Alabama CyberNOW Conference Sessions- 11 April 2019

7:00 am - 8:30 am
Patio Registration & Breakfast
8:30 am - 9:30 am
Ballroom Welcoming Remarks & Morning Keynote
9:30 am - 9:40
Break & Visit Vendor
9:40 am - 10:25 am
Pelham Ron Kent Using AI in Cyber Security

Ron Kent

Ron Kent is a national technical specialist for the Aruba’s AI solution IntroSpect, and is based in Dallas, Texas. Ron is a 28 year veteran of the IT industry, and has worked at companies such as RSA, Sybase, Business Objects, and Mattel. Before his time at HP Aruba, he spent almost a decade at RSA helping customers hunt down the forces of evil with SIEM and full packet capture solutions. When he isn’t tracking down the bad guys in the digital world, Ron enjoys spending time with his wife and family, and also riding motorcycles in the Texas Hill Country.

Mountain Brook Arsh Arora KELIHOS MUST DIE : A Public-Private Partnership (Or Hit Squad)

Arsh Arora

A Public-Private Partnership to dismantle the Kelihos botnet led by UAB – a global network of tens of thousands of infected computers under the control of a cybercriminal that was used to facilitate malicious activities including harvesting login credentials, distributing hundreds of millions of spam e-mails, and installing ransomware and other malicious software.

Bessemer Darren Mott Status of Cyber/ Counter Intelligence

Darren Mott

Darren Mott will discuss the current status of cybersecurity and counterintelligence threats present in Northern Alabama. This would include threats posed by cyber criminals and nation states like China, Russia, North Korea, and Iran.

Vestavia Jaret Langston Smartphone Two Factor Authentication

Jaret Langston

Jaret Langston will be
discussing the sensitive data stored and accessed from smartphones, how currently used single factor authentication is not sufficient, why two-factor authentication is needed to unlock smartphones, and pending research into a new model for 2FA for smartphones.

Helena Taylor Peake Case for Flutter

Taylor Peake

Taylor Peake will build “The Case for Flutter,” Discuss the business benefits and technical features of Google’s cross-platform framework for native mobile development. From the Hamilton app to Alibaba’s app, this framework has proved to be the best cross-platform solution we have ever seen. Hear from MotionMobs President Taylor Peake and CTO Matt Clark about why Flutter makes sense for businesses and see a demo of Flutter’s hot reload functionality and more. Business and technical leaders alike will get a meaningful glimpse into the case for Flutter.

10:25 am - 10:45 am
Break & Visit Vendors
10:45 am - 11:30 am
Pelham Moderator- Dr. Anthony Hood Panel: Using New Technology Securely

Moderator- Dr. Anthony Hood

Dr. Anthony Hood, Ph.D will moderate a panel of Birmingham’s emerging technology companies to share an interesting perspective on how to secure new technology products. Businesses include Wyndy PackHealth, and MotionMobs.

Mountain Brook Gary Warner Financial Crimes in the Age of Social Media

Gary Warner

Bessemer John Lavelle Public Cloud Security

John Lavelle

Vestavia Dean Blakeslee From Overwhelmed to Empowered: Effective Security for the Modern Enterprise

Dean Blakeslee

Helena Paige Boshell Tech Scandals and European Laws: Privacy Regulations

Paige Boshell

Paige Boshell will present How Big Tech Scandals and European Law Led to Privacy Regulation in the US. She has researched this topic extensively, and will share her findings with our audience.

11:30 am - 12:15 pm
Patio Lunch
12:15 pm - 1:30 pm
Ballroom Frank Abagnale Afternoon Keynote Speaker courtesy of ThreatAdvice

Frank Abagnale

1:30 pm - 1:45 pm
Break & Visit Vendors
1:45 pm - 2:30 pm
Pelham Mike Epplin Transforming Security Operations with Robotic Decision Automation

Mike Epplin

Mike Epplinwill discuss the new methods in Robotic Decision Automation in analyzing cyber threats.

Mountain Brook Eddie Doyle Hackers Coding Habits Cracked by DNA Sequencing

Eddie Doyle

Eddie Doyle
Hackers’ Coding Habits, Cracked via Malware DNA Sequencing
Machines will soon make ethical decisions!

In a survey across 200 countries, gathering over 40 million data points, we’ve learned that morality is not universal. Immortalized in the now famous Trolley Thought Experiment, humans are teaching machines to do the unthinkable… while piloting a driverless car, facing an unavoidable crash, a machine must decide who should live & who should die!
Machines must also make critical security decisions, impacting the real world. Using big data, algorithms can now identify hacker code, based on their work ethic, identified through sequencing the DNA of their Malware.
In the same way a driverless car will never leave my garage if false-positives weren’t eliminated, traffic flow within my network will grind to a halt if false-positives thrive, but moving from “detect-only” to “prevent-mode” requires a zero tolerance for false-positives!
Whether battling new threat concepts from script kiddies, cyber-crime syndicates or nation states, malware developers have a tendency to recycle old code to avoid spending thousands of hours writing new code. Traces of the previous malware are hidden within & machines can be taught to recognize this code.

Bessemer Jorge Alago Building Your Security Offensive Line

Jorge Alago

Building Your Security Offensive Line

Establishing a security foundation that will protect your business from the risk of cyber security threats is not a one-off task. To truly build the solid offense you need to defend your business, you must consistently revisit and re-examine your security practices to ensure that you’ve not only mitigated risk but that you are taking active steps to defend your network and protect your sensitive data. This presentation will outline the top considerations every business should address to improve their security stance, including how to:

  • Defend your network
  • Locate and protect sensitive data
  • Utilize data backup
  • Strengthen policy controls
  • Assure accurate and timely patching
  • Protect endpoints
  • Enable threat prevention through monitoring
Vestavia Mike Mettenheimer Oracle Security Suite Updates

Mike Mettenheimer

Mike travels around North American talking at Industry events and with customers about their security and privacy challenges and how they align with Oracle. This includes Data Security, Identity Management, Access Management and Directory Services.

Helena Moderated by: Angella Carlisle Panel Discussion: Successful Women in Cyber Security

Moderated by: Angella Carlisle

A robust discussion of some of the region’s women in the field of Cybersecurity. Panelists include Paige Boshell, Jackie Groark, Heather McCalley, and Lynn Murphree. This panel is moderated by Angella Carlisle, Alabama CyberNow Conference Chair 2019.

2:30 pm - 3:00 pm
Break & Visit Vendors
3:00 pm - 3:45 pm
Pelham Nathan McMinn IoT Security & Beyond

Nathan McMinn

Nathan McMinn  will give an entry level session IoT security. He’ll start with an overview of a few recent IoT related breaches and what made them possible. Then we’ll shift to a discussion of several popular IoT platforms and how they approach identifying and securing devices. He will discuss best practices around building and deploying IoT solutions, and end with the importance of data security beyond IoT.

Mountain Brook City of Trussville A Real Life Ransomware Incident
Bessemer Dan Fortune Legal Consequence of Poor Internet Policies

Dan Fortune

Daniel Fortune will present on the legal consequences for not having reasonably safe internet policies and procedures. All companies, but especially small companies and solo-practices, need a plan to comply with Data Breach & Notification laws for every state from which they may have a customer. 

Vestavia Jason Asbury Cyber Security Breach Trends

Jason Asbury

Jason Asbury will be speaking about Cyber Security breach trends, their impact, and how education, awareness, and governance greatly reduce risk exposure. 

Helena Robin Pugh Attracting & Retaining Women in Cyber Security

Robin Pugh

Robin Pugh will share on the importance of creating a diverse cybersecurity team and bringing more women into the field.

3:45 pm - 4:00 pm
Break & Visit Vendors
4:00 pm - 4:30 pm
Ballroom ACN Wrap Up and Door Prizes
4:30 pm - 6:00 pm
Networking Time