Loading…
SSID: TechSummit 
PASSWORD: summit25

FAQ

Venue: Room 1410 clear filter
Wednesday, June 11
 

1:15pm MDT

How to Get the Most Out of Your Adlumin SIME MDR
Wednesday June 11, 2025 1:15pm - 2:15pm MDT
In this session, we will explore how to effectively utilize the Adlumin platform and SOC. Additionally, we will highlight key features and solutions to enhance security operations.

In this session, we will provide a comprehensive demo of the Adlumin platform, showcasing how to maximize its capabilities. We will also explore additional N-able offerings and leave time for a Q&A session.
Speakers
PW

Paul Whittier

Principal Cybersecurity Advisor, Adlumin/N-Able
Wednesday June 11, 2025 1:15pm - 2:15pm MDT
Room 1410

2:30pm MDT

Cybersecurity Best Practices for School Safety
Wednesday June 11, 2025 2:30pm - 3:30pm MDT
Cybersecurity isn't a one-size-fits-all solution; it's a mindset that must be integrated into every aspect of our digital environments. As school IT environments grow more complex, so do the potential threat vectors, which means protecting them requires a multi-faceted approach. Specifically, when it comes to school safety on digital systems, there are key considerations that can be applied to minimize threats.

Recent reports of breaches in the media have accelerated the importance of cybersecurity best practices. One such breach involved a company that provides services to public schools, where hackers gained access through the company’s support portal using valid credentials. These hackers were able to retrieve "all" historical student and teacher data stored in multiple school districts student information systems. The breach was attributed to the company's failure to implement a basic multi-factor authentication security measures on the affected system. Other reported breaches in other state school districts would have required a different protective measure. In one instance, unauthorized actors gained access to specific computer systems and obtained stored data files. A more effective protection method in this case would have been the implementation of an Endpoint Detection and Response (EDR) solution, which proactively monitors laptops and devices around the clock These are just two examples of different approaches to cybersecurity. There are 4 main elements to consider when protecting digital data. 1. Individual users. In this case, students, staff members and parents. That includes the user and their devices. 2. Systems that are built and controlled by our schools. These are generally managed by the school’s IT teams. 3. Supply chain and the systems that are provided by vendors. These can be cloud and SaaS type technology services. 4. Finally, the network connection that provides the pathway accessing either type of system that connects the users to these applications must be protected.
Speakers
avatar for Kevin Lopez

Kevin Lopez

Fortinet
BD

Brant Davis

Fortinet
Wednesday June 11, 2025 2:30pm - 3:30pm MDT
Room 1410

3:45pm MDT

2025 K-12 Threat Briefing
Wednesday June 11, 2025 3:45pm - 4:45pm MDT
Threat Hunter Heff (& K-12 SOC Analyst Travis) bring their high energy, high velocity K-12 Threat Briefing back for another year. This threat briefing will share the latest K-12 threats, tactics, and bad guy insights from the past year.

By the end of Today's Threat Briefing you will: 1. Develop a better sense of the current K-12 threat landscape. 2. Gain insights on K-12 threats, threat actors, and patterns of attack 3. Receive valuable knowledge where to place your resources, efforts, and energy over the coming year.
Speakers
avatar for Heff

Heff

CISO, SecurityMetrics
Hello 2024 UETN attendees! So EXCITED to be back!!!! Everyone calls me "Heff" for short. I am the CISO for SecurityMetrics, Inc. based in Orem, Utah.. --> --> I will be bringing that HIGH ENERGY presentation style with TONS of FREE ideas to help you use AI to build cyber simulations... Read More →
Wednesday June 11, 2025 3:45pm - 4:45pm MDT
Room 1410
 
Thursday, June 12
 

8:30am MDT

WHO? WHAT? WHERE? (Hacked?) - 2 hour session
Thursday June 12, 2025 8:30am - 10:45am MDT
Learn how to pull reports remotely and gather information about a security incident or suspect behavior with almost no setup and a single mouse click.

You think your WINDOWS endpoint is infected, or suspect inappropriate behavior! Now what? Is it disconnected from the network? Is it safe to turn it back on? Let's find out with open source tools in this workshop. The first half we will dive into the file system. Go over some ways that attackers can infect end points, and learn how we can find indicators of compromise on a suspect system. In the second half, we will use some free and open source tools to complete a mini CTF using what we learned to find out if, how, and when we have been compromised in this Windows focused workshop.

Speakers
JH

Joshua Hochstettler

IT, Box Elder School District
Thursday June 12, 2025 8:30am - 10:45am MDT
Room 1410

1:15pm MDT

What You Don't Know About the Country of Andorra
Thursday June 12, 2025 1:15pm - 2:15pm MDT
This presentation delves into a seemingly innocuous detail about the small European nation of Andorra that can have significant implications for cybersecurity. We will explore an unexpected overlap between Andorra's unique digital identity and common network configurations, revealing a subtle vulnerability that penetration testers can exploit.



Speakers
avatar for David Bowman

David Bowman

David Bowman, Jordan School District
Systems and Security Manager at Jordan School District. Running our Security program for 58,000 students, 8,000 staff, and too many devices to enumerate. David has spent the last 8 years in and around technology in the K-12 environment. David's hobby is way too many Saintcon Minibadges... Read More →
Thursday June 12, 2025 1:15pm - 2:15pm MDT
Room 1410
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.