Loading…
SSID: COM-ED  
PASSWORD: love2eduroam!

FAQ

Venue: Room 213 clear filter
arrow_back View All Dates
Thursday, June 12
 

8:30am MDT

Becoming the Teddy Bear: Building Bridges between Compliance and End Users in the Areas of Cybersecurity and Data Privacy
Thursday June 12, 2025 8:30am - 9:30am MDT
The ever-increasing scrutiny placed on areas of Cyber security and Data Privacy have served to highlight a growing tension between end users and those responsible for ensuring an organization’s data and security compliance. How do we, as IT professionals bridge the yawning chasm between end user goals/desires and effective security/privacy? IT professionals are not known for the so-called “soft skills” and often seem to speak an entirely different language. Is there a better way to approach these conversations? Is there a way to entice end users in various roles to also be part of the solution? We often hear about the importance of effective communication, but we need to go beyond that. We must find ways to encourage end user “buy-in” through collaboration and a willingness to explore alternatives. We need to become the Teddy Bear.
Speakers
avatar for Angela Thompson

Angela Thompson

Data Specialist, North Sanpete School District
Thursday June 12, 2025 8:30am - 9:30am MDT
Room 213

9:45am MDT

Identity Struggles
Thursday June 12, 2025 9:45am - 10:45am MDT
In today's ever-expanding digital landscape, securing access to critical resources is paramount. Identity and Access Management (IAM) systems are the guardians at the gate, but even the most vigilant warriors face challenges. This presentation delves into the common struggles of IAM implementation.

In today's ever-expanding digital landscape, securing access to critical resources is paramount. Identity and Access Management (IAM) systems are the guardians at the gate, but even the most vigilant warriors face challenges. This presentation delves into the common struggles of IAM implementation, including: Balancing User Convenience with Robust Security: Simplifying logins can create vulnerabilities, while stricter controls can frustrate users. We'll explore strategies to strike a healthy balance. The Ever-Evolving Threat Landscape: New hacking techniques and insider threats require constant adaptation of IAM protocols. Discover methods to stay ahead of the curve. Application Sprawl and Siloed Systems: A complex IT environment with disparate applications makes centralized IAM a challenge. Learn how to integrate and streamline access management. The Human Factor: User Education and Compliance: Even the best IAM system hinges on user awareness. We'll discuss strategies for promoting responsible access practices. By acknowledging these struggles and exploring effective solutions, organizations can build a more robust and resilient IAM framework. This presentation equips you with the knowledge to navigate the complexities of IAM and unlock its full potential for a more secure digital future.
Speakers
avatar for Dave Packham

Dave Packham

Dave Packham is a great mind in the realm of technology, security and drones!
Thursday June 12, 2025 9:45am - 10:45am MDT
Room 213

1:15pm MDT

Strengthening Email Security: Understanding DMARC, DKIM and SPF Records
Thursday June 12, 2025 1:15pm - 2:15pm MDT
If you do not know what any of this means, and you manage domain names and email, you should come to this and learn.

Unlock the power of email authentication with DMARC, DKIM, and SPF. Learn to safeguard your organization from phishing and spoofing attacks while boosting email deliverability and trustworthiness.

In today's digital landscape, email remains a primary communication channel, making it a prime target for cyber threats like phishing and spoofing. This abstract explores the pivotal role of DMARC, DKIM, and SPF in fortifying email security. By authenticating senders, preventing unauthorized access, and enhancing email deliverability, these protocols serve as indispensable tools in safeguarding organizations against evolving cyber risks.
* We will go over the CIS Controls that these records fall under
* SPF, DKIM, and DMARC records and what they do for us
* Web Tools that help create and verify these records
* DMARC Reports and how to analyze them.

If you have access to your DNS records for your organization, that will be beneficial for this session.
Speakers
avatar for Scott Harpster

Scott Harpster

System Engineer, Southwest Educational Development Center
System Engineer at SEDC and have been with SEDC for 10 years.
avatar for Mark Houtz

Mark Houtz

Network Engineer, NUES
Current passion is rolling out Private LTE and Wifi networks to reach students wherever learning happens. I'm a Network Engineer for a Regional Service Agency covering nine rural K12 school districts and five charters of more than 30,000 students. Working with so many schools with... Read More →
Thursday June 12, 2025 1:15pm - 2:15pm MDT
Room 213

2:30pm MDT

Know Your Adversaries: Understanding and Stopping Modern Adversary Attacks to Protect your Organizations
Thursday June 12, 2025 2:30pm - 3:30pm MDT
Presented by a former CISO and CrowdStrike Executive Strategist, we will deliver a threat briefing that discusses the most recent intelligence around adversaries targeting the education community.This is not a sales presentation but will focus on industry-wide observations and trends from the 2024 CrowdStrike Global Threat Report.

Presented by a former CISO and CrowdStrike Executive Strategist, this presentation will focus on sharing current adversary intelligence best practices to stay ahead of modern attacks. When we know our adversaries and how they attack, we can more proactively address areas of our security program that quickly strengthen our security posture and reduce risk. This is not a sales presentation or focus on the CrowdStrike platform--it is a threat briefing based on the recently released Global Threat Report from CrowdStrike. 2024 CrowdsStrike Global Threat Report: https://www.crowdstrike.com/global-threat-report/?utm_medium=ref&utm_source=zmtg&utm_campaign=zoom-post-meeting-webpage
Speakers
avatar for Deborah Blyth

Deborah Blyth

Executive Strategist, Crowd Strike
Debbi Blyth, is an Executive Strategist at CrowdStrike, where she provides strategic advisory services related to enterprise cybersecurity solutions for all industry verticals including Government, Education and Healthcare.  Prior to joining CrowdStrike, Debbi spent 7 years as Colorado’s... Read More →
Thursday June 12, 2025 2:30pm - 3:30pm MDT
Room 213
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -