More details and speaker information in event program handout
0700 – 0800 Registration
0800 – 0815 Opening remarks - Mayor Bill Ketron & Commissioner Jeff Long
0815 – 0915 Daniel Elliot – Building Cybersecurity into Our Cross-Functional Operational Culture. Daniel will examine how organizations manage the risks associated with separate functions (not just IT); Integrating and deploying new technologies to meet objectives and become more efficient; How we modify our pre-onboarding, on-boarding and off-boarding processes to enhance security of the organization; What types of training are we including prior to giving access; Who is receiving that training and how is it delivered; Best-practices in developing cyber awareness campaigns on a tight budget; What resources can under-resourced organizations leverage to improve their cyber resilience and enhance their employee training programs.
0915 – 0930 Vendor and Network Break
0930 – 1030 Paul Mazzuco - The double-edged sword of artificial intelligence: Aiding the efforts of hackers and protectors alike. Paul will discuss the world of the Darknet and how bad actors are using machine learning and AI to create better attack vectors, and how IT professionals are also using these tools to defend their vital infrastructure. Powered by behavioral modeling, these technologies are the next frontiers in attack mitigation.
1030 – 1130Andy Rivers & Steve Swan - Real World Application Security Testing. Andy & Steve will discuss creating an effective, repeatable security application testing program and share lessons learned and tips from establishing the State of Tennessee's program. Throughout the presentation, they will provide demos and use cases utilizing the low-cost and extremely powerful application testing tool - Burp Suite.
1130 – 1230 Lunch
12:30 – 1:30Jayson E. Street - TBD - currently out of the country doing what he does best!
1:30 – 2:30Mark Burnett, Derek Rush, & Bill Dean -"Anatomy of a Hack". Panel discussion from the different organizational points of view - technician to CEO - on legal obligations, resource allocation, response and recovery, and post incident considerations.
2:30 – 2:45 Vendor and Network Break
2:45 – 3:45Live Hack Demonstration - Dynetics. This demonstration will show what it looks like from both the victim and attacker screens during an attack.
3:45 – 4:45Steve Mallard – "200:1 and Siloed". The average end user/computer to help-desk technician has shockingly grown to over 500:1. Many IT personnel have even reported a ratio of 1000:1. With IT personnel being siloed in their jobs, this directly impacts cybersecurity at an organization. Steve will discuss how silos create an environment of individual and disparate systems - while conducting live demos of a MiTM attack and VoIP attack to illustrate how these attacks are overlooked when staff are siloed and not well rounded in security. Break the Silos!
4:45 – 5:00 Closing remarks, door prizes, and instruction for CtF (16th)
October 16th Capture the Flag - same registration and start time.