Preventing Your Organization From Becoming The Next Cyber Crime Victim
September 23, 2020 | 10am - 12pm PT (1pm - 3pm ET)
This presentation will address the global cost of Cybercrime, how it continues to increase each year, how despite the increase in expenditures to fix/cure/prevent Cybercrime the problem just continues to grow and how proper cyber hygiene and corporate/individual cultural shifts offer some simple cost-free solutions to the problem.
Scott Augenbaum | Partner | Hero Publishing
Blockchain and Smart Contracts for Critical Infrastructure Protection
September 30, 2020 | 10am - 12pm PT (1pm - 3pm ET)
This workshop will provide you with basic understanding of blockchain technology in general and smart contracts, and educate you on how these technologies will impact critical infrastructure protection.
Mark Schwartz | Blockchain Pathfinder | ZapTheory, LLC
Cryptocurrencies, Financial Fraud and Tracking Bitcoin
October 7, 2020 | 10am - 12pm PT (1pm - 3pm ET)
This workshop will cover the basics of cryptocurrencies, blockchain technology, and financial fraud and cryptocurrency fraud investigations.
James McDowell | Senior Security Analyst | Alabama Securities Commission
NIST National Cybersecurity Centers for Excellence (NCCOE) Technical Raonsomware Attack Mitigations for Prevention and Response
October 14, 2020 | 10am - 12pm PT (1pm - 3pm ET)
This workshop will describe cybersecurity best practices and recommendations to help you prepare for and respond to a ransomware (or other type of data loss) event.
Principal Cybersecurity Engineer | Mitre Corporation
Implementing a Resilience Centric Approach to Business Continuity: Lessons from the COVID-19 Outbreak
October 21, 2020 | 10am - 12pm PT (1pm - 3pm ET)
In this workshop we will take you through some of the lessons and learnings with our work to assess the economic impact from the COVID-19 pandemic on the surrounding community and businesses in the New England region.
Stephen E. Flynn | Founding Director | Global Resiliency Institute (GRI)
If You are Not Hacking your Physical Security, Someone Else Will. Understand the Mindset of Hackers
October 28, 2020 | 10am - 12pm PT (1pm - 3pm ET)
Security Teams and vendors will never be able to protect other groups completely because they cannot govern every action these teams make on an hourly basis. Therefore, education for everyone on how to secure systems is the best course of action.
Jeff Jones | Threat Hunter and Security Officer | Large Financial Institution
Certified Cyber Security Architect (CCSA) Workshop
November 4 & 11, 2020 | 10am - 12pm PT (1pm - 3pm ET)
This four hour-hour workshop will provide you with the knowledge to achieve the Certified Cyber Security Architect CCSA certification. CCSA is a unique program that validates the knowledge and skills to examine, build a practical and applicable cyber security program for your organization.
Ali Pabrai | CEO | ecfirst.com
Employing the Mitre ATT&CK Knowledgebase for Critical Infrastructure
December 2, 2020 | 10am - 12pm PT (1pm - 3pm ET)
Cyber Security Engineer | Mitre Corporation
Operators of Industrial Control Systems (ICS) like those used in the electric power substations lack the capability for active defense of their systems from cyber adversaries. In this workshop MITRE will present their ATT&CK for ICS model with associated use cases of past and recent incidents.
Business Continuity Planning and Pandemics
December 9, 2020 | 10am - 12pm PT (1pm - 3pm ET)
All businesses should have a plan for emergencies including natural and man-made. This workshop will help attendees prepare a simple plan for natural and man-made disasters as well as one for a Pandemic.
Mary Lasky | Program Manager | Johns Hopkins University - Applied Physics Laboratory
John Jackson | Chair | InfraGard National, Business Continuity Cross Sector Council
Vulnerability and Remediation Tracking Management Program
December 16, 2020 | 10am - 12pm PT (1pm - 3pm ET)
What happens when the pen testers are done testing your websites? How do you track discovered vulnerabilities and weak controls once the auditors leave? This workshop will provide attendees with a real-life process example for tracking and documenting mitigation and remediation efforts of identified vulnerabilities.
Terri Reilly | Sr Cyber Security Analyst, Deputy Program Manager | Department of the Army