KEYNOTE SPEAKERS

Tuesday Morning Keynote

 

A Different Type of State Emergency: Cyber!

In 2018 the State of Colorado was the first state in the nation to ever declare a state emergency, based on a cybersecurity event.  The Colorado Department of Transportation (CDOT) experienced a SamSam ransomware attack, which crippled its business operations for an entire month.  Colorado's state CISO will talk about the event, the partnerships that helped to restore CDOT, communications challenges, and lessons learned.

Deborah Blyth, CISSP, CISM
Chief Information Security Officer, Colorado Governor's Office of Information Technology
 

Deborah Blyth is Colorado’s Chief Information Security Officer (CISO), with over 25 years technology background and 12 years leading information security programs.  As the CISO, she serves as the point of contact for all information security initiatives in Colorado, informing the state Chief Information Officer and executive agency leadership on security risks and impacts of policy and management decisions on IT-related initiatives. Deborah is responsible for determining the strategic and tactical security direction for executive branch agencies, to meet established objectives. Before joining the state of Colorado, Deborah led the Information Technology Security and Compliance programs at TeleTech (5 years) and Travelport (3 years).  

Tuesday Lunch Keynote

 
Hiring and Retaining Staff in Cybersecurity: Lessons Learned
 
We spend a lot of time talking about the FUTURE of the cybersecurity workforce. By 2021, more than 3.5 million job openings will impact the security posture of enterprise, government, and academic institutions across the globe. But we don’t spend a lot of time talking about the PAST. History can tell us a lot about where we’ve been and inform where we’re going—and the case is no exception when it comes to hiring the next generation of cyber professionals. 
Laura Lee will share how a 1940’s secret recruiting campaign targeting female high school teachers and recent college graduates for cryptanalyst jobs set an expectation for diversity in coding.  That effort to hire code breakers analyzed the attributes needed to be successful in this field that is now cyber.
Laura will discuss why examining the hiring and employee retention methods leading up to World War II can help the cybersecurity workforce challenges of today and how we can use modern techniques, such as gamification to IDENTIFY – SCREEN - ASSESS – PLACE – TRAIN – RETAIN staff.  She will describe methods that rely on Artificial Intelligence to help instruct and score cybersecurity professionals.  This talk is designed to stimulate ideas in the audience on “How to Grow Cybersecurity Professionals” in the modern world.
After a short presentation, Laura will engage the audience with example cyber games that illustrate the attacker’s kill chain, show the relationship between common ports and protocols, reinforce binary and hexadecimal conversion and play good old-fashioned cyber trivia!
Laura Lee
Executive Vice President of Rapid Prototyping
Circadence Corporation
 
Laura Lee is the Executive Vice President of Rapid Prototyping at Circadence Corporation. In this role, she applies her extensive knowledge and experience in cybersecurity workforce development to help organizations understand how to identify, screen, assess, train and retain cybersecurity professionals. She previously led the product development for the Circadence® Project Ares® next generation cybersecurity training and assessment platform and the Orion Mission Builder.

Laura holds a Bachelor of Science in Aerospace Engineering from the University of Minnesota and a Master of Science in Aerospace Engineering and Mechanics from the University of Notre Dame. She also has a Juris Doctorate from George Mason University School of Law. She is also adjunct faculty at the University of Colorado Boulder where she teaches Immersive Cyber Defense to graduate students. Laura is a Certified Information Systems Security Professional (CISSP) and holds certifications in gamification and game development. She was recently awarded Cybersecurity Women of the Year GOLD in 2019. 
 

Wednesday Morning - Keynote

Is the security industry even solving our problems?  If not, what can WE do about that?

More and more products are hitting the market promising to increase efficacy and decrease false positives.  Most of these products represent only incremental change to the status quo despite being labeled as “disruption”.  The reason for this charade is due largely to the business models upon which our industry is based.  Most of the so-called disruption comes from startups whose exit strategy more often than not is to be acquired by one of the existing big players in the industry.  Venture Capitalists back these companies, perceiving their value not in terms of whether or not they solve a problem, but whether or not they can look attractive to future buyers.

Another facet as to why the industry is not helping us is on us, the practitioners.  Rarely do we perform adequate or meaningful threat modeling or risk analysis.  Tools are purchased based on gut feel, on past experiences in other environments, or simply because “everyone has that kind of tool”.  With little regard given to risk, threat and maturity, we often find ourselves spending money that could prove more useful elsewhere.  And above all of this is the overarching fact that the un-sexy, un-glamorous security fundamentals are more critical to protecting our environment than the flash of our tech stack.

Allan Aldord
Chief Information Security Officer (CISO) at Mitel

Allan Alford is Chief Information Security Officer (CISO) at Mitel, formerly CISO at Forcepoint and at Polycom. In his CISO roles Alford has managed enterprise security as well as compliance with various frameworks such as GDPR, NIST SP800-171 and ISO 27001.

 

With more than 30 years of IT and Engineering security experience, Alford has a strong product and cloud security background, overseeing security for Mitel’s UCaaS cloud offerings and having served at Pearson as Product Information Security Officer (PISO) (where he created the security practice for a massive-scale companywide cloud transformation program).  Alford also built and led the product security program at Polycom, integrating it fully into the business.

 

Alford is also co-host of “Defense in Depth” – a weekly podcast that focuses each episode on a specific, popular topic from the world of information security.

 

A perpetual learner, Alford is currently pursuing a master's degree in Information Systems and Security from Our Lady of the Lake University and received a bachelor's degree in Liberal Arts with a focus on leadership from DePaul University. Alford also holds a CISM certification.

Wednesday Lunch Keynote

Aamir Lakhani
Senior Security Researcher for FortiGuard Labs at Fortinet

Aamir Lakhani is a leading Senior Security Researcher for FortiGuard Labs at Fortinet. He is responsible for providing IT security solutions to major enterprises and government organizations.

Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions and government organizations. 

Lakhani has designed offensive counterdefense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups.

Killing Them Softly with His Song
 

"Chaos is inherent in all compounded things..." - Buddha.

Chaos is inherent in our lives filled with technology. Mobile phones, voice assistance, 4K streaming devices, connected utilities, IoT devices have made our world more relevant and more dangerous than ever.  Attackers have unlimited attack surface and targets to compromise. 

This talk will examine current attacks and schemes attackers use to make money, steal identities, and target individuals. This talk is an exploratory look at how cybercriminals make money with low-level crime, the technology they use, and how they get away with it. 

We will explore some techniques they have used from simple gift card theft, credit card theft, attacks against public utilities, and their continued attempts at blackmail and fraud. Explore with me how attackers are all killing us softly and slowly with our technology. 

AGENDA

Tuesday, April 23, 2019
7:30 AM
Breakfast in Exhibit Hall 7:30-8:30 am
7:30 AM
7:30 AM - 4:30 PM
Registration Open
7:30 AM - 4:30 PM
8:30 AM
Welcome Remarks 8:30-9:00 am
8:30 AM
9:00 AM
Tuesday Morning Keynote: A Different Type of State Emergency: Cyber!
9:00 AM
10:00 AM
Break in the Exhibit Hall - Open 10:00-10:30 am
10:00 AM
10:00 AM - 10:20 AM
ManagedMethods Product Demonstration
10:00 AM - 10:20 AM
10:00 AM - 10:45 AM
The Living Security Escape Room , 4/23-10:00 am
10:00 AM - 10:45 AM
10:30 AM - 10:50 AM
KPMG Product Demonstration
10:30 AM - 10:50 AM
10:30 AM - 11:30 AM
Moving from an Infrastructure to an Application Security Focus
10:30 AM - 11:30 AM
Automate Your Vulnerability Management so You Can Focus on Remediation
10:30 AM - 11:30 AM
Anatomy of an Attack
10:30 AM - 11:30 AM
Multifactor Authentication (MFA) Stopped the Hackers in their Tracks
10:30 AM - 11:30 AM
Using Your Agency's Microsoft Secure Score to Measure and Communicate Progress to the C-Level
10:30 AM - 11:30 AM
10:45 AM - 11:30 AM
The Living Security Escape Room, 4/23-10:45 am
10:45 AM - 11:30 AM
11:00 AM - 11:20 AM
Kudelski Security & McAfee Product Demonstration
11:00 AM - 11:20 AM
11:30 AM
Tuesday Lunch & Keynote: Hiring and Retaining Staff in Cybersecurity: Lessons Learned
11:30 AM
11:30 AM - 11:50 AM
CISOBox Product Demonstration
11:30 AM - 11:50 AM
11:30 AM - 12:15 PM
The Living Security Escape Room, 4/23-11:30 am
11:30 AM - 12:15 PM
12:00 PM - 12:20 PM
IXIA A Keysight Business Product Demonstration
12:00 PM - 12:20 PM
12:15 PM - 1:00 PM
The Living Security Escape Room, 4/23-12:15 pm
12:15 PM - 1:00 PM
1:00 PM - 1:20 PM
Zimperium Product Demonstration
1:00 PM - 1:20 PM
1:00 PM - 1:45 PM
The Living Security Escape Room, 4/23-1:00 pm
1:00 PM - 1:45 PM
1:00 PM - 2:00 PM
Let Security Automation and Analytics Work for You
1:00 PM - 2:00 PM
From Federation to Centralization - Creating a Consolidated Information Security Program Across a University System (And Living to Tell About It!)
1:00 PM - 2:00 PM
Breach! Are you covered?
1:00 PM - 2:00 PM
The Threat of Rogue IoT Devices
1:00 PM - 2:00 PM
Managing Digital Risk
1:00 PM - 2:00 PM
1:30 PM - 1:50 PM
Cisco Cloud Security Product Demonstration
1:30 PM - 1:50 PM
1:45 PM - 2:30 PM
The Living Security Escape Room, 4/23-1:45 pm
1:45 PM - 2:30 PM
2:00 PM - 2:20 PM
Infodat Product Demonstration
2:00 PM - 2:20 PM
2:00 PM - 3:00 PM
The Rise of the Humans
2:00 PM - 3:00 PM
Zero Trust Access: Five Steps to Securing the Extended Enterprise
2:00 PM - 3:00 PM
CISO Guide: How to Win Board Members and Influence Business Strategy
2:00 PM - 3:00 PM
How a Risk Focus Results in Better Assessments and Stronger Security Programs
2:00 PM - 3:00 PM
Cloud Security Solutions for Public Institutions: The Role of Technology in Cybersecurity & Safety
2:00 PM - 3:00 PM
2:30 PM - 2:50 PM
GTS Technology Solutions Product Demonstration
2:30 PM - 2:50 PM
2:30 PM - 3:15 PM
The Living Security Escape Room, 4/23-2:30 pm
2:30 PM - 3:15 PM
3:00 PM
Break - Exhibit Hall Open 3:00-3:30 pm
3:00 PM
3:00 PM - 3:20 PM
SaltyCloud Product Demonstration
3:00 PM - 3:20 PM
3:15 PM - 4:00 PM
The Living Security Escape Room, 4/23-3:15 pm
3:15 PM - 4:00 PM
3:30 PM - 3:50 PM
CrowdStrike/ForeScout Product Demonstration
3:30 PM - 3:50 PM
3:30 PM - 4:30 PM
Defending Layer 8
3:30 PM - 4:30 PM
Texas Consumer Digital Identity – It’s already here
3:30 PM - 4:30 PM
Introducing the RiskRecon Internet Surface Report
3:30 PM - 4:30 PM
Hunting for Flaws in your Crockpot: Overview of an IoT Pen Test
3:30 PM - 4:30 PM
Catching BAD GUYS with Math - A look at Machine-Learning (AI) and Big-Data in CyberSecurity
3:30 PM - 4:30 PM
4:00 PM - 4:20 PM
Centrify Product Demonstration
4:00 PM - 4:20 PM
4:00 PM - 4:45 PM
The Living Security Escape Room, 4/23-4:00 pm
4:00 PM - 4:45 PM
4:30 PM
Conference Ends for the Day
4:30 PM
Wednesday, April 24, 2019
7:30 AM
Breakfast in Exhibit Hall 7:30-8:30 am
7:30 AM
7:30 AM - 3:00 PM
Registration Open
7:30 AM - 3:00 PM
7:45 AM - 8:30 AM
The Living Security Escape Room, 4/24-7:45 am
7:45 AM - 8:30 AM
8:30 AM
Welcome Remarks 8:30-9:00 am
8:30 AM
8:30 AM - 9:15 AM
The Living Security Escape Room, 4/24-8:30 am
8:30 AM - 9:15 AM
9:00 AM
Wednesday Morning Keynote: Is the security industry even solving our problems? If not, what can WE do about that?
9:00 AM
9:00 AM - 9:20 AM
Netskope Product Demonstration
9:00 AM - 9:20 AM
9:15 AM - 10:00 AM
The Living Security Escape Room, 4/24-9:15 am
9:15 AM - 10:00 AM
9:30 AM - 9:50 AM
CRITICALSTART Product Demonstration
9:30 AM - 9:50 AM
10:00 AM
Break - Exhibit Hall Open 10:00-10:30 am
10:00 AM
10:00 AM - 10:20 AM
PCM-G Product Demonstration
10:00 AM - 10:20 AM
10:00 AM - 10:45 AM
The Living Security Escape Room, 4/24-10:00 am
10:00 AM - 10:45 AM
10:30 AM - 10:50 AM
IBM Security Product Demonstration
10:30 AM - 10:50 AM
10:30 AM - 11:30 AM
How do you 'do' Security in state Government?
10:30 AM - 11:30 AM
Covering Your aaS (as a Service)
10:30 AM - 11:30 AM
Link Security Metrics to Business Impact for Increased Budget and Cyber Resiliency
10:30 AM - 11:30 AM
Insider Threats – The #1 Security Risk
10:30 AM - 11:30 AM
Leveraging Technology for Third Party Vendor Risk Assessments at UT Austin
10:30 AM - 11:30 AM
10:45 AM - 11:30 AM
The Living Security Escape Room, 4/24-10:45 am
10:45 AM - 11:30 AM
11:00 AM - 11:20 AM
RSA Product Demonstration
11:00 AM - 11:20 AM
11:30 AM
Wednesday Lunch & Keynote: Killing Them Softly with His Song
11:30 AM
11:30 AM - 11:50 AM
Zscaler Product Demonstration
11:30 AM - 11:50 AM
11:30 AM - 12:15 PM
The Living Security Escape Room, 4/24-11:30 am
11:30 AM - 12:15 PM
12:00 PM - 12:20 PM
LogRhythm Product Demonstration
12:00 PM - 12:20 PM
12:15 PM - 1:00 PM
The Living Security Escape Room, 4/24-12:15 pm
12:15 PM - 1:00 PM
1:00 PM - 1:20 PM
Direct Line to Compliance Product Demonstration
1:00 PM - 1:20 PM
1:00 PM - 1:45 PM
The Living Security Escape Room, 4/24-1:00 pm
1:00 PM - 1:45 PM
1:00 PM - 3:00 PM
Technology Round Table
1:00 PM - 3:00 PM
Analytics Round Table
1:00 PM - 3:00 PM
Risk Management Round Table
1:00 PM - 3:00 PM
Governance Round Table
1:00 PM - 3:00 PM
Architecture Round Table
1:00 PM - 3:00 PM
1:30 PM - 1:50 PM
Bandura Cyber Product Demonstration
1:30 PM - 1:50 PM
1:45 PM - 2:30 PM
The Living Security Escape Room, 4/24-1:45 pm
1:45 PM - 2:30 PM
2:00 PM - 2:20 PM
Tanium Product Demonstration
2:00 PM - 2:20 PM
2:30 PM - 3:00 PM
DIR Procurement & Contracting Session for Vendors
2:30 PM - 3:00 PM
2:30 PM - 3:15 PM
The Living Security Escape Room, 4/24-2:30 pm
2:30 PM - 3:15 PM
3:00 PM
Conference Ends
3:00 PM