Presidio presents:

Presidio's Red Sky Security Conference 2019

October 9, 2019
The Colorado Convention Center

Denver, CO

There has never been a time where Cybersecurity has had so much to consider; from big data, artificial intelligence, and machine learning to cybercrime, intelligent malware, and global compliance. It’s clear that every IT role is now a security role.

The purpose of the Red Sky Security Conference is to educate, elevate, and influence the discussion and practice of information security in this ever-changing landscape. Expect top security speakers, expert education, peer interactions, and both established and emerging technology demonstrations.

More Details

Why Attend?

Best Practices
Come learn from the experts who are here to share stories and lessons learned. From CISO to CTO to Whitehat Hacker, we've assembled an incredible cross-section of cyber-security talent.
Security Trends
It is an ever growing and changing landscape. Learning the latest threats and trends helps you and your organization be more prepared for them.
 
Top & Emerging Technologies
We have brought together a fantastic collection of established and emerging technology companies - All ready to discuss cutting-edge tools that better secure and protect your company data.
SHOW
YOUR EXPERTISE.
BUILD
YOUR NETWORK.
DISCOVER
THE LATEST TRENDS.
FREE LUNCH & SNACKS
DON'T MISS IT.

Keynote Speakers

Speakers

Expo Sponsors

Experience the Hacker Lounge

Join us at the Hacker Lounge where you can rest, recharge, learn, and have some fun. We will be hosting a number of self-paced workshops to hone an existing skill or maybe learn a new one. Presidio’s security engineers will be on hand for mingling or Q&A. We’ll be having a contest with prizes for the winners (hint – work on your typing skills).

Schedule

  • 09 October

Transportation

Don’t want to drive? Take RTD LightRail or the free Mallride
  • LightRail- Line D (Littleton), Line F (Lone Tree-I25 S. Corridor), and Line H (Aurora) all stop at the Theatre District-Convention Center
  • LightRail- Line G (Wheat Ridge), Line W (Golden), Line B (Westminster), Line FF (Boulder-US 36 corridor) all go to Union Station
  • From Union Station take the Free 16th st. Mallride to California St. Then walk just 2 blocks south to the Convention Center.

More Information

Location

700 14th St, Denver, CO 80202

Theresa Payton

President & CEO / Founder
Fortalice Solutions, LLC and Dark3
Former White House CIO & Cybersecurity Authority

In the wake of recent, debilitating cyberattacks at Equifax, Sony Pictures, Target and privacy breaches against prominent individuals in the public eye, Theresa Payton remains the cybersecurity and intelligence operations expert that people and companies turn to in order to strengthen their privacy and cybersecurity. She is featured in the 100 Fascinating Women Fighting Cybercrime book. Theresa is named by IFSEC Global as the 4th among the top 50 of the world's cybersecurity professionals and by Security Magazine as one of the top 25 Most Influential People in Security, she is one of America's most respected authorities on security and intelligence operations.

The first female to serve as White House Chief Information Officer, Payton oversaw IT operations for the President and his staff from 2006 to 2008 during a period of unprecedented technological change and escalating threats. Previously, she held executive roles in banking technology at Bank of America and Wells Fargo.

Currently, as the founder, president and CEO of a world class cybersecurity consulting company, Fortalice Solutions, LLC and co-Founder of Dark3, a cybersecurity product company, she remains the expert that organizations call for discretion, proactive solutions, and incident response/crisis management. Fortalice was recently named one of the Top 5 Innovative Cybersecurity companies in the D.C./MD/NoVa region and Theresa was recently awarded the Enterprising Women of the Year Award for the 2nd year in a row.

Payton was recently featured as the Deputy Director of Intelligence Operations in the new hit reality show CBSʼ Hunted. Payton collaborated with cybersecurity and privacy attorney, Ted Claypoole, to author two books focused on helping others learn how to protect their privacy
online. Hailed as ʻmust-reads,ʼ by Jon Stewart when he talked to Payton on The Daily Show and by Katie Couric on her show Katie's Take the books assist the laymen with the security and privacy challenges of our times.

Payton is often sought out by national and international media news outlets to explain complex security issues in business and consumer terms to get behind the hype to understand, in laymanʼs terms, how to protect your privacy and security. She has been a repeat guest on the
Today Show, Good Morning America, Fox Business Shows, Fox News Shows, CBS Morning & Evening News, BBC TV News and Radio, CBSN, CNN, NBC News, MSNBC, and NPR. Recognized as a 2015 William J. Clinton distinguished lecturer by the Clinton School of Public Service, Payton passionately protects her clients, from the boardroom to the server room, and helps them understand the business risks to their organizations cybersecurity. She and her team provide insight and methods critical to protecting people and organizations from rapidly evolving cyberattacks.

09 October

Ash Valeski

Director of Product
Proofpoint
Ash has spent his career building software products that facilitate digital communications for companies like Microsoft, Skype, and Tellme Networks, and is based in Denver, Colorado.

09 October

Cameron Williams

CTO & Co-Founder, Interim CEO
OverwatchID
For more than 25 years, Cameron Williams has helped enterprise clients like IBM, Wells Fargo (WAMU), Sony, BP, KPMG, Boeing, Spirt Aero, LAM, and dozens others keep their data safe and secure from data breaches, hacks, ransomware, and spear-phishing. As OverWatchID’s CTO, Cam leads all product design and product development, and is responsible for ensuring that that OverWatchID’s cloud-based converged identity security platform is meeting existing and future threats to identity security.

Cam has leveraged his deep expertise in high-profile data breach mitigation efforts on behalf of the entertainment industry, oil and gas, finance, high tech, and other Fortune 500 firms. Prior to co-founding OverWatchID, Cam held senior positions with InteliSecure, Juniper Networks, Pulse Secure, Virtela Technology Services, IBM, and MCI. Cam studied computer science at North Carolina State University and pre-med at Penn State University. Cam lives in Denver with his daughter Alaura and dog Zoe. He is a competitive Ironman and is an internationally ranked parathlete.

09 October

Chris Morales

Head of Security Analytics
Vectra
Chris is Head of Security Analytics at Vectra, where he analyzes attacker behaviors that occur across millions of hosts inside enterprise networks globally to identify patterns and trends in cybersecurity. He has nearly two decades of information security experience in an array of cybersecurity architecture, consulting, sales, and research roles with a primary focus on incident response and security operations. Chris is a widely respected expert on cybersecurity issues and technologies and has researched, written and presented numerous information security architecture programs and processes.

09 October

Chris Petersen

Chief Product and Technology Officer
LogRhythm
Chris Petersen co-founded LogRhythm in March 2003 and has served as a member of our board of directors and Chief Technology Officer (CTO) since our inception. Mr. Petersen currently serves as LogRhythm’s Chief Product and Technology Officer (CPO/CTO). In his current role, he is responsible for product from concept to delivery as the executive leader for Product Management, Engineering, and LogRhythm Labs. Mr. Petersen has served in a variety of other executive roles at LogRhythm including SVP of Products, SVP of Research & Development and SVP of Customer Care.

09 October

Craig Sanderson

VP Product Management
Infoblox
Craig Sanderson is the Vice President of Product Management for Infoblox. Craig has been in the security industry for 19 years in variety of roles including: Technical Consultant, Solution Architect, Product Manager, and Business Development Manager. Having worked on a range of security technologies, Craig is now focused on developing solutions that prevent the abuse of DNS and enabling customers to leverage their network infrastructure to better secure their data, assets, and people.

09 October

Dan DesRosiers

Security Specialist
Aruba
As Director of Security Sales for Aruba Southwest Area, Dan is responsible for driving product preference and adoption of the Aruba Cyber Security Solutions. Engaging with Customers, Partners and Aruba Sales Teams for mutual success. Dan started in networking and compute technologies over 25 years ago and has served in many technical, consulting, sales and leadership roles. He’s had the privilege of running his own technology firm, and has worked for Xerox, Cisco Systems, IBM, NEC, Cylance and Aruba, an HPE Company.

09 October

Danielle Wood

Senior Director of Advisory Services
Cybereason
Danielle Wood, Senior Director of Advisory Services has extensive experience in eDiscovery, Digital Forensics & Incident Response. Her career spans 30 years including 15 years of experience in investigations for Federal, State and Local law enforcement as well as Fortune 500. Ms. Wood holds the following certifications: GCFA, GCIH, GREM & GPEN. She currently helps customers work with EDR platform integration to support such efforts as IR and integration of the Mitre Att&ck framework into Security Operations Processes.

09 October

Dave Trader

Cyber Security Consultant
Presidio
Dave Trader has been in CyberSecurity for over 15 years now. Dave began his career as United States Marine serving in both OIF (Operation Iraqi Freedom) and OEF (Operation Enduring Freedom) where Dave specialized in encryption as a Signals Intelligence and Communications expert.

Dave is certified in over 70 different areas of CyberSecurity; most notably CISSP, CISM, and as an Ethical Hacker. Dave has an MBA with a specialty in Information Technology and a Bachelor’s Degree in Criminal Justice. Dave is most recently a graduate of the FBI CISO Academy out of Quantico, VA. Dave also serves on the University of Detroit Mercy NSA Center of Excellence CyberSecurity Advisory Board, and is a coach for the USAF Cyber Patriot Program.

Prior to joining Presidio, Dave was a CISO for seven years at a technology company out of Detroit. Dave specializes in high-security design and architecture and has been a preferred consultant for the financial sector for securing their environments.

09 October

Dwann Hall

Sr. Manager, Enterprise Product Marketing
Juniper
Dwann is a passionate technologist with 20yrs of deep network architecture and security expertise. He possesses a rare ability to be equally comfortable with having business outcome discussions with Senior Executives, as he is in highly technical proof of concept engagements with Architects and Engineers. Dwann has a unique talent for articulating complex solutions while relating them to the business problems that a customer is experiencing, or growth opportunities that they may be exploring.

Prior to joining Juniper, Dwann served in a number of Architect and Sr. Engineering roles for a number of companies, such as Nokia, building out Internet scale data centers, serving users in the hundreds of millions.

Dwann joined Juniper in 2012 as a Systems Engineer in Territory, Major and Strategic Account capacities. After a brief stint with another manufacturer, Dwann rejoined Juniper in 2017 as a Security Overlay, supporting Account Teams throughout North America. In 2019, he joined the Enterprise Product Marketing Team, supporting Security.

09 October

Garrett Weber

Director, Sales Engineering
Guardicore
Garrett Weber is the Director of Sales Engineering at Guardicore, where he works with organizations to design solutions to solve their complex security and infrastructure challenges. Prior to Guardicore, Garrett spent the last 10 years working in various security roles, in the Insurance, Healthcare and Consulting industries. Garrett also spent 12 years in the Air National Guard as part of an elite Network Warfare Squadron that worked alongside both the Air Force Computer Emergency Response Team (AFCERT) and the Defense Information Systems Agency (DISA).

09 October

Geoff Shukin

Staff Systems Engineer, Networking and Security Business Unit
VMware
Geoff Shukin is a technical subject matter expert in Cyber Security within VMware’s NSBU organization. Geoff provides thought leadership and relevant real-world experience to help drive infrastructure cyber security maturity improvements across organizations, in line with the changing Threat Landscape as well as Regulatory and Compliance requirements.

Prior to joining VMware, Geoff worked with Palo Alto Networks, Cisco and Nortel with a strong focus on security.

09 October

Jason Teplitz

Manager, Sales Engineering, Public Sector
Crowdstrike
Jason Teplitz has spent 16+ years working for Computer Security software manufacturers, including Check Point, Symantec & CrowdStrike, in Sales Engineering, Architecture and Consultative roles. Jason possesses expertise in several areas of Cybersecurity including Network, EndPoint and Mobile technologies, but his latest roles have focused on EndPoint and Incident Response. Mr. Teplitz lives in Boulder, Colorado, but is originally from the Chicagoland area.

09 October

Jess Fuquay

Technical Partner Manager
Veeam
Jess Fuquay is the Technical Partner Manager for Presidio at Veeam Software. He has been in the data protection space for 18 of his 30 years in Information Technology. His presales engineering experience covers SLED, Commercial, Enterprise, and Partner relationships. He lives in Nazareth PA with his wife for 22 years, his two sons, and two dogs. Favorite pastime – cooking. Ask him for a recipe!

09 October

Joe Martin

Security Solutions Architect
F5
Joe is a Security Solutions Architect for F5 Networks where he consults with organizations to identify security weaknesses in their infrastructure and applications. He has over 25 years’ experience, focusing on network and application security.

09 October

Jonathan Nguyen-Duy

Vice President, Strategy & Analytics
Fortinet
Jonathan Nguyen-Duy leads Strategy and Analytics Programs at Fortinet where he focuses on emerging technologies and partnerships. With extensive experience working with global enterprises and nation-states, Jonathan is responsible for developing innovative security solutions addressing the challenges of digital transformation – from the IoT edge to the cloud.
Prior to joining Fortinet, Jonathan served as the Security CTO at Verizon Enterprise Solutions where he was responsible for strategic technology partnerships, the Verizon Cyber Intelligence Center, and the data science team that produces the annual Verizon Data Breach Investigations Report. Before that role, he led the Security Services line-of-business and was responsible for data analytics and solutions supporting military-grade continuous diagnostics and mitigation. Jonathan also led the development of Verizon’s hosting services and business continuity practice. His research experience spans more than 10,000 data breach investigations and dozens of published reports.
Before Verizon, Jonathan served with the U.S. Foreign Service in Central America working on economic development and disarmament initiatives. He has more than 20 years of cybersecurity and BCDR/COOP experience – working through many business challenges including armed conflict, civil strife, labor strikes, natural disasters, terrorist attacks, network outages and a wide range of cyber attacks.
Jonathan is a widely published security expert and frequent speaker at industry conferences. Jonathan holds a BA in International Economics, as well as an MBA in IT Marketing and International Business from the George Washington University.
Specialties: Cybersecurity, SIEM, Data Analytics, Artificial Intelligence, Machine Learning, Continuous Monitoring, Physical Security, Business Continuity/COOP, Managed Services, Risk Management and Digital Transformation.

09 October

Kevin Kornblith

Systems Engineer
Zerto
Kevin Kornblith has over 16 years of IT experience with server administration, backups, storage, and monitoring with a
focus on virtualization as both an system administrator and in various engineering consulting roles. For the last 4 years he has been both learning and educating in a new era of IT Resilience working as a Solutions Engineer for Zerto.

09 October

Michael Beck

Chief Marketing Officer
Vertiv
Since 1984, Mike has served in many roles at DVL. Starting as a sales engineer, he successfully helped grow DVL through great customer relationships and successful projects. In the early 2000’s as President, he managed and grew DVL’s team of Data Center Engineers. From 2012 through 2016 he served as the CEO of DVL, managing the company through many industry transitions. In 2017, he is excited to focus on his passion for the marketing of DVL, using his 33 years of experience to best serve the customers and all employee owners.
Mike earned his Architectural Engineering degree from Penn State in 1978. He enjoys free time with his family, Penn State football, golfing, and skiing.

09 October

MB

Michael Breen

Consulting Engineer
Palo Alto Networks

09 October

Mike Ronan

Security Engineer, Global Security Sales Organization
Cisco
Mike Ronan is a Security Engineer with the Cisco Global Security Sales Organization partner team. Mike has been with Cisco 18 years working in various engineering and architecture roles. Mike is located in New York

09 October

09 October

Nancy Phillips

Chief Information Security Officer (CISO)
Centura Health
Nancy Phillips is the Chief Information Security Officer (CISO) responsible for providing leadership and strategic direction for proactively combating data security risks for the evolving digital and health care needs of Centura Health.

Nancy has more than 30 years of experience in all aspects of the data security arena from architecting secure solutions, establishing security programs or running large organizations responsible for security operations delivery. She began her career in the military intelligence community and then transitioned to consulting, where she designed and implemented security technologies and programs including multiple 24x7 security service capabilities for managed services or for organizations. Her most recent role before joining Centura Health was as the CISO for Datavail where Nancy was responsible for the execution of security controls as well as maintaining a strong governance, risk and compliance program.

Nancy holds a bachelor’s in computer information systems management from Colorado Christian University as well as her Certified Information Systems Security Professional (CISSP) certificate. Nancy is a founding member of a special interest group through Information Systems Security Association (ISSA) Denver Chapter called Women in Security, and serves as a Community Outreach Chair.

09 October

Quince Rickard

Enterprise SE
LogRhythm

09 October

Rich Bakos

Director of Solutions Engineering
LogRhythm

09 October

Robert Wagner

Security Strategist
Splunk
Robert Wagner is a security professional with 15+ years of InfoSec experience. He is a co-founder of the “Hak4Kidz” charity and a co-founder of BurbSecCon in Chicago, and is on the Board of Directors of the ISSA Chicago Chapter.

09 October

Ron Kent

Technical Specialist, Americas
Aruba
Ron Kent is a technical specialist for the Aruba IntroSpect behavioral analytics solution, and is based in Dallas, Texas. Ron is a 28 year veteran of the IT industry, a Certified Ethical Hacker, and has worked at companies such as RSA, Sybase, Business Objects, and Mattel. Before his time at HP Aruba, he spent almost a decade at RSA helping customers hunt down the forces of evil with SIEM and full packet capture solutions. When he isn't tracking down the bad guys in the digital world, Ron enjoys spending time with his wife and family, and riding motorcycles in the Texas Hill Country.

09 October

Ryan Shevchik

Senior Solutions Architect
AWS
Ryan Shevchik is a Senior Solutions Architect with AWS. At AWS, Ryan focuses on the partner community, enabling strategic consulting partners to deliver solutions on AWS following best practices. Prior to joining AWS Ryan spent 16 years with large and small consulting firms, helping customers solve problems using his expertise around database, NoSQL, and big data technologies.

09 October

Sam Masiello

Chief Information Security Officer (CISO)
Gates Corporation
Sam Masiello has been working with email, messaging, and fighting internet pollution for over 25 years. Mr. Masiello currently serves as the CISO at Gates Corporation where he is responsible for the company's data security, risk, and global compliance initiatives. Prior to Gates, he served as the CISO at TeleTech where he oversaw the protection of employee, consumer, and customer data for all of the organization's clients, which includes many Fortune 500 companies.

Sam has also been the Chief Security Officer, head of Application Security, and head of Security research at companies such as Groupon, Return Path, and McAfee. He currently serves as Director-at-Large of The Coalition Against Unsolicited Commercial Email (CAUCE), National Advisory Board Member for SecureWorld, and is an Executive Board Member of Colorado Cyber. He has previously served as a member of the Board of Directors for the Messaging, Malware, and Mobile Anti-Abuse Working Group (M3AAWG), the Steering Committee of the Online Trust Alliance (OTA) and a member of the Anti-Phishing Working Group (APWG)

Tommy Hui

Sr. Director of Solutions Engineers
SentinelOne
Tommy Hui serves as a Sr. Director of Solutions Engineers for SentinelOne where he is responsible for managing technical sales activities for the western half of the US. Previously, Tommy was the Director of Sales Engineering for Fidelis, also overseeing activities for the Western US and supporting cross functional activities related to product management and development. Prior to Fidelis, he worked as a civil service employee for the Federal Government supporting the United States Air Force Cyber Weapon System Programs as a Lead Defensive Cyber Systems Engineer. Tommy is also a Certified Information Systems Security Professional (CISSP).

09 October

09 October

Tyler Theys

Vice President of Security Consulting
Presidio

09 October

Presidio

Host
Presidio is a leading North American IT solutions provider focused on Digital Infrastructure, Business Analytics, Cloud, Security & Emerging solutions. We deliver this technology expertise through a full life cycle model of professional, managed, and support services including strategy, consulting, implementation and design. By taking the time to deeply understand how our clients define success, we help them harness technology advances, simplify IT complexity and optimize their environments today while enabling future applications, user experiences, and revenue models.

Palo Alto Networks

Platinum

LogRhythm

Gold

SentinelOne

Gold

Amazon Web Services

Silver

Crowdstrike

Silver

Fortinet

Silver

OverWatchID

Silver

Cybereason

Bronze

F5

Bronze

Guardicore

Bronze

Infoblox

Bronze

Proofpoint

Bronze

Splunk

Bronze

Vectra

Bronze

Veeam

Bronze

Vertiv

Bronze

Vmware

Bronze

Zerto

Bronze

Apcon

Booth

Armis

Booth

BeyondTrust

Booth

Bitdefender

Booth

Bitglass

Booth

Bitsight

Booth

Capsule 8

Booth

Carbon Black

Booth

Checkpoint

Booth

Citrix

Booth

Cyber-X

Booth

Cymatic

Booth

Exabeam

Booth

Extrahop

Booth

Firemon

Booth

Idaptive

Booth

Keyfactor

Booth

Mimecast

Booth

NetApp

Booth

Netscout

Booth

Netskope

Booth

Qumulo

Booth

Radware

Booth

Rapid7

Booth

Red Canary

Booth

Redseal

Booth

Rubrik

Booth

Signal Sciences

Booth

Silverpeak

Booth

Spirion

Booth

Supermicro

Booth

Tenable

Booth

Thales

Booth

ThreatX

Booth

Trendmicro

Booth

Unitrends

Booth

Varonis

Booth

Vera

Booth

Western Digital

Booth

Zscaler

Booth

Sumo Logic

Supporting

Registration

07:30 AM 08:00 AM

Presidio - The Future of CyberSecurity

08:00 AM 08:50 AM Room 501

Join Advisory CISO Dave Trader, FBI CISO Academy, as he presents a connected smart world where automation of IoT makes historically arduous tasks simple and efficient. You will see the benefits of this connected world, initially through the eyes of a CIO. The capabilities you design are soon threatened by would be attackers, and Dave steps you into the mind of a CISO to ensure your design remains secure.

Speakers

TBD - Breakout/Workshop

08:00 AM 08:50 AM Room 502

Palo Alto General Session

09:00 AM 10:00 AM Main Stage

Splunk - Defense on a Budget: Free Security Tips and Tricks You Can Use Today

10:00 AM 10:50 AM Room 501

There is never enough budget or time to solve every security problem an organization faces. However, there are a lot of free or inexpensive tactics and techniques that every organization can leverage to make it harder for attackers to enter your environment. This presentation is a collection of basic tips and tricks learned from security professionals around the world These are tactics that either stop attackers in their tracks, or make it more difficult for them to succeed. You’ll walk away with actionable tips to fill your security gaps and help reduce your attack surface.

Speakers

OverwatchID - How a Password Vaulting Centric Approach to Privilege can Become a Warm Blanket In a Forest Fire

10:00 AM 10:50 AM Room 502

Emerging Risk with current technology trends like Cloud Transformation, MicroServices/Container architecture adoption, Workflow Automation tools, bots for hire (RPA's), and other automated tools present new challenges. Emerging/new attack vectors come with these challenges. Hackers are targeting Biomedical systems, IoT devices, and Industrial Systems, these vectors require Automation and a Governance Centric, session management approach. Password vault-centric solutions no longer solve these problems. Automated problems require automated solutions

Speakers

Cisco - Cisco Threat Hunting Workshop Overview

10:00 AM 10:50 AM Room 503

During this session we will provide an overview of a typical Cisco Threat Hunting Workshop. We will walk through the Cisco threat hunting tools and provide a live demonstration on some of the use cases we use during the threat hunting workshop. Gain a basic understanding of threat hunting using Cisco Threat Response. 

Speakers

SentinelOne - Active EDR vs Passive EDR – A Simple Automated Approach to Visibility and Protection

10:00 AM 10:50 AM Room 504

Passive EDR tools were designed to focus on the detection of suspicious activities on endpoints. These tools were different from earlier security solutions in that they did not necessarily focus on identifying specific malware but instead looked for anomalous activities. However, increased visibility means an increased amount of data that requires an increased amount of analysis and resources – time, money, bandwidth, a skilled workforce – that are in short supply. In addition, EDR, as it is known today, requires cloud connectivity, and as such will always be late with protecting endpoints. There will inevitably be some dwell time. A successful attack can compromise a machine, exfiltrate or encrypt data, and remove traces of itself in seconds. Waiting for a response from the cloud or for an analyst to take action in a timely manner is simply not feasible in the modern threat landscape. These drawbacks led SentinelOne to develop ActiveEDR, a technology that is capable of correlating the story in real-time on the device itself. ActiveEDR is an automated capability that takes the burden off the SOC team. It allows security teams to quickly understand the story and root cause behind a threat. ActiveEDR can autonomously attribute each event on the endpoint to its root cause alleviating any manual searching, hunting, correlating, and in some cases - guessing. This revolutionizes enterprise security. It can be used by businesses regardless of resources, from advanced SOC analysts to novice security teams, providing them with the ability to automatically remediate threats and defend against advanced attacks. In this session – - Discover the value and effectiveness of ActiveEDR - See a Live Attack Demonstration, Investigation and Remediation

Speakers

Veeam - Data Management for AWS and Azure

10:00 AM 10:50 AM Room 505

When making decisions to use AWS & Azure, moving & protecting workloads is a major factor in the decision-making process. Veeam’s Data Management Capabilities for AWS & Azure allows seamless backup and restoration for current AWS & Azure workloads and transformations for workloads from VMWare, Hyper-V, & Acropolis to AWS. Having a tool that will mesh the boundaries between On-Prem and Cloud will allow administrators speed of movement and managers flexibility in their data locality decisions. Come see this live demo where we will show these capabilities!

Speakers

Vectra - Building Security That Thinks – Machine Learning Fundamentals for Cybersecurity Professionals

10:00 AM 10:50 AM Room 506

Machine learning is the new hype in security to defend, detect, and respond. Equip yourself to critically evaluate the foundations of next generation AI-powered cybersecurity tools by understanding key machine learning algorithms, training methodologies, development options, and machine learning examples for attacker behavior detection. Cut through the hyperbole and empower yourself to ask insightful and probing questions that validate or expose vendor claims around AI.

Speakers

Gates Corporation - IoT Security Risks in an Increasingly Connected (and Still Largely Disconnected) World

10:00 AM 10:50 AM Room 507

IoT devices make our lives easier at home and at work. Smart, connected devices can turn our lights on and off, smart medical devices help manage patient care, and smart sensors on manufacturing equipment can help predict failure before machines break down allowing for preventative maintenance and the avoidance of costly downtime for repairs. Even though the IoT landscape looks different for each industry, as the ecosystem continues to expand, so does the attack surface for cyber criminals to exploit. The more we rely on technology to manage our personal and professional lives, the more vulnerable we and the devices that we rely on are to threats that are targeted specifically towards these devices. In this session attendees will walk away with an understanding as to how they need to be considering the expansion of IoT in their environments, how it affects security and privacy, and how to increase awareness of IoT security within their organizations.

Cybereason - Indicators of Behavior: The New Way to Detect Advanced Attacks

11:00 AM 11:50 AM Room 501

For many cybercrime investigators, it’s all about indicators of compromise – hashes, URLs and other crime scene artifacts that can be gathered and compared to evidence from other crime scenes to determine what has occurred. But what if you were to shift away from gathering evidence and toward cataloging behaviors – indicators of behavior - what people, applications and systems are doing that could indicate an attack is ongoing or imminent? How does one make a strategic shift from IoC to IoB? What tools and skills are needed? What new standards and language must be developed? If you’re looking for answers to these questions, then please join me for an exclusive executive roundtable on Indicators of Behavior: The New Way to Detect Advanced Attacks. Join Dani Wood, Senior Director of Advisory Services at Cybereason, to hear insights about IoB and the massive attack on telecommunications providers that we exposed.

Speakers

Juniper - More Security Tools than Ever, Why are We Still Getting Breached?

11:00 AM 11:50 AM Room 502

No matter where we look, everyday there is news of another hack, another data breach and another headache for security teams to deal with. Is it time to look at the security models we use and ask, if they are not effective today, how are they expected to be suitable going forwards? What models should our businesses adopt? We will look closely at how security has matured and propose a new approach to protect our future.

Speakers

Infoblox - Bridging Islands of Security

11:00 AM 11:50 AM Room 503

To handle their network security needs, most organizations rely on many different products and services from multiple vendors. Often these solutions lack integration and are not able to quickly and easily share critical security information. The resulting silos can create costly delays, hinder agility and visibility, and result in a diminished security posture. Join Infoblox for a session on how to bridge the islands of security that expose your network to ongoing risk. During this discussion, you’ll see firsthand how solutions from Infoblox empower your security teams to: - Enhance visibility across your extended network regardless of infrastructure complexity - Automatically share indicators of compromise across multivendor security systems - Get the most out of your cyber threat intelligence and network data to prioritize responses using rich context - Detect, contain, and remediate threats faster through response integration Attend this session to learn how to unify your threat response and find ways to more rapidly and efficiently respond to cyber threats.

Speakers

Vertiv - How to Create Your Own Secure Critical Space

11:00 AM 11:50 AM Room 504

Are you considering building a new server/IT room at your facility for edge computing or disaster recovery? Join Kelley Babin, VP of ?? at Aimco (one of the nation’s largest apartment operators and developer) and Mike Beck, CMO of DVL (local Vertiv/Liebert office) as they present on why and how Aimco recently installed a new server room in their Corporate Headquarters in Centennial. Kelley will cover the business need and the solutions they considered. He will also cover the applications they are intending to support from this location. Mike will cover the Liebert Smart Row from Vertiv and how it works. They will wrap it up with lessons learned and Q and A.

Speakers

LogRhythm - A Roadmap to Security Operations Maturity

11:00 AM 11:50 AM Room 505

Effective security operations are the first line of defense when it comes to preventing cyberattacks. To accomplish this, organizations need mature and measurable programs that leverage people, process, and technology to rapidly detect and respond to sophisticated attacks. This session introduces a model that explores how to assess and evolve the principle programs of an organization’s security operations center (SOC). Organizations can use this model as a basis to evaluate their current security operations maturity level and develop a roadmap to achieve the level that is appropriate in the light of their specific resources, budget, and risk tolerance.

Speakers

Vmware - Securing your most Critical Assets in the Data Center

11:00 AM 11:50 AM Room 506

The Network perimeter is gone. A Perimeter centric approach to security is not working so what should you do? Ensuring that Security is an integral part of your platform is critical to success for the future.

Speakers

Centura Health

11:00 AM 11:50 AM Room 507

Speakers

Tradeshow

11:45 AM 12:15 PM Expo Hall

Aruba - Artificial Intelligence for Cybersecurity

12:15 PM 01:15 PM Main Stage

We are living in an era of relentless cyberattacks. Cyberthreats are a grave national security challenge facing the U.S. today, and they have a significant impact on our economy. In 2016, cyber criminals stole more than 4 billion records, and cybercrimes were estimated to cost the American economy between $57 and $109 billion. In 2019, cybercrimes are expected to be a $2.1 trillion problem for the global economy. In recent years, new cybersecurity threats have emerged and evolved, and new kinds of threats that we haven't even imagined yet are on the horizon, fueled by Artificial Intelligence. In this presentation we'll explore the landscape of AI and how it applies to cybersecurity, some of the special risks involved with deploying AI from a practitioners perspective, and also useful questions to ask potential vendors as they position solutions that utilize AI.

Speakers

Tradeshow

01:15 PM 01:45 PM Expo Hall

Crowdstrike - 1/10/60 Minute Challenge: Defenders Win, Adversaries Lose

01:45 PM 02:35 PM Room 501

CrowdStrike's 2018 Global Threat Report details how adversaries typically dwell for 1 hour and 58minutes before taking action after they've initially gained access to a machine. This "Breakout time", is all the time until an intruder jumps from the machine that’s initially compromised and moves laterally through your network.
This is a crucial window to stop the breach, but is not the only metric you need to know. When an attack is in progress, you have on average of one minute to detect it, 10 minutes to understand it and one hour to contain it. Is your organization ready to meet the 1/10/60 minute challenge?
Join CrowdStrike security experts for an important, in-depth discussion of the common hurdles organizations face in establishing an effective IR process. You will also learn how next-gen
technology including endpoint detection and response (EDR) can help you overcome them.
Attend this session to hear CrowdStrike experts discuss:
What breakout time is and what it means for defenders that are responding to attacks in real time
How the incident response process unfolds and the barriers that keep organizations from mounting a rapid and efficient response
The key steps you can take to improve your organization’s ability to rapidly detect, investigate and remediate threats
Best practices for preventing, detecting in less than 1 minute, analyzing in less than 10 minutes, and responding in less than 60 minutes to stop adversaries

When you can detect, analyze, and recover before the 1 hour and 58 minutes from initial compromise, you WIN, and the adversaries LOSE!

Speakers

AWS - The Fundamentals of AWS Cloud Security

01:45 PM 02:35 PM Room 502

The services that make up AWS are many and varied, but the set of concepts you need to secure your data and infrastructure is simple and straightforward. By the end of this session, you will know the fundamental patterns that you can apply to secure any workload you run in AWS with confidence. We cover the basics of network security, the process of reading and writing access management policies, and data encryption.

Speakers

Fortinet - Digital Transformation – Securing the Connected Enterprise and Nation

01:45 PM 02:35 PM Room 503

The risk management methodology is based on measuring cybersecurity effectiveness based on the reasonable care standard. The reasonable care standard is embodied in nearly all best practices and compliance frameworks including NIST CSF, ISO, GDPR etc. The presenter will outline elements of a reasonable level of effort and an updated approach based on Continuous Adaptive Risk and Trust assessment (CARTA) which addresses the root causes of data breaches and destructive cyber attacks. The approach uses updated traditional network segmentation, Zero Trust and Continuity-of-Operations strategies to ensure continuous identification, protection, detection, response and recovery based on adaptive trust for need-know access.

The strategy aims to ensure:
a) identification of all things connected to network/ecosystem
b) verification of device state
c) authentication of user
d) validation of access request
e) logging and monitoring of all traffic for behavior-based detection
f) encryption based on criticality

Speakers

F5 - Citadel or Straw House, It’s Your Call

01:45 PM 02:35 PM Room 504

The question of whether the cloud is good or bad for security is irrelevant, because businesses are going to the cloud either way. What is germane regarding the cloud is that security practices and controls are a muddle of both the persistently relevant and the obsolete. In other words, cloud environments simplify some security issues, complicate others, and in all cases demand a critical rethink not just of controls, but of control objectives and how security relates to the business. What matters is not what we built in the past, but why we built it. We will unpack this perspective, and present recommendations for minimizing risk and enabling your business to reap the benefits.

Speakers

Guardicore - Fire Your Firewall: Rethinking Network Security

01:45 PM 02:35 PM Room 505

Keeping up with current rate of innovation that businesses are implementing to stay competitive in challenging markets has forced IT organizations to rethink how they’re deploying applications and managing systems. One piece that continues to lag behind is how security teams are securing these complex, hybrid and multi-cloud networks. Traditional firewall solutions do not scale well and present operational challenges within these new complex networks. It’s time for IT and Security organizations to rethink their approach to network security and leverage solutions that are designed for addressing the unique challenges of securing hybrid and multi-cloud environments. This session will focus on how to better address the challenge of securing these complex networks and help your organization implement consistent security controls, while continuing to innovate at the rate needed to compete in today’s marketplace.

Speakers

Zerto - A New Era for Data Protection - Converged DR and Backup

01:45 PM 02:35 PM Room 506

In today's always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key! The cost and business impact of downtime and data loss can be immense. Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters. Having a plan and process in place will help you mitigate the impact of an outage on your business. In this presentation we will address the challenges, needs, strategies, and solutions.

Speakers

Presidio - Vulnerability Threat & Risk Management: A New Approach to an Age Old Problem

01:45 PM 02:35 PM Room 507

Speakers

Proofpoint - Solving for Business Email Compromise (BEC) and Other Forms of Email-based Identity Deception

02:45 PM 03:35 PM Room 501

While the Digital Revolution made business more efficient, it moved relationships to a vulnerable communications medium (email) and exposed information online perfectly fit for social engineering purposes. The result is unprecedented email fraud, the latest manifestation of which is called Business Email Compromise (BEC) or ‘wire-transfer fraud’. Businesses around the world reported $12.5B in BEC losses to the FBI since 2013 and Google and Facebook recently lost a combined $123M.

Join Proofpoint’s Director of Product, Ash Valeski, to learn how BEC and other forms of email fraud work and how to combat it with email authentication (DMARC) and look-alike domain detection.

Speakers

Palo Alto - Take a Smarter Approach to Cybersecurity with the Next-Generation in Security Operations

02:45 PM 03:35 PM Room 502

Visibility into complex data and automation are key requirements in today’s security operations center infrastructure (SOC). Meet the future of SOC, an adaptive, next-generation approach that transforms your security environment, reduces your attack surface, accelerates detection and response, and improves collaboration and alignment across the business.
Join us for this presentation and gain insight from an exclusive view of how Palo Alto Networks operates its security operations center.

Speakers

Cisco - Cisco Threat Hunting Workshop Overview

02:45 PM 03:35 PM Room 503

During this session we will provide an overview of a typical Cisco Threat Hunting Workshop. We will walk through the Cisco threat hunting tools and provide a live demonstration on some of the use cases we use during the threat hunting workshop. Gain a basic understanding of threat hunting using Cisco Threat Response.

Speakers

SentinelOne - Active EDR vs Passive EDR – A Simple Automated Approach to Visibility and Protection

02:45 PM 03:35 PM Room 504

Passive EDR tools were designed to focus on the detection of suspicious activities on endpoints. These tools were different from earlier security solutions in that they did not necessarily focus on identifying specific malware but instead looked for anomalous activities. However, increased visibility means an increased amount of data that requires an increased amount of analysis and resources – time, money, bandwidth, a skilled workforce – that are in short supply. In addition, EDR, as it is known today, requires cloud connectivity, and as such will always be late with protecting endpoints. There will inevitably be some dwell time. A successful attack can compromise a machine, exfiltrate or encrypt data, and remove traces of itself in seconds. Waiting for a response from the cloud or for an analyst to take action in a timely manner is simply not feasible in the modern threat landscape. These drawbacks led SentinelOne to develop ActiveEDR, a technology that is capable of correlating the story in real-time on the device itself. ActiveEDR is an automated capability that takes the burden off the SOC team. It allows security teams to quickly understand the story and root cause behind a threat. ActiveEDR can autonomously attribute each event on the endpoint to its root cause alleviating any manual searching, hunting, correlating, and in some cases - guessing. This revolutionizes enterprise security. It can be used by businesses regardless of resources, from advanced SOC analysts to novice security teams, providing them with the ability to automatically remediate threats and defend against advanced attacks. In this session – - Discover the value and effectiveness of ActiveEDR - See a Live Attack Demonstration, Investigation and Remediation

Speakers

LogRhythm - Capture the Flag Workshop

02:45 PM 03:35 PM Room 505

Join LogRhythm for an interactive capture the flag challenge, where we will walk you through hands-on exercises and help strengthen your threat hunting skills. During this workshop you will:

  • Investigate simulated alarms and incidents to uncover malicious activity
  • Collaborate with other attendees to gather evidence, analyze logs, and build a case
  • Compete against your peers and strengthen your analyst skills

Speakers

Aruba - NetOps and SecOps: Are We Really So Different?

02:45 PM 03:35 PM Room 506

It’s difficult to generalize about modern IT organizations, but in almost all cases the network operations team is separate from the security operations team. In some cases, they report to the same CIO but in other cases they have completely different reporting relationships. It’s no wonder that we commonly find an adversarial relationship between the two teams – one of them is measured on keeping the packets flowing while the other would achieve much better results if NO packets flowed at all. But given the modern threat landscape, we can no longer afford this artificial dividing line. The network has a role to play in detecting and stopping security threats, and that means the two sides must work together. This session explores the issue and proposes practical solutions.

Speakers

TBD - Breakout/Workshop

02:45 PM 03:35 PM Room 507

Real World Security Challenges in 2019 - Theresa Payton

03:45 PM 04:45 PM Main Stage

It seems like the cyber criminals are winning. Data breaches continue to dominate the news. But we can’t let them win.

Are you wondering what 2020 will bring? Or maybe next week?
You already know new technology is integrating into your homes and at work. What’s hype? What’s reality? Will these technologies be friend or
Foe to your security approach?

Theresa Payton will lead the audience through:

(1) real world challenges and how to leverage Blockchain, Cryptocurrency, Artificial Intelligence, Machine Learning & the Internet of Things to make them your new BFF for your security strategy.

(2) She has some 2020 predictions in cybercrime and how to make sure you are ahead of the cybercriminals tactics.

Everyone will walk away with a new tactic that will improve security without breaking the budget. 

Speakers

Happy Hour

04:45 PM 06:00 PM Expo Hall