Cybersecurity Symposium

June 7, 2023

The all-new Rocky Mountain Cybersecurity Symposium pre-conference will be held on June 7.  Join us for Capture the Flag Attack and Defense, a special cybersecurity panel – Gone in Sixty Seconds and other amazing cybersecurity sessions.   Sign up for the Capture the Flag Here

Play Capture the Flag for Cyber Street Cred and Prizes

A cybersecurity Capture The Flag (CTF) event is a competition designed to teach and test a variety of computer skills. There are different types of CTFs, but ours is jeopardy-style. Your goal as a competitor is to solve a series of security-related tasks by analyzing provided materials (a log file, an encrypted message) or breaking into a vulnerable application. The goal of a competition like this is to learn, so you’re expected to research and use the internet to figure out how to solve the challenges.
The goal of each CTF problem is to find a “flag,” which is a string of text that you can submit for points. For example, flags can be obtained by cracking ciphers, hacking into vulnerable websites, analyzing log files, etc. Each challenge will provide you with the information you need to get started. In our CTF, the challenges will start out easy and become progressively more difficult. Easier challenges will have lower point values.  Prizes will be awarded daily!

Sign up for the Capture the Flag Here

Save the Data: All of the ransomware experience. None of the risk.

Ever witnessed a ransomware attack firsthand? Get all of the experience with none of the risk in this fully immersive tabletop experience.  Tuesday June 6 – 3-5pm.   This event is provided at no cost.  Yep that is right FREE!  Click here to register

Rubrik, Converge One & Casper College

Where are my cyber assets? And what do they do?

This is a common question for any environment. We have complex system of network equipment, servers, and applications with complex configurations and plans for when things go wrong. This is a story of how you can use the SolarWinds platform to keep inventory of and monitor items like physical location, logical roles, configurations, and capacities. Using the techniques in this session you can help with understanding your environment in order to help keep it secure. Disclaimer: the Kindergarten Cop will not be at this presentation. 

Justin Pederson, Tobias International

Unlocking Success: Achieving Outcomes through a Modern Security Program:

The IT Revolution we have experienced over the last few years has forced organizations to their own security revolution. The degradation of the perimeter, the growth of BYOD devices, cloud migrations and human behavior are all factors that can bring an organization to its proverbial knees. What must an organization do to maintain its operational excellence? It must build a Modern Security Program based on threat intelligence, predicted outcomes, a layer of defenses and security expertise. That Security Program must be able to prevent, detect, respond AND remediate on a 24 x7 schedule. Join us to learn how MDR can help accelerate your movement up the security maturity curve, allowing your security team to focus on strategic priorities rather than chasing down alerts while delivering strategic insights to your business leaders–ultimately building a Modern Security Program that can meet the needs of the IT Revolution.

Paul LlamasBitDefender & Pine Cove Consulting

Be Careful What You Vish For

Normally, I wouldn’t encourage people to lie about who they are and what they are doing, but when it comes to vishing I can’t emphasize enough just how effective of a technique this can be. Over the last year I have convinced users to change passwords to accounts I didn’t own, download and execute several pieces of malware, and even transfer money out of someone else’s bank account into my own, all via vishing. If my experiences have taught me one thing it is to be careful what you vish for … because you just might get it.

Jason Downey, Red Siege.

I Vant To Suck Your Google Storage

Through standard institutional application processes many institutions open a door to international parties which modern technology security tools won’t detect. In a tale of international intrigue, learn how end user training at Casper College and a functional users awareness of modern pop culture help identify and resolve an “intruder’s” fraudulent misappropriation of institutional resources via an unconventional use of social engineering.

Nicholas Mesecher, Enterprise Systems Admin – Casper College; Olivia Wickman, Hathaway and Compliance Coordinator, Casper College.

From Flunkies to Cybersecurity Junkies

Timing is everything and all paths to a destination are not the same. Brian Clark, Casper College Network Coordinator, and Dashon Strab-Crawford, Wyoming Machinery Company Systems Analysis, tell of their unusual path taking them from flunking out of college the first time, going into the work force, and then heading back to school to learn cybersecurity and subsequently back into the workforce as network and cybersecurity specialists.  

Brian Clark, Casper College Network Coordinator, and Dashon Strab-Crawford, Wyoming Machinery Company Systems Analyst

ROUNDTABLE: Implementing an Information Security Plan for a Higher Ed Institution - General

This is a ROUNDTABLE discussion intended for both the implementers of information security plans for colleges/universities – and their victims: The faculty and staff of those institutions!

Co-Presented by Zedo Foy, CWC’s newly hired, first, Information Security Person, and John Wood, CWC’s CIO, we will briefly give an overview of our plan (we are in year 2 of a 5 year plan), and then open it up to everyone to share their lessons learned in doing their plans – as well as questions from all of us about what the heck we are doing!

A fun and very interactive session. John and Zedo will insist that “what is said at the ‘All New Rocky Mountain Cyber Security Pre-conference’ stays at the ‘All New Rocky Mountain Cyber Security Pre-conference’!!”

John Wood – CIO – CWC
Zedo Foy – CWC

Cyber Vision In The Fog Of More

An overview of what incident response looks like & key questions to ask your organization about cybersecurity risks

 

Quinton LeClercq – Casper College Faculty

Avoid Disaster: How to Power Up Your Physical and Cyber Security

In today’s interconnected world, organizations face an ever-increasing threat landscape that encompasses both physical and cyber risks. The convergence of these two domains necessitates a holistic approach to security, ensuring that protective measures address vulnerabilities across all fronts. The conference presentation, titled “Avoid Disaster: How to Power Up Your Physical and Cyber Security,” will shed light on the critical importance of integrating and fortifying security measures to safeguard organizations from potential disasters.

Paul Thayer – Brivo