes of data breaches and destructive cyber attacks. The approach uses updated traditional network segmentation, Zero Trust and Continuity-of-Operations strategies to ensure continuous identification, protection, detection, response and recovery based on adaptive trust for need-know access.

The strategy aims to ensure:
a) identification of all things connected to network/ecosystem
b) verification of device state
c) authentication of user
d) validation of access request
e) logging and monitoring of all traffic for behavior-based detection
f) encryption based on criticality

Speakers

F5 - A Behavioral Approach to Web Application Security

01:45 PM 02:35 PM Room 504

CE Credit (1) In an ideal world, security controls would be as loose as possible for well-behaved legitimate users and increasingly tightened around bad actors. Join us as we discuss a behavioral approach to identifying and thwarting attacks against your web applications from highly skilled threat actors.

Speakers

Guardicore - Fire Your Firewall: Rethinking Network Security

01:45 PM 02:35 PM Room 505

CE Credit (1) Keeping up with current rate of innovation that businesses are implementing to stay competitive in challenging markets has forced IT organizations to rethink how they’re deploying applications and managing systems. One piece that continues to lag behind is how security teams are securing these complex, hybrid and multi-cloud networks. Traditional firewall solutions do not scale well and present operational challenges within these new complex networks. It’s time for IT and Security organizations to rethink their approach to network security and leverage solutions that are designed for addressing the unique challenges of securing hybrid and multi-cloud environments. This session will focus on how to better address the challenge of securing these complex networks and help your organization implement consistent security controls, while continuing to innovate at the rate needed to compete in today’s marketplace.

Speakers

Zerto - A New Era for Data Protection - Converged DR and Backup

01:45 PM 02:35 PM Room 506

CE Credit (1) In today's always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key! The cost and business impact of downtime and data loss can be immense. Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters. Having a plan and process in place will help you mitigate the impact of an outage on your business. In this presentation we will address the challenges, needs, strategies, and solutions.

Speakers

Presidio - Vulnerability Threat & Risk Management: A New Approach to an Age Old Problem

01:45 PM 02:35 PM Room 507

CE Credit (1) Vulnerabilities are far to often treated as a point in time object to be dealt with in our infrastructures. How do we start addressing Threats and Risks to our organizations as information security professionals when far to often, we don’t manage the actual patching or much less the actual configuration of the device in question? Dealing with infrastructure teams to show support and growth in our common goals of improving the overall security of the environment can be a daunting challenge. Come hear how Presidio is addressing these common problems with a new methodology to an age old issue.

Speakers

Proofpoint - Solving for Business Email Compromise (BEC) and Other Forms of Email-based Identity Deception

02:45 PM 03:35 PM Room 501

CE Credit (1) While the Digital Revolution made business more efficient, it moved relationships to a vulnerable communications medium (email) and exposed information online perfectly fit for social engineering purposes. The result is unprecedented email fraud, the latest manifestation of which is called Business Email Compromise (BEC) or ‘wire-transfer fraud’. Businesses around the world reported $12.5B in BEC losses to the FBI since 2013 and Google and Facebook recently lost a combined $123M.

Join Proofpoint’s Director of Product, Ash Valeski, to learn how BEC and other forms of email fraud work and how to combat it with email authentication (DMARC) and look-alike domain detection.

Speakers

Palo Alto - Take a Smarter Approach to Cybersecurity with the Next-Generation in Security Operations

02:45 PM 03:35 PM Room 502

CE Credit (1) Visibility into complex data and automation are key requirements in today’s security operations center infrastructure (SOC). Meet the future of SOC, an adaptive, next-generation approach that transforms your security environment, reduces your attack surface, accelerates detection and response, and improves collaboration and alignment across the business.
Join us for this presentation and gain insight from an exclusive view of how Palo Alto Networks operates its security operations center.

Speakers

Presidio - Security Strategy for Today's Expanded Attack Surface

02:45 PM 03:35 PM Room 503

CE Credit (1) 

Most organizations are unaware of the possible ways an attacker could compromise them. We will explore today's attack surface and discuss cybersecurity frameworks you can use to devise attack and defense strategies to protect your organization. 

Speakers

SentinelOne - Active EDR vs Passive EDR – A Simple Automated Approach to Visibility and Protection

02:45 PM 03:35 PM Room 504

CE Credit (1) Passive EDR tools were designed to focus on the detection of suspicious activities on endpoints. These tools were different from earlier security solutions in that they did not necessarily focus on identifying specific malware but instead looked for anomalous activities. However, increased visibility means an increased amount of data that requires an increased amount of analysis and resources – time, money, bandwidth, a skilled workforce – that are in short supply. In addition, EDR, as it is known today, requires cloud connectivity, and as such will always be late with protecting endpoints. There will inevitably be some dwell time. A successful attack can compromise a machine, exfiltrate or encrypt data, and remove traces of itself in seconds. Waiting for a response from the cloud or for an analyst to take action in a timely manner is simply not feasible in the modern threat landscape. These drawbacks led SentinelOne to develop ActiveEDR, a technology that is capable of correlating the story in real-time on the device itself. ActiveEDR is an automated capability that takes the burden off the SOC team. It allows security teams to quickly understand the story and root cause behind a threat. ActiveEDR can autonomously attribute each event on the endpoint to its root cause alleviating any manual searching, hunting, correlating, and in some cases - guessing. This revolutionizes enterprise security. It can be used by businesses regardless of resources, from advanced SOC analysts to novice security teams, providing them with the ability to automatically remediate threats and defend against advanced attacks. In this session – - Discover the value and effectiveness of ActiveEDR - See a Live Attack Demonstration, Investigation and Remediation

Speakers

LogRhythm - Capture the Flag Workshop

02:45 PM 03:35 PM Room 505

CE Credit (1) Join LogRhythm for an interactive capture the flag challenge, where we will walk you through hands-on exercises and help strengthen your threat hunting skills. During this workshop you will:

  • Investigate simulated alarms and incidents to uncover malicious activity
  • Collaborate with other attendees to gather evidence, analyze logs, and build a case
  • Compete against your peers and strengthen your analyst skills

Speakers

Aruba - NetOps and SecOps: Are We Really So Different?

02:45 PM 03:35 PM Room 506

CE Credit (1) It’s difficult to generalize about modern IT organizations, but in almost all cases the network operations team is separate from the security operations team. In some cases, they report to the same CIO but in other cases they have completely different reporting relationships. It’s no wonder that we commonly find an adversarial relationship between the two teams – one of them is measured on keeping the packets flowing while the other would achieve much better results if NO packets flowed at all. But given the modern threat landscape, we can no longer afford this artificial dividing line. The network has a role to play in detecting and stopping security threats, and that means the two sides must work together. This session explores the issue and proposes practical solutions.

Speakers

Securing Modern Web Applications

02:45 PM 03:35 PM Room 507

CE Credit (1) Over the last several years we have experienced a dramatic shift in the way web applications are built, the pace and method in which they are deployed and the approaches needed to successfully secure these applications, particularly as teams embrace the shift to DevOps and agile development while simultaneously moving into the cloud. In this talk we’ll explore these trends by looking at the challenges presented to existing application security programs in embracing this change and best practices for providing visibility and easing adoption of effective application security controls once applications have been deployed into production.

Speakers

Real World Security Challenges in 2019 - Theresa Payton

03:45 PM 04:45 PM Main Stage - Mile High Ballroom

It seems like the cyber criminals are winning. Data breaches continue to dominate the news. But we can’t let them win.

Are you wondering what 2020 will bring? Or maybe next week?
You already know new technology is integrating into your homes and at work. What’s hype? What’s reality? Will these technologies be friend or
Foe to your security approach?

Theresa Payton will lead the audience through:

(1) real world challenges and how to leverage Blockchain, Cryptocurrency, Artificial Intelligence, Machine Learning & the Internet of Things to make them your new BFF for your security strategy.

(2) She has some 2020 predictions in cybercrime and how to make sure you are ahead of the cybercriminals tactics.

Everyone will walk away with a new tactic that will improve security without breaking the budget. 

Speakers

Happy Hour

04:45 PM 06:00 PM Mile High Ballroom