Bishop Fox named “Leader” in 2024 GigaOm Radar for Attack Surface Management. Read the Report ›

Bishop Fox to Present and Sponsor Cyber Security Summit Salt Lake City

Date:
June 7, 2023
Location:
Sheraton Salt Lake City Hotel, 150 West 500 South, Salt Lake City, UT, 84101
The Official Cyber Security Summit white logo on dark background.

Bishop Fox is proud to be a sponsor at the Cyber Security Summit in Salt Lake City on June 7. The Cyber Security Summit features interactive panel discussions & security keynotes led by experts from top government agencies including the FBI, U.S. Dept. of Homeland Security, CISA, U.S. Dept. of Justice, CIA, NSA, The U.S. Secret Service & more. The latest cutting-edge technologies used to protect against cyber attacks are showcased through demonstrations in the Exhibition Hall.

If you are attending the Salt Lake City Cyber Security Summit, stop by the Bishop Fox table to meet our team and grab some cool swag. Don't forget to attend Trevin's panel discussion on Ransomware. We look forward to meeting you.


Trevin Edgeworth

About the speaker, Trevin Edgeworth

Red Team Practice Director

Trevin Edgeworth is the Red Team Practice Director at Bishop Fox, where he focuses on building and leading best-in-class adversary emulation services to help customers of all sizes and industries strengthen their defenses against current and emerging threats.

Trevin has over 20 years of security experience; he has built and overseen red team programs for several Fortune 500 companies, including American Express, Capital One Financial, and Symantec Corporation. Other accomplishments include leading a security organization as Chief Security Officer (CSO) for a major security company. Trevin has led a variety of security functions in his career, including cyber threat intelligence, hunt, deception, insider threat, and others.

Trevin is an active member of the security community. He has presented at several industry conferences and been interviewed by leading publications on topics such as red teaming and threat intelligence.

More by Trevin

Ready to get started? We can help.

Contact Us

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.