Upload
others
View
7
Download
0
Embed Size (px)
Citation preview
1
SPONSORS
2
FR
IDA
Y
Time RED
8:00am - 9:00am Registration and Breakfast
9:00am - 9:10am 201 - Cyber Security Conf Welcome
Collin College Leadership, NTXISSA Board
9:15am -
10:15am
202 - KEYNOTE - Business Electronic Compromise (NO PHOTO / VIDEO)
BRIAN SANDERS, United States Secret Service, Electronic Crimes Task Force
BREAK: Grab a Coffee | Visit Sponsors | Meet Recruiters | Network with Peers
10:30am -
11:25am
NCC Group
Hands On - Basic Hacking Tools
11:30am -
12:30pm
Lunch - Pickup in main hall
12:35pm -
1:30pm
NCC Group
Hands On - Basic Hacking Tools
1:35pm - 2:30pm Dustin Dykes
Creating your pen testing lab
BREAK: Grab a Coffee | Visit Sponsors | Meet Recruiters | Network with Peers
2:50pm - 3:45pm NCC Group
Hands On - Advanced Hacking Tools
3:50pm - 4:45pm NCC Group
Hands On - Advanced Hacking Tools
5:00 - 5:30pm Drawing for prizes - MUST BE PRESENT TO WIN! Turn in your surveys and visit
sponsor booths for chances to win.
SA
TU
RD
AY
Time RED
8:00am - 9:00am Registration and Breakfast
9:00am - 9:10am 201 - Cyber Security Conf Welcome
Collin College Leadership, NTXISSA Board
9:15am -
10:15am
Dustin Dykes
Creating your pen testing lab
BREAK: Grab a Coffee | Visit Sponsors | Meet Recruiters | Network with Peers
10:40am -
11:50am
Dustin Dykes
Creating your pen testing lab
12:00pm -
12:55pm
Drawing for prizes - MUST BE PRESENT TO WIN! Turn in your surveys and visit
sponsor booths for chances to win.
3
FR
IDA
Y
Time PURPLE
8:00am - 9:00am Registration and Breakfast
9:00am - 9:10am 201 - Cyber Security Conf Welcome
Collin College Leadership, NTXISSA Board
9:15am -
10:15am
202 - KEYNOTE - Business Electronic Compromise (NO PHOTO / VIDEO)
BRIAN SANDERS, United States Secret Service, Electronic Crimes Task Force
BREAK: Grab a Coffee | Visit Sponsors | Meet Recruiters | Network with Peers
10:30am -
11:25am
Patrick Florer
The EU General Data Protection Regulation (GDPR) - The Non-Lawyer's
Perspective
11:30am -
12:30pm
Lunch - Pickup in main hall
12:35pm -
1:30pm
Tim McCreight/ Hitachi
Career Development for InfoSec Professionals
1:35pm - 2:30pm Shawn Tuma
The Essentials of Cyber Insurance: A Panel of Industry Experts
BREAK: Grab a Coffee | Visit Sponsors | Meet Recruiters | Network with Peers
2:50pm - 3:45pm Mark Szewczul
Mobile Threat Detection Using On-Device Machine Learning Engine
3:50pm - 4:45pm Andy Thompson/ CyberArk
Addressing Insider Threat
5:00 - 5:30pm Drawing for prizes - MUST BE PRESENT TO WIN! Turn in your surveys and visit
sponsor booths for chances to win.
SA
TU
RD
AY
Time PURPLE
8:00am - 9:00am Registration and Breakfast
9:00am - 9:10am 201 - Cyber Security Conf Welcome
Collin College Leadership, NTXISSA Board
9:15am -
10:15am
Bryan McAninch
The FaaS And The Curious
BREAK: Grab a Coffee | Visit Sponsors | Meet Recruiters | Network with Peers
10:40am -
11:50am
Christopher Walcutt/ DirectDefense
Tabletop Exercises Are Better Than Setting Fires
12:00pm -
12:55pm
Drawing for prizes - MUST BE PRESENT TO WIN! Turn in your surveys and visit
sponsor booths for chances to win.
4
FR
IDA
Y
Time BLUE
8:00am - 9:00am Registration and Breakfast
9:00am - 9:10am 201 - Cyber Security Conf Welcome
Collin College Leadership, NTXISSA Board
9:15am -
10:15am
202 - KEYNOTE - Business Electronic Compromise (NO PHOTO / VIDEO)
BRIAN SANDERS, United States Secret Service, Electronic Crimes Task Force
BREAK: Grab a Coffee | Visit Sponsors | Meet Recruiters | Network with Peers
10:30am -
11:25am
George Finney
The Nine Cybersecurity Habits
11:30am -
12:30pm
Lunch - Pickup in main hall
12:35pm -
1:30pm
Harold Toomey
Herding Cats and Security Tools
1:35pm - 2:30pm Bill White/Statefarm
Shifting From "Incident" to "Continuous"
Response
BREAK: Grab a Coffee | Visit Sponsors | Meet Recruiters | Network with Peers
2:50pm - 3:45pm Erich Mueller/ CyberReason
The Attack Lifecycle - Conquering All Stages Of An Attack
3:50pm - 4:45pm Abu Sadeq
Taking A Holistic Approach To Cybersecurity
5:00 - 5:30pm Drawing for prizes - MUST BE PRESENT TO WIN! Turn in your surveys and visit
sponsor booths for chances to win.
SA
TU
RD
AY
Time BLUE
8:00am - 9:00am Registration and Breakfast
9:00am - 9:10am 201 - Cyber Security Conf Welcome
Collin College Leadership, NTXISSA Board
9:15am -
10:15am
Laurianna Callaghan
Security Awareness - From 0 To Maturity
BREAK: Grab a Coffee | Visit Sponsors | Meet Recruiters | Network with Peers
10:40am -
11:50am
Ed. Higgins
Zero Trust: A New, More Effective Approach To Security
12:00pm -
12:55pm
Drawing for prizes - MUST BE PRESENT TO WIN! Turn in your surveys and visit
sponsor booths for chances to win.
5
FR
IDA
Y
Time YELLOW
8:00am - 9:00am Registration and Breakfast
9:00am - 9:10am 201 - Cyber Security Conf Welcome
Collin College Leadership, NTXISSA Board
9:15am -
10:15am
202 - KEYNOTE - Business Electronic Compromise (NO PHOTO / VIDEO)
BRIAN SANDERS, United States Secret Service, Electronic Crimes Task Force
BREAK: Grab a Coffee | Visit Sponsors | Meet Recruiters | Network with Peers
10:30am -
11:25am
Bill Petersen
Begi er’s Li u
11:30am -
12:30pm
Lunch - Pickup in main hall
12:35pm -
1:30pm
Patrick Garrett
Developing An Evidence Driven Information Security Compliance Strategy
1:35pm - 2:30pm Yung Chou
Container Fundamentals With Security Considerations
BREAK: Grab a Coffee | Visit Sponsors | Meet Recruiters | Network with Peers
2:50pm - 3:45pm Chris Hallenbeck/Tanium
From the Trenches And Beyond: How Not To Intel Sharing
3:50pm - 4:45pm Steve Littleson/ Optiv-Bitsight
The Killer Next Door, The Devastating Impacts Of A Third Party Breach
5:00 - 5:30pm Drawing for prizes - MUST BE PRESENT TO WIN! Turn in your surveys and visit
sponsor booths for chances to win.
SA
TU
RD
AY
Time YELLOW
8:00am - 9:00am Registration and Breakfast
9:00am - 9:10am 201 - Cyber Security Conf Welcome
Collin College Leadership, NTXISSA Board
9:15am -
10:15am
Jacen Kohler
Abusing Protocols For Dynamic Addressing In Space
BREAK: Grab a Coffee | Visit Sponsors | Meet Recruiters | Network with Peers
10:40am -
11:50am
Venkatesan Pillai
Protecting the Cloud Environment with CEP Shield Against DDOS
12:00pm -
12:55pm
Drawing for prizes - MUST BE PRESENT TO WIN! Turn in your surveys and visit
sponsor booths for chances to win.
6
FR
IDA
Y
Time GOLD
8:00am - 9:00am Registration and Breakfast
9:00am - 9:10am 201 - Cyber Security Conf Welcome
Collin College Leadership, NTXISSA Board
9:15am -
10:15am
202 - KEYNOTE - Business Electronic Compromise (NO PHOTO / VIDEO)
BRIAN SANDERS, United States Secret Service, Electronic Crimes Task Force
BREAK: Grab a Coffee | Visit Sponsors | Meet Recruiters | Network with Peers
10:30am -
11:25am
Erez Haimowicz / Mimecast
E ail Resilie c : What’s goi g o with e ail?
11:30am -
12:30pm
Lunch - Pickup in main hall
12:35pm -
1:30pm
Tanium (Workshop)
Revolutionizing IT Security And Operations At Any Scale Through Instantaneous
Visibility And Response
1:35pm - 2:30pm Hitachi Systems Security (Workshop)
ArkAngel Vulnerability Management Dashboard
BREAK: Grab a Coffee | Visit Sponsors | Meet Recruiters | Network with Peers
2:50pm - 3:45pm Viavi Solutions (Workshop)
Beyond Detection and Prevention-
What You Need For Remediation
3:50pm - 4:45pm Tanium (Workshop)
Revolutionizing IT Security And Operations At Any Scale Through Instantaneous
Visibility And Response
5:00 - 5:30pm Drawing for prizes - MUST BE PRESENT TO WIN! Turn in your surveys and visit
sponsor booths for chances to win.
SA
TU
RD
AY
Time GOLD
8:00am - 9:00am Registration and Breakfast
9:00am - 9:10am 201 - Cyber Security Conf Welcome
Collin College Leadership, NTXISSA Board
9:15am -
10:15am
Viavi Solutions (Wokshop)
Beyond Detection And Prevention-
What You Need For Remediation
BREAK: Grab a Coffee | Visit Sponsors | Meet Recruiters | Network with Peers
10:40am -
11:50am
Hitachi Systems Security (Workshop)
ArkAngel Platform - Governance Module
12:00pm -
12:55pm
Drawing for prizes - MUST BE PRESENT TO WIN! Turn in your surveys and visit
sponsor booths for chances to win.
7
FR
IDA
Y
Time GRAY
8:00am - 9:00am Registration and Breakfast
9:00am - 9:10am 201 - Cyber Security Conf Welcome
Collin College Leadership, NTXISSA Board
9:15am -
10:15am
202 - KEYNOTE - Business Electronic Compromise (NO PHOTO / VIDEO)
BRIAN SANDERS, United States Secret Service, Electronic Crimes Task Force
BREAK: Grab a Coffee | Visit Sponsors | Meet Recruiters | Network with Peers
10:30am -
11:25am
Lockpick, Kali Linux, CTF
11:30am -
12:30pm
Lunch - Pickup in main hall
12:35pm -
1:30pm
Lockpick, Kali Linux, and Raspberry Pi Village, CTF
1:35pm - 2:30pm
2:50pm - 3:45pm
3:50pm - 4:45pm
5:00 - 5:30pm Drawing for prizes - MUST BE PRESENT TO WIN! Turn in your surveys and visit
sponsor booths for chances to win.
SA
TU
RD
AY
Time GRAY
8:00am - 9:00am Registration and Breakfast
9:00am - 9:10am 201 - Cyber Security Conf Welcome
Collin College Leadership, NTXISSA Board
9:15am -
10:15am
Lockpick, Kali Linux, and Raspberry Pi Village, CTF
10:40am -
11:50am
8
12:00pm -
12:55pm
Drawing for prizes - MUST BE PRESENT TO WIN! Turn in your surveys and visit
sponsor booths for chances to win.
9
FR
IDA
Y
Time GREEN
8:00am - 9:00am Registration and Breakfast
9:00am - 9:10am 201 - Cyber Security Conf Welcome
Collin College Leadership, NTXISSA Board
9:15am -
10:15am
202 - KEYNOTE - Business Electronic Compromise (NO PHOTO / VIDEO)
BRIAN SANDERS, United States Secret Service, Electronic Crimes Task Force
BREAK: Grab a Coffee | Visit Sponsors | Meet Recruiters | Network with Peers
10:30am -
11:25am
Recruiter
Corner
11:30am -
12:30pm
Lunch - Pickup in main hall
12:35pm -
1:30pm
Resume
1:35pm - 2:30pm critique
2:50pm - 3:45pm LinkedIn
Profile
3:50pm - 4:45pm Review
5:00 - 5:30pm Drawing for prizes - MUST BE PRESENT TO WIN! Turn in your surveys and visit
sponsor booths for chances to win.
SA
TU
RD
AY
Time GREEN
8:00am - 9:00am Registration and Breakfast
9:00am - 9:10am 201 - Cyber Security Conf Welcome
Collin College Leadership, NTXISSA Board
9:15am -
10:15am
Recruiter
10:40am -
11:50am
Corner
12:00pm -
12:55pm
Drawing for prizes - MUST BE PRESENT TO WIN! Turn in your surveys and visit
sponsor booths for chances to win.
10
11
SPEAKER BIOS George Finney
George Finney is the author of No More Magic Wands: Transformative Cybersecurity Change for
Everyone and has worked in Cybersecurity for over 15 years. He is currently the Chief Security Officer for
Southern Methodist University where he has also taught on the topic of Information Assurance. Mr.
Finney is an attorney and is a Certified Information Security Manager as well as a Certified Information
Security Systems Professional and is a regular speaker on Cybersecurity.
Harold Toomey
Harold is a founding member of the product security group at McAfee (formerly Intel Security).
His fo us is o defi i g a d a agi g M Afee’s Agile Se ure De elop e t Life le Agile SDL progra , tools, and processes. He manages a satellite team of 90 Sr. Software Security Architects worldwide
called Product Security Champions. He has been with McAfee for 11 years.
Harold has over 20 years of information security experience in both private industry and in the military.
He has experience with all aspects of the product lifecycle. He started his career as a Software
Development Engineer for 10 years, then as a Product Manager for 11 years, then in operational IT
Security for 2 years, and now 6 years in Product Security. His certifications include: CISSP, CISA, CISM,
CGEIT, CRISC, and ITIL v3.
Harold is an active member of the ISSA North Texas chapter, and served as its president 4 years ago
(2013).
Prior to joining McAfee, Harold was a technical product manager at Symantec for 8 years. Before that
he worked as VP of Engineering at CallWare Technologies, as a software engineer and manager at
No ell, a d as a o issio ed offi er i the U.S. Air For e. He ear ed his aster’s degree i Ele tri al and Computer Engineering from Brigham Young University in Provo, UT.
Harold just ra his th aratho i August 7. His ru i g part er, Ro Ultra Dog Too e , a lb. Pomeranian dog, is well known throughout Texas and has run 55 marathons in 9 states. On
weeknights, he tutors calculus and serves as the scoutmaster for Boy Scout Troop 590 in McKinney, TX.
12
Bill White
Bill is a professio al ith ears’ e perie e i IT Se urit , Fraud, I foSe , a d Risk Management. Bill is currently a member of the security architecture (DETECT, RESPOND and RECOVER)
for State Farm. He is a subject matter expert in the DETECT function, but also has extensive experience
in Incident Response
Laurianna Callaghan
Laurianna Callaghan currently serves as Information Security Analyst III for Health Management
Systems, Inc., an Irving-based company in the healthcare industry. Previously, Laurianna worked with
Dell Services where she was the creator of security analytics for a major healthcare customer which
were presented at the 2016 IASAP conference. In addition, Laurianna has more than 22 years experience
in various IT domains. She has served as the Director of Systems Engineering for a telemarketing firm,
the UNIX/MVS Manager for a major airline and has IT experience in the healthcare, communications,
transportation, education and other industry sectors. Laurianna holds both the CCNA Security and CISSP
certifications.
Ed Higgins
Ed Higgins is a security thought-leader and security compliance specialist with Catapult Systems.
In addition to having previously served in roles such as CIO and CISO, Higgins implemented and directed
the global security programs for Affiliated Computer Services and Dallas Semiconductor, and later
launched two successful businesses focused on digital forensics, incident response, and identity
management. Higgins holds several certifications and licenses including CISSP, CISM, CGEIT, and is a
licensed digital forensics investigator a d is a for er PCI QSA. Higgi s’s ri gs a usi ess perspe ti e, compliance experience, as well as technical expertise to the presentation.
13
Heather Goodnight Hoffman & Patrick Florer
Heather Goodnight-Hoffmann, President, Risk Centric Security, a twenty-plus year veteran in the
information security space, and member of the Ponemon Institute Responsible Information
Management Council (RIM Council).
Patrick Florer, CTO, Risk Centric Security, a 37 year veteran in information technology, medical outcomes
research, and information security and quantitative risk analysis. He is a Ponemon Institue Fellow and
member of the Ponemon Institute Responsible Information Management Council (RIM Council).
Heather and Patrick are co-authors/analysts of the NetDiligence Cyber Claims Study.
They have presented at the past two North Texas ISSA / Collin College conferences, on the subjects of
Data Breaches and Cyber Insurance.
Bryan McAninch
Bryan McAninch is an information security professional with over twenty years experience in
various disciplines including digital forensics, penetration testing, and security architecture. His current
area of research has been focused on the security implications of cloud and container technologies. He
holds a Bachelor of Science in Business Administration from the University of Texas at Dallas and a
Master of Science in Information Assurance from the University of Dallas. Bryan is passionate about
information security and giving back to the community. He is an organizer of the North Texas Cyber
Security Group, member of the Dallas Hackers Association, and owner of Prevade Cybersecurity.
Michael Lazar
Michael Lazar is a veteran of the telecom industry, and has held C-level positions in system
design, custom engineering and software development for the last two decades. He joined DataArt in
2016 to lead the company's telecom practice, focusing on the most demanding areas of the marketplace
- systems performance, NFV, SDN & telecom security.
Prior to joining DataArt, Mr. Lazar was Chief Technology Officer of Veloxum/Ambicom Holdings where
he was responsible for developing system optimization software, and before that CTO of Network
Physics, where he led the design and development of Voice over IP (VoIP) and Financial Information
14
exchange (FIX) monitoring software. Prior to the CTO role, Michael was VP of Customer Advocacy at
Network Physics, in charge of worldwide pre-sales engineering, post sales support, and custom
engineering. Prior to Network Physics, Michael held senior technical roles at Datatec Systems and
Spirian Technologies, Inc.
Mr. Lazar holds a Bachelor of Science Degree in Physics from New York’s Quee s College a d holds a patent for Systems and Methods of Tuning an Operating System, Application or Network Component.
15
EVENT MAP
16