agendas - information security summit...college 101, information scramble & panel speed...

6
Agendas: * Monday: Professional Training / OCITA / CSO Xchange * Tuesday: Professional Training / Career Connection / NOCHE / EnergyTech * Wednesday: 17th Annual ISS Day - 1 / EnergyTech * Thursday: 17th Annual ISS Day - 2 / EnergyTech * Friday: 17th Annual ISS Day - 3 / EnergyTech

Upload: others

Post on 15-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Agendas - Information Security Summit...College 101, Information Scramble & Panel Speed Networking Roundtables with IT Professionals Presented by RITE College / University Students:

Agendas:

* Monday: Professional Training / OCITA / CSO Xchange* Tuesday: Professional Training / Career Connection / NOCHE / EnergyTech* Wednesday: 17th Annual ISS Day-1 / EnergyTech * Thursday: 17th Annual ISS Day-2 / EnergyTech* Friday: 17th Annual ISS Day-3 / EnergyTech

Page 2: Agendas - Information Security Summit...College 101, Information Scramble & Panel Speed Networking Roundtables with IT Professionals Presented by RITE College / University Students:

7:30 8:30 8:45 9:00 9:30 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00 3:30 4:00 4:30 5:00 - 7:00 PM

1

2

3

Café'

5

8

LUNCH - Concourse

11

12

18

19

20

26

Grand Ball-room

HBI Principal, Director, ISSA Distinguiished Fellow

Correction From Collaboration

Tyler HudakTrustedSec

Introduction to Malware Analysis

Tyler HudakTrustedSec

Open Source Intelligence (OSINT) Gathering Essential Training

Jerod BrennenBrennen Consulting

Oracle Database Security Master Class

Daniel MorganDBSecWorx

Open Source Intelligence (OSINT) Gathering Essential Training

OCITA Program - Leading Controls and Tools: Part IV

OCITA Program - Connected and Self-Driving Vehicles: The Road. Reimaged, Secured, &

Lives Transformed

Cuyahoga County

SPONSOR ROOM

SOCC - Gov't Services Beverlyn Johns,

Business Transformation Pgm. Mgr. DAS

Surprising Secrets of the Most Cyber Resilient Orgs

Steve Hunt

Microsoft Technology State & Local Govt

Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & Logicalis

ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing

CSO ✘change Fall Meeting CSO ✘change Fall Meeting

SPONSOR ROOM - CHECK POINT SOFTWARE TECHNOLOGIES

10

The SUMMIT 2019 Gold Sponsors:

RESERVED FOR ENERGYTECH ./ Exhibitor Set-up

Professional ✘clerator Training Day / CSO Xchange Meeting / OCITA Meeting

AM PMRoom #

Monday, October 21

16

The I-X Center - Cleveland

SPONSOR ROOM - OKTA

21

Jerod BrennenBrennen Consulting

DOORS OPEN Registration /

Continental Breakfast - Sponsor Exhibit Area

RESERVED FOR ENERGYTECH

OCITA Program - ElectionGuard: Election Security Tools

24

OCITA Program - Geographic Information Systems Now and the Future

Tom Fisher, Enterprise GIS Applications Admin.

Break with our SPONSORS.

LUNCH - Concourse

LUNCH - ConcourseIntroduction to Malware Analysis

SPONSOR ROOM - TENABLE

ISS PLANNING GROUP / VOLUNTEER ROOM

ENERGYTECH PLANNING GROUP ROOM

CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi

SPONSOR ROOM - IBM

✘ceptional Networking.

SPONSOR ROOM - LOGICALIS

Oracle Database Security Master Class

Daniel MorganDBSecWorx

Jeremy Mio, Information Security Officer Brian Kelley

Cuyahoga County Ohio Turnpike

Technology Break / Visit with our SPONSORS.

17

SPONSOR ROOM - RED SEAL

Danilo Casino - Technology Strategist

OCITA - KEYNOTE ADDRESS

Mark Smith

COO - State of Ohio

LUNCH - Concourse

Page 3: Agendas - Information Security Summit...College 101, Information Scramble & Panel Speed Networking Roundtables with IT Professionals Presented by RITE College / University Students:

7:30 8:30 8:45 9:00 9:30 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00 3:30 4:00 4:30 5:00 - 7:00 PM

1 LUNCH - Concourse

2

3

Café'

4 LUNCH - Concourse

5

6

8

11

12

Employers:

TechCred

Cheri RiceODHE

Main Hallway

SHOWCASE TRANSITION

18

19

20

Employers:

TechCred

Cheri Rice, ODHE

26

Grand B'room LUNCH - Concourse

* Registration Required for All Sessions. For more information, visit careerconnectionexpo.com

CAREER CONNECTION EXPO* / EnergyTech / Professional Training

RESERVED FOR ENERGYTECH EnergyTech - Session 3 - Power Generation EnergyTech - Session 6 - Energy Storage RESERVED FOR ENERGYTECH

EnergyTech - EASG Meeting -- full day (RESERVED FOR ENERGYTECH) EnergyTech - EASG Meeting -- full day (RESERVED FOR ENERGYTECH)

EnergyTech - Session 4 - Whacking the Cyber Hackers

Jones

BREAKEnergyTech - Session 5 - Microgrids - Transforming our Virtual

Infrastructure

Baker

EnergyTech - Session 7 - Future of Energy Systems

Kerman

RESERVED FOR RITE and NOCHE

PRESENTER COMPANY PRESENTER COMPANY

EnergyTech - Session 8 - Microgrids - More Power to the City

Thomas

Brought to you by: Baldwin Wallace University

ISS Career Connection Presenting Sponsor

EnergyTech WELCOME & Plenary SessionPanel: Mission Needs, Challenges & Opportunities

EnergyTech - Panel Session (M LaskyPowering Through: Building Critical Infrastructures Resilience

EnergyTech - STEM / Student Visitors POSTER TALKS

15-16Presented by RITE

College / University Students:

ENERGYTECH ENERGYTECH

ENERGYTECH ENERGYTECH

PRESENTER NAMEPRESENTER COMPANY

Passport to IT Careers: ▪College 101, Information Scramble & Panel

▪Speed Networking Roundtables with IT Professionals

PRESENTER NAME PRESENTER NAME

SPONSOR ROOM - OKTA

SPONSOR ROOM - TENABLE

Postsecondary Educators/Faculty:

9

Supported by NOCHE

PRESENTER NAMEPRESENTER NAME

7

21

17Daniel Morgan

DBSecWorx

High School Students & Employers:Passport to IT Careers - NEO Passport

(AM Session of All Day Employer Showcase)Presented by RITE

PRESENTER NAME PRESENTER NAME10

ENERGYTECH

Oracle Database Security Master Class

Daniel MorganDBSecWorx

Oracle Database Security Master Class

13-14

College and University Students, Recent Grads & Jobseekers and Employers:Linking IT and Cybersecurity Talent to Opportunity Internship and Job Fair

(PM Session of All Day Employer Showcase) Presented by NOCHE and GCP

Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & Logicalis

PRESENTER COMPANY

LUNCH - Concourse

PRESENTER COMPANY PRESENTER COMPANY

Presented by NOCHE and NEOCC

RITE Regional IT Educators Consortium - Inaugural Meeting

Tyler Hudak

Introduction to Malware Analysis

Tyler Hudak

RESERVED FOR RITE AND NOCHE

College/University Students:

Rev Up Your Technology IQ!

Presented by OHTec and The NEO CIO Forum

Part 1

22

High School Students:

LUNCH - Concourse

College/University Faculty & Staff + Employers:

25

✘ceptional Networking.

ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing

CAPTURE THE FLAG

LUNCH - Concourse

College/University Students:

Rev Up Your Technology IQ!

Presented by OHTec and The NEO CIO Forum

College/University Students:

Speed Networking Roundtables with IT Professionals

Presented by RITE

PRESENTER COMPANY

Brought to you by: Baldwin Wallace University

SPONSOR ROOM - RED SEAL

SPONSOR ROOM

SPONSOR ROOM - IBM

RESERVED FOR RITE AND NOCHE

College/University Students:

Speed Networking Roundtables with IT Professionals

Presented by RITE

TrustedSec TrustedSec

How to Get Future Ready

SPONSOR ROOM - LOGICALIS

LUNCH - Concourse

C/U Faculty & Staff ONLY: College / University Students:

The SUMMIT 2019 Gold Sponsors:

Room #AM PM

DOORS OPEN Registration /

Continental Breakfast - Sponsor Exhibit Area

ISS PLANNING GROUP / VOLUNTEER ROOM

Career Connection Expo Diamond Sponsor

Presented by RITE

Tuesday, October 22The I-X Center - Cleveland

PRESENTER NAMEPRESENTER COMPANY

Presented by RITE HR IT Roundtable

Innovations and Alignment in Cybersecurity Education

HS / College / University Faculty:

Rev Up Your Technology IQPresented by OHTec and The

NEO CIO Forum

HS / College / University Faculty:

Get the Facts on IT Talent DemandPresented by TeamNEO

24Introducton to Malware Analysis

23

High School Students:

Passport to IT Careers▪College 101, Information Scramble & Panel

▪Speed Networking Roundtables with IT Professionals

Presented by RITE

College / University Students:

RESERVED FOR RITE AND NOCHE How to Get Future Ready

Presented by TeamNEO

ENERGYTECH PLANNING GROUP ROOM

CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi

EnergyTech - TUTORIAL - Lean Startup Methods

M. Pafford

EnergyTech - TUTORIAL - Lean Startup Methods

M. PaffordPart 1

Presented by RITE HR IT Roundtable

High School Students:

Passport to IT Careers▪College 101, Information Scramble & Panel

▪Speed Networking Roundtables with IT Professionals

Presented by RITE

RESERVED FOR RITE AND NOCHE

ENERGYTECH

ENERGYTECH

College / University Students:

SPONSOR ROOM - CHECK POINT SOFTWARE TECHNOLOGIES

CAPTURE THE FLAG!

ENERGYTECH

Page 4: Agendas - Information Security Summit...College 101, Information Scramble & Panel Speed Networking Roundtables with IT Professionals Presented by RITE College / University Students:

7:00 8:00 8:30 9:00 9:30 9:45 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00 3:30 4:00 4:30 5:00 - 7:00 PM

1 LUNCH - ConcourseXceptional Networking

2

3

Café'

4

5

6

8

11

12

18

19

20

23

24

25

26

Grand B'room

EnergtTech Opening Remarks

M. Jenning-Bates / PAL-V BREAK BREAK

Panel: Tackling the Systems Challenge

Moody's: Financial & Credit Implications of

Cyber RiskPoster Talks

KEYNOTE ADDRESS

Aronetics

KEYNOTE ADDRESS: Dr HH Schmitt EnergyTech Exhibit Visitors

✘ceptional Networking

Reception (Area TBD)

RESERVED FOR ENERGYTECH EnergyTech - Session 21 - Thermal Management EnergyTech - Session 22 - Power Management EnergyTech - Session 23 - Power Distribution

BONUS BREAK TIME! Check out all the sponsors and say

HELLO!

EnergyTech - Session 11 - System Models: Health / Energy

EnergyTech - Session 9 - Model Intergration

EnergyTech - Session 12 - Digital Enterprise

BONUS BREAK TIME! Check out all the sponsors and say

HELLO!

EnergyTech - Session 13 - SE for Buildings

EnergyTech - Session 14 - MBSE Model Management

EnergyTech - Session 10 - Power Model Application

EASG Meeting -- full day (RESERVED FOR ENERGYTECH)

Westfield Artic Wolf Networks IBM

BREAK Visit the Café LUNCH - ConcourseBreak with our

SPONSORS.

Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & Logicalis

Securing the 4th Industrial RevolutionThe Changing Contractual and Compliance

Landscape

MANUFACTURING Tra✘ - TrustedSec

Xceptional Networking.

SPONSOR ROOM - LOGICALIS

The SUMMIT 2019 Gold Sponsors:

17 Annual Information Security Summit - DAY 01Wednesday, October 23

The I-X Center - Cleveland

ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing

15

21Anti Hacker Techniques and Technologies Digital Survival

SOC-as-a-Service & Tales from the Trenches: Cyber Security War Stories

New Targets on Cybercriminals' Radar

John Aron Kevin Baker Marty Sanders Shaked Vax

22

17

An Introduction to FAIR – Cyber Risk Quantification

Anatomy of a Cyber AttackDemystifying Industrial Control System Cyber

RiskComputer Capers - Then and Now

Michael Radigan Matt Radolec Michael Radigan Steve Margolis / Luke Margolis Varonis

SPONSOR ROOM - IBM

13-14

Super Charge Your Cybersecurity Career Business Cyber Survival: Are You at Risk?

LUNCH - Concourse

Business Cyber Survival: Are You at Risk?

Steven Hunt Loren W. Wagner

David Kennedy

Challenges Facing Manufacturers - Attack Landscape, Recent Breaches, etc.

Building an IR Program

TrustedSec

Incident Response: Under the Microscope

16

Timothy M. Opsitnick

LEGAL and COMPLIANCE Tra✘ - Ulmer LEGAL and COMPLIANCE Tra✘ - Ulmer

HuntBI CentraComm CentraComm

Tyler Hudak, Steve Stransky, Josh Kelley, Paul Sems, Ned Sherry

Pam Gerber, Todd Riley, Billy Heiser, Rockie Brockway, Stephen Marchewitz

Alex Hammerstone, Bob Salandre, Steve Stransky, Rockie Brockway

Joe WeissLoren W. Wagner

10Student Conference Orientation Cyber Defense….Try Offense Top 5 Quick Wins in Cybersecurity Essentials Next-Gen SOC - A Case Study at Palo Alto

College / High School Students Tony Pietrocola Chad Voller / Bryan Smith Kevin FlanaganShane Donahue / Gary Sheehan Agile1 BMF Cyber Technology Group Palo Alto Networks

BREAK Visit the Café

Aligning App Sec With Digital TransformationO365 Hijacking and Best Practices to Protect

Yourself

LUNCH - Concourse

The Impossibility of Security IAM SystemsCyber Incident Response- Addressing the

Concerns of the Business

SPONSOR ROOM - OKTA

SPONSOR ROOM - TENABLE

Break with our SPONSORS.

Announcements, Partner Message and Keynote Introduction

IBM

Capturing the Bayrob Group!Ulmer Panel Discussion

The California Consumer Privacy Act: Implementing Sustainable Compliance

Solutions

Ryan Macfarlane / Duncan Brown

BREAK Visit the Café

PRESENTER NAME Steven G. Stransky

Technology Concepts & Design, Inc. (TCDI)FBI - Supervisory Special Agent / US

Assistant Attorney Ulmer Berne, LLP Thompson Hine LLP

Break with our SPONSORS.

Larry Cox Joshua Skeens Steve Bryant Tom Hardin

SonicWall GATE, LLC. Franciscan Alliance

Correction From Collaboration

Room #AM PM

DOORS OPEN Registration /

Continental Breakfast - Sponsor Exhibit Area

ISS PLANNING GROUP / VOLUNTEER ROOM

ENERGYTECH PLANNING GROUP ROOM

CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi

MANUFACTURING Tra✘ - TrustedSec

SPONSOR ROOM - READ SEAL

SPEAKER READY ROOM

SPONSOR ROOM - CHECK POINT SOFTWARE TECHNOLOGIES

9

ISS / EnergyTech Announcements, Partner Message and Keynote Introduction

KEYNOTE ADDRESS: Joe Weiss

KEYNOTE: Top Cybersecurity Issues when Migrating to the Cloud

SPONSOR ROOM

Bob Kalka

TrustedSecWednesday's Tra✘ Sponsors:

Ulmer Byrne

Page 5: Agendas - Information Security Summit...College 101, Information Scramble & Panel Speed Networking Roundtables with IT Professionals Presented by RITE College / University Students:

7:30 8:15 8:30 9:00 9:30 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00 3:30 4:00 4:30 5:00 - 8:00 PM

1 LUNCH - Concourse CASINO NIGHT!!

2

3

Café'

4

5

6

8

11

12

18

19

20

24 BREAK

26

Grand B'room

BREAK LUNCH - Concourse BREAK Closing Plenary

EnergyTech; Session 18

IBM Hack-a-thon

EnergyTech Session 19

Break with our SPONSORS.

EnergyTech Session 17 - PDD ENnergyTech Session 17 - PDD

✘ceptional Networking. CASINO

NIGHT!!

23Developing Super Women in Security To Be Announced To Be Announced

Why No One Listens to Us – Articulating Information Security Risk as Business Risk

Kate Kuehn Mike Patterson Dennis Underwood Alex Hammerstone

PRESENTER COMPANY Check Point Software

Reserved for One Identity Don't Take a Knife to a Gun Fight Customer Service, Disservice or Self-ServiceRegulations & Privacy Requirements Across

the Globe

To Be Determined Ameya Talwalkar

EnergyTech - SAE / NASA Standards Workshop - High Voltage Stds. EnergyTech - SAE / NASA Standards Workshop - High Voltage Stds.

Keynote: M PennottiCal for Tech Leaders

Joint Panel PMI/INCOSE Collaborating for Success

EnergyTech; Session 15 PDD

IBM Hack-a-thon

Visit the Café and break with our

SPONSORS

EnergyTech; Session 16

Can AI/ML help us solve real cyber problems and protect our enterprises from cyber-attacks? In each of these 4 sessions we will learn how AI/ML is being used to identify risks and

anomalous behaviors and ultimately automate detection and response to cyber threats to better protect our enterprises.

Can AI/ML help us solve real cyber problems and protect our enterprises from cyber-attacks? In each of these 4 sessions we will learn how AI/ML is being used to identify risks and

anomalous behaviors and ultimately automate detection and response to cyber threats to better protect our enterprises.

Panelists include Tom Tully, Bradford Cross and Guy BejeranoTra✘ is Sponsored and Moderated by ASMGi

Panelists include representatives from Rapid7, Forescout and MalwarebytesTra✘ is Sponsored and Moderated by ASMGi

AI Innovation in Medical Devices Protect Your Connected Medical Devices and Keep Hospital Operations Running Smoothly

Breaches Stop Here: Managing Medical Device Security Risk

PRESENTER NAME Kierk Sanderlin Itzik Feiglevitch Jonathan Langer

Cyber Cat & Cyber Mouse Rockin’ the CASB

Carl Gustas Glen Roebuck Laurence Pitt Cory KramerCequence Security Thales E-Security Juniper Networks Logicalis

Scaling Multicloud and Hybrid Cloud Usage without Sacrificing Data Security and

Compliance

Xceptional Networking. CASINO NIGHT!!

RESERVED FOR ENERGYTECH

ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing

SPEAKER READY ROOM

Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & Logicalis

HEALTHCARE TECHNOLOGY Tra✘ - Check Point Software HEALTHCARE TECHNOLOGY Tra✘ - Check Point Software

15

SPONSOR ROOM - LOGICALIS

Senseon Sophos Cybercrucible TrustedSec

Cequence Security O'Leary Management Education BSI

13-14Welcome, Partner

Message and Keynote Introduction

Visit the Café and break with our

SPONSORS

PRESENTATION TITLE

LUNCH - Concourse

SPONSOR ROOM - RED SEAL

The SUMMIT 2019 Gold Sponsors:

17th Annual Information Security Summit - DAY 02Thursday, October 24 - Sponsored By CEQUENCE SECURITY

The I-X Center - Cleveland

25

22

The Internet of Things That Shouldn't Be On The Internet

Dealing With Digital Lifestyles Zero Trust - Doing it The Right WayEverything You Know About How to Cyber

Secure Your Organization Just Changed

Chris Bush Patrick McCrann Andy Hicks Caston ThomasMcAfee Aetna Guardicore InterWorks, LLC

John O'Leary Christopher BerensternOne Identity

17

What Does a Mature Cybersecurity Program Look Like?

SPONSOR ROOM

SPONSOR ROOM - IBM

9

Visit the Café and break with our

SPONSORS

Magic + Ultra + Humans = Disaster: The USS Indianapolis

Your next security strategy (Is the security model of today broken?)

LUNCH - Concourse

Considerations for an Effective Awareness Program: Thinking Like an Attacker

The People Priority- Developing a Security Awareness Program with your Employees in

Mind

Break with our SPONSORS.

John O'Leary Laurence Pitt Ken Smith Lauren ZinkO'Leary Management Education Juniper Networks University of Mount Union / SANS TI AmTrust Financial

16

CLOUD SECURITY Tra✘

10

Case Study - Growing Security Champions at Progressive

Wireless Intrusion Prevention – Wireless threat vectors that network managers need to

defend against.

Best Practices Building a Resilience Cyber Security Strategy

SDLC for DevSecOps – Why It’s Important to Embrace Agile

David Upson Jeff Burke Kurt Van Etten

SPONSOR ROOM - CHECKPOINT SOFTWARE TECHNOLOGIES

Dave Russo / CrobProgressive Insurance Red Hat, Inc

SPONSOR ROOM - OKTA

SPONSOR ROOM - TENABLE

Announcements, Partner Message and Keynote Introduction

Co-Founder, Chief Risk Scientist Risklens, Inc

PRESENTER COMPANY

Break with our SPONSORS.

PRESENTER NAME PRESENTER NAME

PRESENTER COMPANY

Check Point Software Medigate

RESERVED

AI / MACHINE LEARNING Tra✘ - ASMGi AI / MACHINE LEARNING Tra✘ - ASMGi

PRESENTATION TITLE

CLOUD SECURITY Tra✘

Malicious Bot Attacks: The New #1 Cyber Threat

Correction From Collaboration

Room #AM PM

DOORS OPEN Registration /

Continental Breakfast - Sponsor Exhibit Area

ISS PLANNING GROUP / VOLUNTEER ROOM

ENERGYTECH PLANNING GROUP ROOM

CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi

My CEO Told Me We Have to Move Our Datacenter to the Cloud…So, What’s the Big

Deal?

Grant AsplundGlobal Cloud Evangelist Check Point Softwarre

21

Jack Jones

LUNCH - Concourse

Arista Networks RedSeal

Thursday's Tra✘ Sponsors:Check Point ASMGi

Page 6: Agendas - Information Security Summit...College 101, Information Scramble & Panel Speed Networking Roundtables with IT Professionals Presented by RITE College / University Students:

7:30 8:15 8:30 9:00 9:30 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00

1

2

3

Café'

4

5

6

8

11

12

NOCHE Breakout Room

18

19

20 Break with our SPONSORS.

24

25

26

Grand B'room BREAK

MAIN HALL Drone Program SETUP (Netting, AV, Tables, etc.)

EnergyTech - Tool Time (Vendor Demo) EnergyTech - Drone Panel -- (Jones)LUNCH - Concourse

EnergyTech - Tutorial Mike Vinarcik

EnergyTech - Tutorial S Pavlakis

INTERNATIONAL DRONE CHAMPIONSHIP

DOORS OPEN Registration /

Continental Breakfast - Sponsor Exhibit Area

KEYNOTE: The Ethics of A.I & the DNA Malware

Eddie DoyleGlobal Security Strategist

Check Point Software

True Crime - The First 48 hours on Your Network Choose Your Own Disaster – Big Trouble in Little Startup

Fitbit for online security? Lessons learned from the Use of Behavior Science

SPONSOR ROOM

SPONSOR ROOM - IBM

SPONSOR ROOM - LOGICALIS

Throughout the day we will share some of the most widely adopted frameworks and methodologies for identifying and managing cyber risk, and introduce some emerging trends

regarding quantification, prioritization and treatment of risk.

Expert Panelists from Rapid7, Forescout and Malwarebytes Panel DiscussionTra✘ is Sponsored and Moderated by ASMGi Tra✘ is Sponsored and Moderated by ASMGi

Visit the Café and break with our

SPONSORS

ICM Cyber RedSeal Logicalis Involta

LUNCH - Concourse

Jack Nichelson / Jason Middaugh Timothy Roth Crob Chris ZannetosMRK / Cisco Systems Red Hat, Inc Covered Security

EnergyTech - INCOSE CSEP / ASEP TutorialMike Vinarcik

EnergyTech - Training Session: Drone Pilot FAA CertificationInstructor: Tim Marshall, Flamingo Air

To Be Announced

PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY

Delivering Trust and Confidence Through Resilience Securing Unstructured Data in Office 365 Reboot: The I/O Psychology of Cybersecurity

Mark Mahovlich Kurt Van Ettan Tim Beamer Annalea Ilg

17Incident Response - What Really Happens Privacy Matters

Security Endgame: Why utilizing a Security Stack at your company is like wielding the

Infinity Gauntlet.Defense in Depth Requires Securing Databases

Greg Kelley Patrcik Duffy Mitch Spaulding Daniel MorganVestige Digital Investigations Quadax Dark Rhino Security DBSecWorx

15

CYBER RISKTra✘- ASMGi CYBER RISKTra✘- ASMGi

Throughout the day we will share some of the most widely adopted frameworks and methodologies for identifying and managing cyber risk, and introduce some emerging trends

regarding quantification, prioritization and treatment of risk.

Conference Ends. GRAND PRIZE DRAWING !!Drawing for prizes.

Winners must be Present

Break with our SPONSORS.

Ken Smith

Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & LogicalisThe SUMMIT 2019 Gold Sponsors:

17th Annual Information Security Summit - Day 03Friday, October 25 - Sponsored By The CSO Xchange

The I-X Center - Cleveland

SPEAKER READY ROOM

Chris Stapenhurst Joseph Salazar Luke Teeters Keith RayleVeritas Attivo Networks Palo Alto Networks Fortinet, Inc.

SPONSOR ROOM - READ SEAL

23

Converged Perimeters – The Future of Network and Content Security in a Cloud World

16

EXECUTIVE Tra✘- CSO ✘change EXECUTIVE Tra✘- CSO ✘change

Duties, Responsibilities and Compartmentalization of the Person

Responsible for Security

Buidling an Effecive Security and Sustainable Information Security Team 45 Minute Security Metrics Workshop

Richard Ullom, Billy Heiser Kevin Baker Jack Nichelson Gary SheehanNOCHE Breakout Room Western Reserve Group Mutual Westfield Group MRK Elon University

21

22

Identity as The New Perimeter

The Privacy Gameshow Medley Deception Technology, Luxury Item or Lifeline? Defense in Depth: DNS AI and Cybersecurity – Connecting the Machines

Correction From Collaboration

Room #AM PM

RESERVED FOR ENERGYTECH

ISS PLANNING GROUP / VOLUNTEER ROOM

ENERGYTECH PLANNING GROUP ROOM

CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi

ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing

RESERVED FOR ENERGYTECH

Thomas Reed Rob Krug PRESENTER NAMEUniversity of Mount Union / SANS TI Malwarebytes

SPONSOR ROOM - TENABLE

Sonic Wall PRESENTER COMPANY

OEN

PRESENTATION TITLE

Mehmet Munur Chris Stransky Annalea Ilg PRESENTER NAMETsibouris & Associates, LLC

SPONSOR ROOM - OKTA

What is ITIL? A Security Practitioner’s Introduction

TBD

SPONSOR ROOM - CHECK POINT SOFTWARE TECHNOLOGIES

9

10

13-14Welcome , Partner

Message and Announcements

Visit the Café and break with our

SPONSORS

PRESENTATION TITLE

LUNCH - Concourse

PRESENTATION TITLE PRESENTATION TITLE

PRESENTER NAME PRESENTER NAME

Visit the Café and break with our

SPONSORS

Instruction through Practical Experience: CTFs as a Teaching Tool

Incident Response on Mac OS

LUNCH - Concourse

The Strategic Advantage of Adaptive Multi-Engine Advance Threat Protection

Cleveland Clinic Involta PRESENTER COMPANY

PRESENTER NAME

Recent Trends in Information Security and Privacy Laws

ASMGiFriday's Tra✘ Sponsors:

CSO ✘change