Focus on Security - October 6, 2017
Bucks County Community College
Zlock Performing Arts Center, Newtown Campus
FREE PUBLIC EVENT
Bucks County Community College held a successful one-day event focused on how you can most effectively implement end-to-end security within your business or organization. Participants received the most up-to-date information from subject matter experts, and learned directly from keynote speaker, Randall Cole, Vice President of Information Technology for Vertical Screen. Randall's current certifications include Microsoft Certified Systems Engineer (MCSE), Certified Project Management Professional (PMP), ITIL, Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker(CEH).
There were multiple 50-minute presentations on current topics regarding information security. Participants learned how to stay abreast of the most current threats, as well as how to defend against them.
Agenda:
Keynote: 8:30 AM
Randall C Cole - Securing the Enterprise from the inside out.
The purpose of this lecture is to give people a understanding of how the enterprise security has shifted over the last 5 years from Perimeter Defense Model to a Defense In Depth Model.
Breakout Sessions 9:30 – 10:20
Classroom 1: Mike Shellenberger - Candoris Technologies, Enterprise Cloud & Microsoft Solutions.
Intrusion Detection - Leveraging Microsoft Advanced Threat Analytics.
Classroom 2: Chris Mangano - Mercadien Technologies, Technology Architects & Advisors.
Establishing Resiliency in Today’s Cyber-Ecosystem
Classroom 3: Darren Carroll – SHI Innovative Solutions, Global provider of Information Technology Products and Services
Security Threat Landscape. Darren will discuss the current security threat landscape and how it’s continually changing.
Classroom 4: Jeff Dyer – Dell Computers & Bill Swartz – Cylance Software.
The Future of CyberSecurity at the Endpoint – Artificial Intelligence & Encryption. This session will explore new ways to address threats as well as protecting your data with Policy-Based Enterprise Encryption.
Breakout Sessions 10:30 – 11:20
Classroom 1: John Sayer – Ask Technologies.
Wireless Security Beyond the Deployment. This presentation covers the concenrs of just setting-and-forgetting.
Classroom 2: Special Agent - FBI Philadelphia Division
Current Cyber Threat Landscape and How the FBI is combating Cyber Crime
Classroom 3: George Frasier - Director of Information Systems Lower Merion School District Adjucnt Instructor.
Introduction to Incident Response. It is not a question of if, but a question of when enterprise defenders will experience a compromise. This session will introduce participants to computer security incident response based on the PICERL model: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned.
Classroom 4: Joe Walsh – DeSales University
Mobile Forensics. This presentation will explore the evolution of mobile devices and the valuable information that they can generate and store. We will review options for preserving and analyzing data from mobile devices as well as some of the challenges of examining mobile devices.
Breakout Sessions 11:30 – 12:20
Classroom 1: Chris Stafford – Stafford Consulting, Adjunct Instructor
Internet Security In an Unsafe World
This session will focus on internet security including e-mail, internet browsing and social engineering.
Classroom 2: Dan Lezoche - Bucks County Intermediate Unit
Windows 10 Desktop Security Standards. This session will focus on the built-in security mechanisms in your Windows 10 environment. Specific focus will be on the various options available and deployment strategies.
Classroom 3: Jill Sitnic - Microsoft
In this session, learn about the latest security, privacy, and compliance features of Microsoft Azure. You’ll learn about the trusted cloud, and how your data is stored and accessed. This will be an overview of Microsoft’s comprehensive approach to securing your environment as you expand your data center and services to the cloud.
Classroom 4: Pam King – Chestnut Hill College, Instructor for Digital Forensics Program
Case studies involving major crimes where investigation used digital evidence in solving cases and prosecuting offenders.
Lunch 12:30 – 1:20
Breakout Sessions 1:30 – 2:20
Classroom 1: Joe Walsh – DeSales University
The top 10 things you can do to strengthen security in your organization. The number of cybersecurity incidents continues to grow rapidly. Organizations often struggle with decisions about where to focus their security resources. This presentation will review ten of the most critical areas that organizations can focus on in order to improve security and prevent incidents.
Classroom 2: Benjamin Gilbert - Office of Cybersecurity and Communications, U.S. Department of Homeland Security
Strengthening Your Organization’s Operational Resilience. This session will provide an overview on the Department of Homeland Security’s Cybersecurity Advisor (CSA Program), operational resilience- what it means and how to practically apply concepts within an organization’s operations, and conclude with an overview of no-cost DHS cybersecurity services available to critical infrastructure organizations and state and local governments with an aim to help strengthen cybersecurity capabilities.
Classroom 3: Mike McCafferty - Cisco
Changing the Equation: Effective Security. What are the right questions to ask? What needs to be protected? How do I manage security throughout the network? This presentation looks at the top issues facing network defenders and suggests a holistic approach for truly effective security.
Classroom 4: Rhonda Okamoto – Legal Shield
What you need to know about the Equifax Data Breach and how to protect yourself. As a citizen your personal information can be used in many different ways to harm you both directly and indirectly, so the more you know , the safer you can be.TBD
Breakout Sessions 2:30 – 3:20
Classroom 1: Ken Pyle - DFDR Consulting LLC, Digital Forensics, eDiscovery, Cyber Security.
WannaCry/Petya/NotPetya: Ransomware and next generation malware threats. Technical vulnerabilities, attack methods and social engineering aspects have advanced beyond simple attacks such file packaging and drive by downloads. A detailed analysis of how next generation threats are adapting to changes in the enterprise, technical controls and malware analysis will be presented.
Classroom 2: Mathew Frederickson - CIO Council Rock Shool District, Adjunct Instructor
Windows Log Analysis. With the latest versions of Windows, there are literally thousands of events being generated. From a security standpoint, which events are important? Which events should we monitor, and how can we monitor them? This presentation will review the important log events, and briefly discuss Greylog, a free system that can be used to capture and report these events.