Program

Program is TENTATIVE and will be updated regularly.

8 a.m.: Registration opens, networking, vendor fair and continental breakfast.

9:30 a.m.: Welcome.

9:40 a.m.: Cyber competition winner presentations.

11 a.m.: Networking break.

11:15 a.m.: Breakout sessions.

Breakout No. 1: Bricks in the Loop. Learn ICS/SCADA systems with Legos!  Perfect for people that work in airports, water systems, oil refineries, electrical plants and the like. 

Breakout No. 2: Wyoming Cyber apprenticeships.  Need good help? Come find out about Wyoming cyber and IT apprenticeships from one of the first cybersecurity technician apprentices in the State.

Breakout No 3:  Wyoming CAN Committee. It’s not just blockchain that Wyoming is a leader in, the Wyoming CAN (Cybersecurity Action Network) Committee is comprised of members from law enforcement, banking, the university, healthcare, insurance, the libraries, economic development agencies, municipal associations, and after school associations. What are they doing? Creating the first outreach framework and strategy of its kind for Wyoming citizens, senior citizens, small municipalities, businesses, nonprofits, healthcare, and students. 

12:15 a.m.: Networking break, lunch is served.

12:45 p.m.:   Cheyenne Chamber of Commerce: Cybersecurity Business Counselors. Not only is the Greater Cheyenne Chamber one of only 100 accredited Chambers in the nation, but they took this accreditation process local, added a fifth leg for cybersecurity, and trained the first two cybersecurity business counselors in the nation to help their community be more secure.

1:30 p.m.: Networking break.

2 p.m.: Breakout sessions.

Breakout No. 1: Questions you should ask your I/T vendor. Ask  local IT vendors your burning questions about your business needs

 Breakout No. 2: Making cyber insurance interesting. This is a working session. Bring your cyberliability policy and compare and contrast it with Vickie Dearing’s tips and traps. Make sure your policy fits your needs.

Breakout No. 3: Dan Deter, Green House Data’s Security Director. Moving to the cloud distributes your risk but how do you know whether your cloud provider is really doing a good job with your security. 

3 p.m.: Keynote speaker: Dr. Eric Huffman, CEO, Handshake Leadership.

4 p.m.: End of conference.