JOIN US FOR THE 2017 CYBERSECURITY POWER BREAKFAST. GET AN INSIDE LOOK ON HOW TO SECURE YOUR DATA, RECOGNIZE THREATS, AND FIND OUT WHAT TO DO IF A CYBER-HACKER ATTACKS YOU.
BizWest explores the issues that compromise business’ security. We invite you to join us for conversations led by national and local experts and thought leaders in cybersecurity.
High-profile data breaches have cost corporations billions of dollars in recent years, and hackers are getting more sophisticated at targeting individuals and small businesses. No one is immune.
7:30 | Registration Opens
8:00 | Introduction – Chris Wood, BizWest
8:05 | Session I
Speakers take the stage to discuss cybersecurity from their individual perspectives to create a bigger picture of the problems, protection and solutions.
9:10 | Break: Networking/Exhibitors
9:25 | Session II
Speakers discuss problems, solutions and everything in-between in a panel discussion moderated by Dr. Stephen Hayne.
Meet our panelists:
Encryption and Key Management
Rick Robinson comes from a diverse background of architecture, development, and deployment of new products and services that employ cryptography in one form or another. He has numerous patents in the area of cryptography and computer security and helped customers in the financial, health, retail, manufacturing, and government sectors. Rick has been an active proponent of cryptography for business – applying standards-based cryptography, key management, PKI, and secure protocols to help business stay competitive in the ever-changing world of data security.
Senior Director Engineering and Cybersecurity
Mr. Dufour is a leader in the computer security and threat analytics industry spending much of his time designing and implementing automated threat detection and remediation solutions with top tier software and hardware manufactures in the traditional IT space and the emerging IoT security landscape. His experience with machine learning, contextual analytics, big data, integration automation and forensics has led to the development of several cutting edge solutions for mapping threat landscapes, identifying bad actors and the use of predictive algorithms for pre-attack determination. Mr. Dufour also spends time speaking on topics pertaining to threat analytics, theoretical security systems design and works to move the security industry to a more automated, predictive architecture.
Dr. Stephen Hayne
Professor, Computer Information Systems Dpt.
Dr. Hayne’s research interests lie mainly in collaborative technologies, security, knowledge management, and “big” data analytics. Much of his research is rooted in the desire to use innovative technology to solve real problems. To this end he has implemented tools to assist groups in communication and decision-making, i.e. shared drawing, group brainstorming, concurrent issue surfacing and consolidation, intrusion outlier detection classification and visualization. He has applied this technology to support decision making during crisis situations. His other research interests lie with social networks, distributed systems, software engineering, auctions (reputation and pricing effects) and reputation effects of feedback.
From PC support intern to CIO, Dan has been in the technology arena for 30 years and counting. He has programmed applications, architected systems, and designed secure data warehouses for oil & gas, hospitality, telecommunications, and education entities. Dan has led IT teams both large and small, from governmental entities to multi-national conglomerates to entrepreneurial startups. In his role as a technology strategist and IT advisor, Dan guides organizations on the effective use of technology to accomplish business goals.
Cybersecurity Intelligence Analyst
Jerry Eastman is the Cyber Security Intelligence Analyst at the Colorado Information and Analysis Center (CIAC), our state’s fusion center. His primary role is to understand the cyber threat information sharing needs of our critical infrastructure partners and provide them a connection to resources and mitigation measures. Jerry directly supports organic cyber threat information sharing groups that have emerged in Colorado as well as national information sharing and analysis centers. His role in the CIAC allows him to be a nexus for cyber threat information ranging from strategic to tactical threats. Jerry’s position gives him a unique view on cyber threat information flow in both the vertical (between local network operators and federal entities) and the horizontal (across all critical infrastructure sectors). He holds the FEMA Master Exercise Practitioner certification which he applies to numerous cyber exercises with the Colorado National Guard, Regis University, State Office of Information Technology, and critical infrastructure partners. Jerry’s more than 21 years of military service in both the nuclear and space command & control fields, kindle his desire to have a positive impact on the state of cybersecurity in Colorado, and the nation. Jerry holds a Master of Science degree in Information Assurance from Regis University.
Diversified Practice Leader
Holly Watkins is the Diversified Practice Leader for Flood and Peterson and has over 16 years of commercial insurance industry experience. She is an integral part of Flood and Peterson’s cybersecurity team. She has extensive experience partnering with large complex accounts who have regional, national and international insurance needs. Holly has expertise in providing creative and customized risk management solutions through proactive research and program design. Holly received her Bachelor of Liberal Arts Degree in Business Administration from Furman University in Greenville, South Carolina. She also maintains her Certified Insurance Counselor (CIC) designation.