*all information is subject to change

April 11, 2018 1/2-Day Training 12-4:30
DJ Goldsworthy of Aflac Splunk - Attendees of this workshop will learn or advance their understanding of key elements of Splunk that should be considered when using Splunk for security, from both technology and operations perspectives. The instructor will cover topics spanning the full lifecycle of Splunk from data acquisition to alerting and automation. The goal of this workshop is to help attendees establish a sound and repeatable framework for their Splunk environment that will help ensure that it stays current and adaptive, and ready to handle new and evolving threats.

DJ Goldsworthy of Aflac

Bob Moore of Edgile, Inc. Office 365 - Office 365 is one of Microsoft’s fastest growing solutions and was quietly the “killer app” that drove identity and access management to the cloud with Azure Active Directory. Early on Microsoft identified Identity as the Control Plane – for cloud collaboration and now over 14m organizations are using Azure Active Directory. This session is intended for security professionals or administrators responsible for understanding and optimizing the security capabilities of the Microsoft platform.

Bob Moore of Edgile, Inc.

Josh More of Eyra Security Weaponize Your Job Search - Using Penetration Testing Techniques To Get An Edge Over The Extroverts

Josh More of Eyra Security

Dr. Alec Yasinac of University of South Alabama A team from the University of South Alabama has been promoting Technology Transition to Practice (TTP) for the NSF SATC program for the past several years. We culminate that project with a workshop designed to document advances and develop a message about future opportunities and directions for advancing TTP for NSF-funded cybersecurity projects. Participants of this NSF-sponsored workshop will be asked to: 1. Discuss or present results of their own TTP activities 2. Sit on panels to address Cybersecurity research TTP barriers and opportunities 3. Participate in small groups that will capture recommendations for future TTP efforts The results of the presentations and discussions will form the basis of a findings document that will be delivered to NSF.

Dr. Alec Yasinac of University of South Alabama

Alec Yasinsac

A team from the University of South Alabama has been promoting Technology Transition to Practice (TTP) for the NSF SATC program for the past several years. We culminate that project with a workshop designed to document advances and develop a message about future opportunities and directions for advancing TTP for NSF-funded cybersecurity projects.

Participants of this NSF-sponsored workshop will be asked to:

  1. Discuss or present results of their own TTP activities
  2. Sit on panels to address Cybersecurity research TTP barriers and opportunities
  3. Participate in small groups that will capture recommendations for future TTP efforts

The results of the presentations and discussions will form the basis of a findings document that will be delivered to NSF.

April 12, 2018 Conference Breakout Sessions
Panel Discussion: Blockchain Prepare: Blockchain Panel with Ken Craig of McLeod Software, Derek Waltchak of Shannon Waltchak, Jennifer Skjellum of ThreatAdvice

Panel Discussion: Blockchain

Lora McIntosh of Regions "Building a Risk-based Vulnerability Management Program"

Lora McIntosh of Regions

Gary Warner of UAB "Incident Response: The Perfect World vs. Reality"

Gary Warner of UAB

Paige Boshell of Bradley "Conducting a Privacy Assessment"

Paige Boshell of Bradley

Alan Jones & Steven Peterson of Layer 3 "Hacking for Points"
Jackie Groark of Veristor "Left & Right of Boom"

Jackie Groark of Veristor

Geoff Duncan of Honda Alabama "Security at Honda and the Wannacry Breach"

Geoff Duncan of Honda Alabama

Jeff Worford of KEYSYS "DevOps Automation"

Jeff Worford of KEYSYS

Eric Salveggio from MicroSystems Automation Group "Biomedical Security & Risk Assessment"

Eric Salveggio from MicroSystems Automation Group

Daniel Clemens of ShadowDragon "Using Your Skillz for Good: Fighting Human Trafficking with OSINT"

Daniel Clemens of ShadowDragon

Brian Contos of Veridon "Becoming A Security Hero: Killing Assumptions And Environmental Drift"

Brian Contos of Veridon

Justin Orcutt of NCC Group "Intelligently Hedging Cyber Risk"

Justin Orcutt of NCC Group

CISO Panel CISO panel moderated by Alan Jones: Tim Searcy, Jackie Groark, Ashley Ewing, and Chris Parton
Mitch Moosbrugger of CyberArk "The Privilege Connection: Cloud and DevOps Security"

Mitch Moosbrugger of CyberArk

Paul Fox of Twistlock "Why Cloud Native Requires a New Approach for Firewalls"

Paul Fox of Twistlock

Niya McCray of Bradley “Putting a Finger on a Problem: An Update on U.S. Biometric Privacy Law”

Niya McCray of Bradley

Nick VanGilder of Teklinks and Chad Smith of Cisco Social Engineering: True Stories from the Field
Toni de la Fuente of Alfresco Software "Cloud Hardening and Digital Forensics Readiness"

Toni de la Fuente of Alfresco Software

Kevin Fuller of ThinkGard "Ransomware--You Have it, Now What"

Kevin Fuller of ThinkGard

J.T. Malatesta of Maynard Cooper & Gale "The Role of Legal in InfoSec"

J.T. Malatesta of Maynard Cooper & Gale