Alabama Cyber Now 1/2 - Day Training

April 11, 2018 - 12:30 PM to 4:30 PM
Wyndsor II DJ Goldsworthy Splunk - Attendees of this workshop will learn or advance their understanding of key elements of Splunk that should be considered when using Splunk for security, from both technology and operations perspectives. The instructor will cover topics spanning the full lifecycle of Splunk from data acquisition to alerting and automation. The goal of this workshop is to help attendees establish a sound and repeatable framework for their Splunk environment that will help ensure that it stays current and adaptive, and ready to handle new and evolving threats.

DJ Goldsworthy

Yorkshire Bob Moore Office 365 - Office 365 is one of Microsoft’s fastest growing solutions and was quietly the “killer app” that drove identity and access management to the cloud with Azure Active Directory. Early on Microsoft identified Identity as the Control Plane – for cloud collaboration and now over 14m organizations are using Azure Active Directory. This session is intended for security professionals or administrators responsible for understanding and optimizing the security capabilities of the Microsoft platform.

Bob Moore

Wyndsor I Josh Moore Weaponize Your Job Search - Using Penetration Testing Techniques To Get An Edge Over The Extroverts

Josh Moore

Ivory Dr. Alec Yasinac and Dr. MIchael Chambers * Technology Tranfer to Practice (TTP) for NSF-Funded Cybersecurity Projects Workshop. This NSF-funded workshop covers both commercial and non-profit target market offerings and includes a full range of experts in critical aspects of Technology Transfer to Practice (TTP) including senior academicians, entrepreneurs, financial and business experts, funding agency representatives, and legal practitioners. Our focus is on promoting and facilitating TTP and this workshop will encourage cybersecurity TTP for PIs with promising NSF-funded projects. Opportunities will include familiarization, education, mentoring, a best practices repository, and case studies.

Alabama Cyber Now Kick Off Reception

April 11, 2018 - 5:00 PM to 7:00 PM
Winston Sponsored By Kassouf & Co. Kick-Off Reception

Sponsored By Kassouf & Co.

Alabama Cyber Now Conference Morning Keynote Session

April 12, 2018 - 8:00 AM to 9:00 AM
Doors Open, Check-In and Breakfast Check-In is on the First Floor Lobby, Breakfast in the Wynfrey Ballroom
April 12, 2018 - 9:00 AM to 9:45 AM
Wynfrey Ballroom Sadik Al-Abdulla of CDW Morning Keynote Session

Sadik Al-Abdulla of CDW

ACN - Breakout Session A

April 12, 2018 10:00 AM to 10:45
Ivory Dr. Alec Yasinac and Michael Chambers of University of South Alabama TTP for NSF-Funded Cybersecurity Projects Workshop - Continued from April 11, 2018
Riverchase I Blockchain Panel Moderated by: Rob Ferrill of UAB Health System Panelists: Jennifer Skjellum of ThreatAdvice, Derek Waltchak of Shannon Waltchak, and Bill Deason
Riverchase II Alan Jones & Steven Peterson of Layer 3 Communications Hacking for Points: Lessons Learned from Competing in the Derbycon CTF
Wyndsor I Gary Warner of the University of Alabama in Birmingham Incident Response: The Perfect World vs. Reality

Gary Warner of the University of Alabama in Birmingham

Wyndsor II Brian Contos of Verodin Becoming A Security Hero: Killing Assumptions And Environmental Drift

Brian Contos of Verodin

Yorkshire Mitch Moosbrugger of Cyberark The Privilege Connection: Cloud and DevOps Security

Mitch Moosbrugger of Cyberark

ACN Breakout Session B

April 11, 2018 - 11:00 AM to 11:45 AM
Ivory Dr. Alec Yasinac and Michael Chambers of University of South Alabama TTP for NSF-Funded Cybersecurity Projects Workshop - Continued from April 11, 2018
Riverchase I Jackie Groark of Veristor Left & Right of Boom: Preparation and Response for the Dynamic Cybersecurity Threat

Jackie Groark of Veristor

Riverchase II Daniel Clemens of ShadowDragon Disrupting Human Trafficking Networks using Social Media & Online Monitoring Tools

Daniel Clemens of ShadowDragon

Wyndsor I Eric Salveggio of MicroSystems Automation Group Biomedical Security & Risk Assessment
Wyndsor II Lora McIntosh of Regions You Can’t Boil the Ocean: Building a Risk Based Vulnerability Management Program

Lora McIntosh of Regions

Yorkshire Jeff Worford of Keysys Devops Automation: Application Deployment Pipelines to the Cloud

Jeff Worford of Keysys

Alabama Cyber Now Conference Lunch and Keynote

April 12, 2018 - 12:00 PM to 1:15 PM
Wynfrey Ballroom Tina Meeker, Beacon Information Security, LLC Are We Hiring Too Many Doppelgängers? How the diversity gap hurts your security program and the cybersecurity field as a whole.

Tina Meeker, Beacon Information Security, LLC

Tina Meeker is a Cyber Security, Privacy and Compliance Executive with over 15 years’ experience spanning multiple industries including retail, banking, technology, medical, and fintech start-ups.

Throughout her career, Tina has championed efforts to educate, recruit and build diverse talent into Information Security and Privacy programs, resulting in greater program efficacies and stronger teams.

Tina holds an M.B.A. from Augsburg University – Minneapolis, MN, a B.A. in Organizational Behavior from the College of St. Scholastica- Duluth, MN and maintains active CISSP and CIPP/US certifications.

 

ACN Breakout Session C

April 12, 2018 - 1:30 PM to 2:15 PM
Ivory Dr. Alec Yasinac and Michael Chambers of University of South Alabama TTP for NSF-Funded Cybersecurity Projects Workshop - Continued from April 11, 2018
Riverchase I Geoff Duncan of Honda Alabama Security at Honda and the Wannacry Breach

Geoff Duncan of Honda Alabama

Riverchase II CISO panel moderated by Alan Jones Jackie Groark of Veristor, Chris Parton of Blue cross and Blue Shield of Alabama, Tim Searcy of Protective Life and Ashley Ewing of University of Alabama
Wyndsor I Understanding What You Get: Cyber Insurance

Wyndsor II Paul Fox of Twistlock Why Cloud Native Requires a New Approach for Firewalls

Paul Fox of Twistlock

Yorkshire Paige Boshell of Privacy Counsel, LLC Conducting a Privacy Assessment

Paige Boshell of Privacy Counsel, LLC

ACN Breakout Session D

April 12, 2018 - 2:30 PM to 3:15 PM
Ivory Dr. Alec Yasinac and Michael Chambers of University of South Alabama TTP for NSF-Funded Cybersecurity Projects Workshop - Continued from April 11, 2018
Riverchse I Nick VanGilder of TekLinks and Chad Smith of Cisco Social Engineering: True Stories from the Field
Riverchase II Niya McCray of Bradley Putting a Finger on a Problem: An Update on U.S. Biometric Privacy Law

Niya McCray of Bradley

Wyndsor I Toni de la Fuente of Alfresco Software Cloud Hardening and Digital Forensics Readiness

Toni de la Fuente of Alfresco Software

Wyndsor II J.T. Malatesta of Maynard Cooper Gale The Role of Legal in Information Security
Yorkshire Kevin Fuller of ThinkGard Ransomware--You Have it, Now What?

Kevin Fuller of ThinkGard

Birds of Feather Session

April 12, 2018 - 3:30 PM to 4:30 PM - Facilitated by Dr. Joe Popinski
Thomas Torgerson Cloud Security
Paige Boshell Incident Response Capabilities/Readiness
Arsh Arora Ransomware
Russ Dorsey Risk Management
Brad Knopps Security Automation
Alanson Hoffman Security Frameworks
David Thrasher Security Team and Career Skills
Lora McIntosh SIEM/Log Management
Peter Zanetti Tools with the Most Impact
Ronnie Tucker Vendor Risk

Alabama Cyber Now Conference Closing Session

April 12, 2018 - 4:30 PM to 5:00 PM
ACN Committee Closing remarks