Reset

Advanced Filters
11:00am - 12:00pm EDT - October 18, 2021

Monday
11:00am - 12:00pm EDT - October 18, 2021 | Room: V900- Craig Carpenter
Track: Regulation
Credits Available:
1.00 CPE
Law and regulation are of increasing importance for information security programs and professionals. Cybersecurity risks are directly tied to legal and regulatory risk. This presentation provides a foundational knowledge of law and the specific laws applicable to cybersecurity programs. It demystifies and explains important legal concepts as well as the evolution of law and regulation applicable to cybercrime and cybersecurity. All of this empowers infosec pros to understand and comply with the growing body of legal rules, and have productive conversations about the law.


Objectives:
  • Understand foundational legal concepts and how they relate to information security.
  • Understand the evolving legal and regulatory framework surrounding information security, cybersecurity and privacy.
  • Communicate more effectively about laws, regulations, and how they relate to information security programs and actions.
02:45pm - 03:45pm EDT - October 18, 2021

Monday
02:45pm - 03:45pm EDT - October 18, 2021 | Room: V900- Craig Carpenter
Track: Student Focused
Credits Available:
1.00 CPE
Cybersecurity employee shortages put a demand on current professionals to find qualified applicants. Participants will be introduced to numerous educational career paths they can employ while developing their careers. Each path will be explained along with the significance of following that path, with an emphasis on apprenticeships and the opportunities for advancement of diversity. An exploration of the many forms of networking will be a differentiated with importance of each.


Objectives:
  • Identify multiple educational career paths for cybersecurity.
  • Differentiate the reasons apprenticeships are valuable to the employer and employees.
  • Compare the different means of networking and the importance of each to a career.
10:30am - 11:30am EDT - October 19, 2021

Tuesday
10:30am - 11:30am EDT - October 19, 2021 | Room: V500- Joe Trusso
Track: Professional & Career Development
Credits Available:
1.00 CPE
This talk suggests a wide list of non-fiction, non-textbook, cyber-related books that should be part of your reading list. These titles help put what we as cybersecurity professionals do in the broader context of international conflict, government and society. We all know the "what" and "how" of cybersecurity. A lot of these authors help provide the "why." Starting with Clifford Stoll's 1989 The Cuckoo's Egg and working through books that talk about current hot topics that touch on privacy, misinformation, e-commerce, ARPANET and international cyber conflict, we provide suggestions that should spark interest and discussion - including audience recommendations.


Objectives:
  • Have an extensive list of books to help inspire, enlighten and communicate to peers and co-workers a deeper understanding of why what they do is important.
  • Be inspired to seek out new books that help put the daily grind in a broader societal and historical perspective.
  • Know where to go to find historical knowledge of how the profession has evolved in recent decades.
11:45am - 12:45pm EDT - October 19, 2021

Tuesday
11:45am - 12:45pm EDT - October 19, 2021 | Room: V1300- Josh Ensley
Track: Governance, Risk & Compliance
Credits Available:
1.00 CPE
Ever wonder how we defined the programs that we have today? Many security professionals security started with PCI, HIPAA or SOX compliance. This presentation will take you on a journey from the creation of the Computer Security Program for Mission Operations at Johnson Space Center, NASA. That program was based on data security principles, the Orange Book and the Computer Security Act of 1986. The journey continues through the creation of several more programs; adding compliance, metrics and, in the end, drawing on the past to create a program that was able to be agile enough to meet the rapidly changing needs of the business during a pandemic. This presentation will focus on tricks, traps, lessons learned and standards created along the way.


Objectives:
  • Appreciate much of the history upon which many of our standards and programs are built.
  • Use (often forgotten) principles and lessons learned from the past to help create a data-centric and risk-based program that meets the changing needs of business.
  • Ask questions from a seasoned professional who has helped to create some of the processes and standards through the evolution of computer security, network security, cloud security to cybersecurity.
01:45pm - 02:45pm EDT - October 19, 2021

Tuesday
01:45pm - 02:45pm EDT - October 19, 2021 | Room: V1200-Craig Ciccolella
Track: Small/Medium-sized Business Security
Credits Available:
1.00 CPE
Organizations are starting to understand the security risks that must be addressed within their organizations resulting in businesses hiring CISOs, directors of information security, and other security professionals to address this problem. The question then becomes, where to begin? Using the NIST Cybersecurity Framework as a baseline will give clarity of the security gaps and what needs are to be addressed. The next step is how will this be communicated to the C-Suite to obtain buy-in and, more importantly, budget. This session will present a process for security professionals to build an information security program from the beginning, obtain buy-in from executives, facilitate a culture of security throughout the organization and communicate security posture to the executive team in their language.


Objectives:
  • Use the NIST Cybersecurity Framework as roadmap that can include metrics to determine progress.
  • Develop an outline of an information security program for small and mid-size companies.
  • Develop business cases for security controls and solutions that will be needed to reduce cybersecurity risk.
04:30pm - 05:30pm EDT - October 19, 2021

Tuesday
04:30pm - 05:30pm EDT - October 19, 2021 | Room: V800-Paul Jackino
Track: Supply Chain Security
Credits Available:
1.00 CPE
Recently, the U.S. has fallen victim to the most pernicious and skillful cyber espionage campaign known in our history, SolarWinds. The days to come will reveal more vulnerabilities, other points of weakness in the supply chain and further weaken technical defenses. Supply chains are complex and ever-changing. Consider third-party integrators, addition of new software or hardware products into the environment, and employees of the companies that make up the supply chain. Today’s dynamic technology fabric creates a greater need for due-diligence and common security control baselines as a standard for doing business. Basic reviews typically focus on “questionnaire” type audits that don’t address or satisfy the risks of the third-party workforce. (The 2018 (ISC)2 Cybersecurity report noted that 33% of small businesses admit that their employees had mishandled client credentials.) We, as leaders in cybersecurity, must begin to seriously address all aspects of the supply chain and respond to the weakest links.


Objectives:
  • Understand components of the supply chain and frameworks for assessing cybersecurity risks
  • Understand how Zero-trust enables better third-party risk management
  • Discuss a Roadmap for a successful supply chain insider threat program
10:30am - 11:30am EDT - October 20, 2021

Wednesday
10:30am - 11:30am EDT - October 20, 2021 | Room: V600-Taylor Rondenell
Track: DevSecOp
Credits Available:
1.00 CPE
In a time where DevOps is becoming commonplace, there is a desire for rapid technical automation and deployments to keep up with the pace of demand by organizations. The lightning speed at which this occurs can lead to security being an afterthought and having to be bandaged at a later date. By integrating a security capability into the culture of the organization, security can be "shifted left" and DevSecOps can be ingrained. This results in a proactive protection of the organization's key services. The need for tactical solutions are reduced and the strategic security posture is enhanced.


Objectives:
  • Understand what DevSecOps is.
  • Understand why DevSecOps is needed.
  • Understand how DevSecOps can be implemented.