agendas - information security summit...college 101, information scramble & panel speed...
TRANSCRIPT
Agendas:
* Monday: Professional Training / OCITA / CSO Xchange* Tuesday: Professional Training / Career Connection / NOCHE / EnergyTech* Wednesday: 17th Annual ISS Day-1 / EnergyTech * Thursday: 17th Annual ISS Day-2 / EnergyTech* Friday: 17th Annual ISS Day-3 / EnergyTech
7:30 8:30 8:45 9:00 9:30 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00 3:30 4:00 4:30 5:00 - 7:00 PM
1
2
3
Café'
5
8
LUNCH - Concourse
11
12
18
19
20
26
Grand Ball-room
HBI Principal, Director, ISSA Distinguiished Fellow
Correction From Collaboration
Tyler HudakTrustedSec
Introduction to Malware Analysis
Tyler HudakTrustedSec
Open Source Intelligence (OSINT) Gathering Essential Training
Jerod BrennenBrennen Consulting
Oracle Database Security Master Class
Daniel MorganDBSecWorx
Open Source Intelligence (OSINT) Gathering Essential Training
OCITA Program - Leading Controls and Tools: Part IV
OCITA Program - Connected and Self-Driving Vehicles: The Road. Reimaged, Secured, &
Lives Transformed
Cuyahoga County
SPONSOR ROOM
SOCC - Gov't Services Beverlyn Johns,
Business Transformation Pgm. Mgr. DAS
Surprising Secrets of the Most Cyber Resilient Orgs
Steve Hunt
Microsoft Technology State & Local Govt
Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & Logicalis
ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing
CSO ✘change Fall Meeting CSO ✘change Fall Meeting
SPONSOR ROOM - CHECK POINT SOFTWARE TECHNOLOGIES
10
The SUMMIT 2019 Gold Sponsors:
RESERVED FOR ENERGYTECH ./ Exhibitor Set-up
Professional ✘clerator Training Day / CSO Xchange Meeting / OCITA Meeting
AM PMRoom #
Monday, October 21
16
The I-X Center - Cleveland
SPONSOR ROOM - OKTA
21
Jerod BrennenBrennen Consulting
DOORS OPEN Registration /
Continental Breakfast - Sponsor Exhibit Area
RESERVED FOR ENERGYTECH
OCITA Program - ElectionGuard: Election Security Tools
24
OCITA Program - Geographic Information Systems Now and the Future
Tom Fisher, Enterprise GIS Applications Admin.
Break with our SPONSORS.
LUNCH - Concourse
LUNCH - ConcourseIntroduction to Malware Analysis
SPONSOR ROOM - TENABLE
ISS PLANNING GROUP / VOLUNTEER ROOM
ENERGYTECH PLANNING GROUP ROOM
CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi
SPONSOR ROOM - IBM
✘ceptional Networking.
SPONSOR ROOM - LOGICALIS
Oracle Database Security Master Class
Daniel MorganDBSecWorx
Jeremy Mio, Information Security Officer Brian Kelley
Cuyahoga County Ohio Turnpike
Technology Break / Visit with our SPONSORS.
17
SPONSOR ROOM - RED SEAL
Danilo Casino - Technology Strategist
OCITA - KEYNOTE ADDRESS
Mark Smith
COO - State of Ohio
LUNCH - Concourse
7:30 8:30 8:45 9:00 9:30 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00 3:30 4:00 4:30 5:00 - 7:00 PM
1 LUNCH - Concourse
2
3
Café'
4 LUNCH - Concourse
5
6
8
11
12
Employers:
TechCred
Cheri RiceODHE
Main Hallway
SHOWCASE TRANSITION
18
19
20
Employers:
TechCred
Cheri Rice, ODHE
26
Grand B'room LUNCH - Concourse
* Registration Required for All Sessions. For more information, visit careerconnectionexpo.com
CAREER CONNECTION EXPO* / EnergyTech / Professional Training
RESERVED FOR ENERGYTECH EnergyTech - Session 3 - Power Generation EnergyTech - Session 6 - Energy Storage RESERVED FOR ENERGYTECH
EnergyTech - EASG Meeting -- full day (RESERVED FOR ENERGYTECH) EnergyTech - EASG Meeting -- full day (RESERVED FOR ENERGYTECH)
EnergyTech - Session 4 - Whacking the Cyber Hackers
Jones
BREAKEnergyTech - Session 5 - Microgrids - Transforming our Virtual
Infrastructure
Baker
EnergyTech - Session 7 - Future of Energy Systems
Kerman
RESERVED FOR RITE and NOCHE
PRESENTER COMPANY PRESENTER COMPANY
EnergyTech - Session 8 - Microgrids - More Power to the City
Thomas
Brought to you by: Baldwin Wallace University
ISS Career Connection Presenting Sponsor
EnergyTech WELCOME & Plenary SessionPanel: Mission Needs, Challenges & Opportunities
EnergyTech - Panel Session (M LaskyPowering Through: Building Critical Infrastructures Resilience
EnergyTech - STEM / Student Visitors POSTER TALKS
15-16Presented by RITE
College / University Students:
ENERGYTECH ENERGYTECH
ENERGYTECH ENERGYTECH
PRESENTER NAMEPRESENTER COMPANY
Passport to IT Careers: ▪College 101, Information Scramble & Panel
▪Speed Networking Roundtables with IT Professionals
PRESENTER NAME PRESENTER NAME
SPONSOR ROOM - OKTA
SPONSOR ROOM - TENABLE
Postsecondary Educators/Faculty:
9
Supported by NOCHE
PRESENTER NAMEPRESENTER NAME
7
21
17Daniel Morgan
DBSecWorx
High School Students & Employers:Passport to IT Careers - NEO Passport
(AM Session of All Day Employer Showcase)Presented by RITE
PRESENTER NAME PRESENTER NAME10
ENERGYTECH
Oracle Database Security Master Class
Daniel MorganDBSecWorx
Oracle Database Security Master Class
13-14
College and University Students, Recent Grads & Jobseekers and Employers:Linking IT and Cybersecurity Talent to Opportunity Internship and Job Fair
(PM Session of All Day Employer Showcase) Presented by NOCHE and GCP
Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & Logicalis
PRESENTER COMPANY
LUNCH - Concourse
PRESENTER COMPANY PRESENTER COMPANY
Presented by NOCHE and NEOCC
RITE Regional IT Educators Consortium - Inaugural Meeting
Tyler Hudak
Introduction to Malware Analysis
Tyler Hudak
RESERVED FOR RITE AND NOCHE
College/University Students:
Rev Up Your Technology IQ!
Presented by OHTec and The NEO CIO Forum
Part 1
22
High School Students:
LUNCH - Concourse
College/University Faculty & Staff + Employers:
25
✘ceptional Networking.
ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing
CAPTURE THE FLAG
LUNCH - Concourse
College/University Students:
Rev Up Your Technology IQ!
Presented by OHTec and The NEO CIO Forum
College/University Students:
Speed Networking Roundtables with IT Professionals
Presented by RITE
PRESENTER COMPANY
Brought to you by: Baldwin Wallace University
SPONSOR ROOM - RED SEAL
SPONSOR ROOM
SPONSOR ROOM - IBM
RESERVED FOR RITE AND NOCHE
College/University Students:
Speed Networking Roundtables with IT Professionals
Presented by RITE
TrustedSec TrustedSec
How to Get Future Ready
SPONSOR ROOM - LOGICALIS
LUNCH - Concourse
C/U Faculty & Staff ONLY: College / University Students:
The SUMMIT 2019 Gold Sponsors:
Room #AM PM
DOORS OPEN Registration /
Continental Breakfast - Sponsor Exhibit Area
ISS PLANNING GROUP / VOLUNTEER ROOM
Career Connection Expo Diamond Sponsor
Presented by RITE
Tuesday, October 22The I-X Center - Cleveland
PRESENTER NAMEPRESENTER COMPANY
Presented by RITE HR IT Roundtable
Innovations and Alignment in Cybersecurity Education
HS / College / University Faculty:
Rev Up Your Technology IQPresented by OHTec and The
NEO CIO Forum
HS / College / University Faculty:
Get the Facts on IT Talent DemandPresented by TeamNEO
24Introducton to Malware Analysis
23
High School Students:
Passport to IT Careers▪College 101, Information Scramble & Panel
▪Speed Networking Roundtables with IT Professionals
Presented by RITE
College / University Students:
RESERVED FOR RITE AND NOCHE How to Get Future Ready
Presented by TeamNEO
ENERGYTECH PLANNING GROUP ROOM
CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi
EnergyTech - TUTORIAL - Lean Startup Methods
M. Pafford
EnergyTech - TUTORIAL - Lean Startup Methods
M. PaffordPart 1
Presented by RITE HR IT Roundtable
High School Students:
Passport to IT Careers▪College 101, Information Scramble & Panel
▪Speed Networking Roundtables with IT Professionals
Presented by RITE
RESERVED FOR RITE AND NOCHE
ENERGYTECH
ENERGYTECH
College / University Students:
SPONSOR ROOM - CHECK POINT SOFTWARE TECHNOLOGIES
CAPTURE THE FLAG!
ENERGYTECH
7:00 8:00 8:30 9:00 9:30 9:45 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00 3:30 4:00 4:30 5:00 - 7:00 PM
1 LUNCH - ConcourseXceptional Networking
2
3
Café'
4
5
6
8
11
12
18
19
20
23
24
25
26
Grand B'room
EnergtTech Opening Remarks
M. Jenning-Bates / PAL-V BREAK BREAK
Panel: Tackling the Systems Challenge
Moody's: Financial & Credit Implications of
Cyber RiskPoster Talks
KEYNOTE ADDRESS
Aronetics
KEYNOTE ADDRESS: Dr HH Schmitt EnergyTech Exhibit Visitors
✘ceptional Networking
Reception (Area TBD)
RESERVED FOR ENERGYTECH EnergyTech - Session 21 - Thermal Management EnergyTech - Session 22 - Power Management EnergyTech - Session 23 - Power Distribution
BONUS BREAK TIME! Check out all the sponsors and say
HELLO!
EnergyTech - Session 11 - System Models: Health / Energy
EnergyTech - Session 9 - Model Intergration
EnergyTech - Session 12 - Digital Enterprise
BONUS BREAK TIME! Check out all the sponsors and say
HELLO!
EnergyTech - Session 13 - SE for Buildings
EnergyTech - Session 14 - MBSE Model Management
EnergyTech - Session 10 - Power Model Application
EASG Meeting -- full day (RESERVED FOR ENERGYTECH)
Westfield Artic Wolf Networks IBM
BREAK Visit the Café LUNCH - ConcourseBreak with our
SPONSORS.
Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & Logicalis
Securing the 4th Industrial RevolutionThe Changing Contractual and Compliance
Landscape
MANUFACTURING Tra✘ - TrustedSec
Xceptional Networking.
SPONSOR ROOM - LOGICALIS
The SUMMIT 2019 Gold Sponsors:
17 Annual Information Security Summit - DAY 01Wednesday, October 23
The I-X Center - Cleveland
ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing
15
21Anti Hacker Techniques and Technologies Digital Survival
SOC-as-a-Service & Tales from the Trenches: Cyber Security War Stories
New Targets on Cybercriminals' Radar
John Aron Kevin Baker Marty Sanders Shaked Vax
22
17
An Introduction to FAIR – Cyber Risk Quantification
Anatomy of a Cyber AttackDemystifying Industrial Control System Cyber
RiskComputer Capers - Then and Now
Michael Radigan Matt Radolec Michael Radigan Steve Margolis / Luke Margolis Varonis
SPONSOR ROOM - IBM
13-14
Super Charge Your Cybersecurity Career Business Cyber Survival: Are You at Risk?
LUNCH - Concourse
Business Cyber Survival: Are You at Risk?
Steven Hunt Loren W. Wagner
David Kennedy
Challenges Facing Manufacturers - Attack Landscape, Recent Breaches, etc.
Building an IR Program
TrustedSec
Incident Response: Under the Microscope
16
Timothy M. Opsitnick
LEGAL and COMPLIANCE Tra✘ - Ulmer LEGAL and COMPLIANCE Tra✘ - Ulmer
HuntBI CentraComm CentraComm
Tyler Hudak, Steve Stransky, Josh Kelley, Paul Sems, Ned Sherry
Pam Gerber, Todd Riley, Billy Heiser, Rockie Brockway, Stephen Marchewitz
Alex Hammerstone, Bob Salandre, Steve Stransky, Rockie Brockway
Joe WeissLoren W. Wagner
10Student Conference Orientation Cyber Defense….Try Offense Top 5 Quick Wins in Cybersecurity Essentials Next-Gen SOC - A Case Study at Palo Alto
College / High School Students Tony Pietrocola Chad Voller / Bryan Smith Kevin FlanaganShane Donahue / Gary Sheehan Agile1 BMF Cyber Technology Group Palo Alto Networks
BREAK Visit the Café
Aligning App Sec With Digital TransformationO365 Hijacking and Best Practices to Protect
Yourself
LUNCH - Concourse
The Impossibility of Security IAM SystemsCyber Incident Response- Addressing the
Concerns of the Business
SPONSOR ROOM - OKTA
SPONSOR ROOM - TENABLE
Break with our SPONSORS.
Announcements, Partner Message and Keynote Introduction
IBM
Capturing the Bayrob Group!Ulmer Panel Discussion
The California Consumer Privacy Act: Implementing Sustainable Compliance
Solutions
Ryan Macfarlane / Duncan Brown
BREAK Visit the Café
PRESENTER NAME Steven G. Stransky
Technology Concepts & Design, Inc. (TCDI)FBI - Supervisory Special Agent / US
Assistant Attorney Ulmer Berne, LLP Thompson Hine LLP
Break with our SPONSORS.
Larry Cox Joshua Skeens Steve Bryant Tom Hardin
SonicWall GATE, LLC. Franciscan Alliance
Correction From Collaboration
Room #AM PM
DOORS OPEN Registration /
Continental Breakfast - Sponsor Exhibit Area
ISS PLANNING GROUP / VOLUNTEER ROOM
ENERGYTECH PLANNING GROUP ROOM
CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi
MANUFACTURING Tra✘ - TrustedSec
SPONSOR ROOM - READ SEAL
SPEAKER READY ROOM
SPONSOR ROOM - CHECK POINT SOFTWARE TECHNOLOGIES
9
ISS / EnergyTech Announcements, Partner Message and Keynote Introduction
KEYNOTE ADDRESS: Joe Weiss
KEYNOTE: Top Cybersecurity Issues when Migrating to the Cloud
SPONSOR ROOM
Bob Kalka
TrustedSecWednesday's Tra✘ Sponsors:
Ulmer Byrne
7:30 8:15 8:30 9:00 9:30 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00 3:30 4:00 4:30 5:00 - 8:00 PM
1 LUNCH - Concourse CASINO NIGHT!!
2
3
Café'
4
5
6
8
11
12
18
19
20
24 BREAK
26
Grand B'room
BREAK LUNCH - Concourse BREAK Closing Plenary
EnergyTech; Session 18
IBM Hack-a-thon
EnergyTech Session 19
Break with our SPONSORS.
EnergyTech Session 17 - PDD ENnergyTech Session 17 - PDD
✘ceptional Networking. CASINO
NIGHT!!
23Developing Super Women in Security To Be Announced To Be Announced
Why No One Listens to Us – Articulating Information Security Risk as Business Risk
Kate Kuehn Mike Patterson Dennis Underwood Alex Hammerstone
PRESENTER COMPANY Check Point Software
Reserved for One Identity Don't Take a Knife to a Gun Fight Customer Service, Disservice or Self-ServiceRegulations & Privacy Requirements Across
the Globe
To Be Determined Ameya Talwalkar
EnergyTech - SAE / NASA Standards Workshop - High Voltage Stds. EnergyTech - SAE / NASA Standards Workshop - High Voltage Stds.
Keynote: M PennottiCal for Tech Leaders
Joint Panel PMI/INCOSE Collaborating for Success
EnergyTech; Session 15 PDD
IBM Hack-a-thon
Visit the Café and break with our
SPONSORS
EnergyTech; Session 16
Can AI/ML help us solve real cyber problems and protect our enterprises from cyber-attacks? In each of these 4 sessions we will learn how AI/ML is being used to identify risks and
anomalous behaviors and ultimately automate detection and response to cyber threats to better protect our enterprises.
Can AI/ML help us solve real cyber problems and protect our enterprises from cyber-attacks? In each of these 4 sessions we will learn how AI/ML is being used to identify risks and
anomalous behaviors and ultimately automate detection and response to cyber threats to better protect our enterprises.
Panelists include Tom Tully, Bradford Cross and Guy BejeranoTra✘ is Sponsored and Moderated by ASMGi
Panelists include representatives from Rapid7, Forescout and MalwarebytesTra✘ is Sponsored and Moderated by ASMGi
AI Innovation in Medical Devices Protect Your Connected Medical Devices and Keep Hospital Operations Running Smoothly
Breaches Stop Here: Managing Medical Device Security Risk
PRESENTER NAME Kierk Sanderlin Itzik Feiglevitch Jonathan Langer
Cyber Cat & Cyber Mouse Rockin’ the CASB
Carl Gustas Glen Roebuck Laurence Pitt Cory KramerCequence Security Thales E-Security Juniper Networks Logicalis
Scaling Multicloud and Hybrid Cloud Usage without Sacrificing Data Security and
Compliance
Xceptional Networking. CASINO NIGHT!!
RESERVED FOR ENERGYTECH
ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing
SPEAKER READY ROOM
Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & Logicalis
HEALTHCARE TECHNOLOGY Tra✘ - Check Point Software HEALTHCARE TECHNOLOGY Tra✘ - Check Point Software
15
SPONSOR ROOM - LOGICALIS
Senseon Sophos Cybercrucible TrustedSec
Cequence Security O'Leary Management Education BSI
13-14Welcome, Partner
Message and Keynote Introduction
Visit the Café and break with our
SPONSORS
PRESENTATION TITLE
LUNCH - Concourse
SPONSOR ROOM - RED SEAL
The SUMMIT 2019 Gold Sponsors:
17th Annual Information Security Summit - DAY 02Thursday, October 24 - Sponsored By CEQUENCE SECURITY
The I-X Center - Cleveland
25
22
The Internet of Things That Shouldn't Be On The Internet
Dealing With Digital Lifestyles Zero Trust - Doing it The Right WayEverything You Know About How to Cyber
Secure Your Organization Just Changed
Chris Bush Patrick McCrann Andy Hicks Caston ThomasMcAfee Aetna Guardicore InterWorks, LLC
John O'Leary Christopher BerensternOne Identity
17
What Does a Mature Cybersecurity Program Look Like?
SPONSOR ROOM
SPONSOR ROOM - IBM
9
Visit the Café and break with our
SPONSORS
Magic + Ultra + Humans = Disaster: The USS Indianapolis
Your next security strategy (Is the security model of today broken?)
LUNCH - Concourse
Considerations for an Effective Awareness Program: Thinking Like an Attacker
The People Priority- Developing a Security Awareness Program with your Employees in
Mind
Break with our SPONSORS.
John O'Leary Laurence Pitt Ken Smith Lauren ZinkO'Leary Management Education Juniper Networks University of Mount Union / SANS TI AmTrust Financial
16
CLOUD SECURITY Tra✘
10
Case Study - Growing Security Champions at Progressive
Wireless Intrusion Prevention – Wireless threat vectors that network managers need to
defend against.
Best Practices Building a Resilience Cyber Security Strategy
SDLC for DevSecOps – Why It’s Important to Embrace Agile
David Upson Jeff Burke Kurt Van Etten
SPONSOR ROOM - CHECKPOINT SOFTWARE TECHNOLOGIES
Dave Russo / CrobProgressive Insurance Red Hat, Inc
SPONSOR ROOM - OKTA
SPONSOR ROOM - TENABLE
Announcements, Partner Message and Keynote Introduction
Co-Founder, Chief Risk Scientist Risklens, Inc
PRESENTER COMPANY
Break with our SPONSORS.
PRESENTER NAME PRESENTER NAME
PRESENTER COMPANY
Check Point Software Medigate
RESERVED
AI / MACHINE LEARNING Tra✘ - ASMGi AI / MACHINE LEARNING Tra✘ - ASMGi
PRESENTATION TITLE
CLOUD SECURITY Tra✘
Malicious Bot Attacks: The New #1 Cyber Threat
Correction From Collaboration
Room #AM PM
DOORS OPEN Registration /
Continental Breakfast - Sponsor Exhibit Area
ISS PLANNING GROUP / VOLUNTEER ROOM
ENERGYTECH PLANNING GROUP ROOM
CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi
My CEO Told Me We Have to Move Our Datacenter to the Cloud…So, What’s the Big
Deal?
Grant AsplundGlobal Cloud Evangelist Check Point Softwarre
21
Jack Jones
LUNCH - Concourse
Arista Networks RedSeal
Thursday's Tra✘ Sponsors:Check Point ASMGi
7:30 8:15 8:30 9:00 9:30 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00
1
2
3
Café'
4
5
6
8
11
12
NOCHE Breakout Room
18
19
20 Break with our SPONSORS.
24
25
26
Grand B'room BREAK
MAIN HALL Drone Program SETUP (Netting, AV, Tables, etc.)
EnergyTech - Tool Time (Vendor Demo) EnergyTech - Drone Panel -- (Jones)LUNCH - Concourse
EnergyTech - Tutorial Mike Vinarcik
EnergyTech - Tutorial S Pavlakis
INTERNATIONAL DRONE CHAMPIONSHIP
DOORS OPEN Registration /
Continental Breakfast - Sponsor Exhibit Area
KEYNOTE: The Ethics of A.I & the DNA Malware
Eddie DoyleGlobal Security Strategist
Check Point Software
True Crime - The First 48 hours on Your Network Choose Your Own Disaster – Big Trouble in Little Startup
Fitbit for online security? Lessons learned from the Use of Behavior Science
SPONSOR ROOM
SPONSOR ROOM - IBM
SPONSOR ROOM - LOGICALIS
Throughout the day we will share some of the most widely adopted frameworks and methodologies for identifying and managing cyber risk, and introduce some emerging trends
regarding quantification, prioritization and treatment of risk.
Expert Panelists from Rapid7, Forescout and Malwarebytes Panel DiscussionTra✘ is Sponsored and Moderated by ASMGi Tra✘ is Sponsored and Moderated by ASMGi
Visit the Café and break with our
SPONSORS
ICM Cyber RedSeal Logicalis Involta
LUNCH - Concourse
Jack Nichelson / Jason Middaugh Timothy Roth Crob Chris ZannetosMRK / Cisco Systems Red Hat, Inc Covered Security
EnergyTech - INCOSE CSEP / ASEP TutorialMike Vinarcik
EnergyTech - Training Session: Drone Pilot FAA CertificationInstructor: Tim Marshall, Flamingo Air
To Be Announced
PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY
Delivering Trust and Confidence Through Resilience Securing Unstructured Data in Office 365 Reboot: The I/O Psychology of Cybersecurity
Mark Mahovlich Kurt Van Ettan Tim Beamer Annalea Ilg
17Incident Response - What Really Happens Privacy Matters
Security Endgame: Why utilizing a Security Stack at your company is like wielding the
Infinity Gauntlet.Defense in Depth Requires Securing Databases
Greg Kelley Patrcik Duffy Mitch Spaulding Daniel MorganVestige Digital Investigations Quadax Dark Rhino Security DBSecWorx
15
CYBER RISKTra✘- ASMGi CYBER RISKTra✘- ASMGi
Throughout the day we will share some of the most widely adopted frameworks and methodologies for identifying and managing cyber risk, and introduce some emerging trends
regarding quantification, prioritization and treatment of risk.
Conference Ends. GRAND PRIZE DRAWING !!Drawing for prizes.
Winners must be Present
Break with our SPONSORS.
Ken Smith
Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & LogicalisThe SUMMIT 2019 Gold Sponsors:
17th Annual Information Security Summit - Day 03Friday, October 25 - Sponsored By The CSO Xchange
The I-X Center - Cleveland
SPEAKER READY ROOM
Chris Stapenhurst Joseph Salazar Luke Teeters Keith RayleVeritas Attivo Networks Palo Alto Networks Fortinet, Inc.
SPONSOR ROOM - READ SEAL
23
Converged Perimeters – The Future of Network and Content Security in a Cloud World
16
EXECUTIVE Tra✘- CSO ✘change EXECUTIVE Tra✘- CSO ✘change
Duties, Responsibilities and Compartmentalization of the Person
Responsible for Security
Buidling an Effecive Security and Sustainable Information Security Team 45 Minute Security Metrics Workshop
Richard Ullom, Billy Heiser Kevin Baker Jack Nichelson Gary SheehanNOCHE Breakout Room Western Reserve Group Mutual Westfield Group MRK Elon University
21
22
Identity as The New Perimeter
The Privacy Gameshow Medley Deception Technology, Luxury Item or Lifeline? Defense in Depth: DNS AI and Cybersecurity – Connecting the Machines
Correction From Collaboration
Room #AM PM
RESERVED FOR ENERGYTECH
ISS PLANNING GROUP / VOLUNTEER ROOM
ENERGYTECH PLANNING GROUP ROOM
CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi
ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing
RESERVED FOR ENERGYTECH
Thomas Reed Rob Krug PRESENTER NAMEUniversity of Mount Union / SANS TI Malwarebytes
SPONSOR ROOM - TENABLE
Sonic Wall PRESENTER COMPANY
OEN
PRESENTATION TITLE
Mehmet Munur Chris Stransky Annalea Ilg PRESENTER NAMETsibouris & Associates, LLC
SPONSOR ROOM - OKTA
What is ITIL? A Security Practitioner’s Introduction
TBD
SPONSOR ROOM - CHECK POINT SOFTWARE TECHNOLOGIES
9
10
13-14Welcome , Partner
Message and Announcements
Visit the Café and break with our
SPONSORS
PRESENTATION TITLE
LUNCH - Concourse
PRESENTATION TITLE PRESENTATION TITLE
PRESENTER NAME PRESENTER NAME
Visit the Café and break with our
SPONSORS
Instruction through Practical Experience: CTFs as a Teaching Tool
Incident Response on Mac OS
LUNCH - Concourse
The Strategic Advantage of Adaptive Multi-Engine Advance Threat Protection
Cleveland Clinic Involta PRESENTER COMPANY
PRESENTER NAME
Recent Trends in Information Security and Privacy Laws
ASMGiFriday's Tra✘ Sponsors:
CSO ✘change