PRESENTED BY:

     

Cybersecurity Strategies for IT and Business Leaders
Milwaukee | OctOBER 21, 2015 | The Wisconsin Center


As headline grabbing data breaches demonstrate, cybersecurity is the most impactful technology issue facing business today.

Wisconsin’s Security Summit is a half-day conference for IT professionals and business executives to learn from technology industry experts about the current threat landscape, the latest risk mitigation strategies and current tools available to protect your organization. Come with your challenges and questions, and leave with actionable strategies and big picture perspective. REGISTER HERE

Generously Sponsored by:

LUNCHEON:

Join us for lunch and network with your peers before the conference kicks off with our featured keynote at noon.

KEYNOTE

"Fraud" The new F-Word
Jim Stickley, stickleyonsecurity.com, CEO

Jim Stickley has been breaking into corporations for over 20 years and in this session he will be sharing how criminals are gaining ground. From cyberattacks to social engineering, criminals are waging war against corporations, financial institutions and even government agencies. While everyone wants to think they are secure, the reality is that criminals are winning. In this session, Stickley will address some of the bigger issues organizations are facing today. By demonstrating techniques used by Stickley to infiltrate real corporations, attendees will get a chance to see firsthand how criminals are gaining access to their networks, avoiding detection and ultimately gathering the information necessary to commit fraud. Technical and non-technical attendees alike will benefit from the information and experiences shared during this session.

lepidophytic

PANEL

Data Breach: Never Say Never

Famous last words:  “It can’t happen to us.” Cyber attacks are on the rise in frequency and sophistication. Being proactive begins with an understanding that everyone is a target, and implementing appropriate safeguards and contingency plans. Our panel of experts will discuss key strategies you can implement to prevent, detect and respond to today’s cyber security threats.

4384992867

BREAKOUTS:

Attendees are welcome to attend any breakout session in either track. Breakout sessions in the Business Track will be given with a business leader audience in mind; breakout sessions in the Technical Track will be given with more technical detail.
Check back for updates to the program as we confirm additional speakers and topics.

 

Breakouts | Business Track


DDoS: Impacts Across the Organization
Joe Loveless, 510-593-7240, Product Marketing, Security Services

Your business has a 50% chance of being hit with a DDoS attack. If your organization is hit, it has an 80% chance of being hit more than once. DDoS attacks not only disrupt networks, but they also disrupt your business. In its ongoing work as a top tier DDoS protection service provider, Neustar will share its latest insights and research on how DDoS attacks threaten and impact business. In this session, decision makers will have an opportunity to learn about the:

  • Extent to which organizations must deal with DDoS
  • How attacks and attack types have impacted businesses
  • Planning considerations that promote healthy defense

Join Neustar’s Joe Loveless for this important session that can help you better shape strategies and actions against DDoS attacks.

Your Applications Make Great Attack Targets
Brice Williams, SysLogic, Inc., Practice Lead, Information Security

Does your organization use software developed or customized in-house? If so, are you aware of the security risks and how they can be exploited by malicious attackers? Unlike your network infrastructure you can’t rely on a security appliance for protection, and unlike commercial software you can’t just apply the latest security patches. This session will discuss popular types of application attacks, the challenges that software developers face in securing code, and recommendations for improving the security health of your systems from the outset.

970-774-0782

How Good is Your Security Posture? 7 Questions to Ask Your IT Staff
(818) 434-7485, Sikich, Manager

As a PCI Forensic Investigator, Sikich sees firsthand through our hundreds of investigations and assessments the common techniques attackers use to compromise computer networks and the security gaps that allow these breaches. This session will cover common breach scenarios and will provide some basic questions you should be asking to determine if your environment is vulnerable

867-292-7642

You’ve Been Hacked – An Exercise in Incident Response
Jeff Olejnik, Wipfli, Director, Risk Advisory Services

Bad stuff happens. How your organization responds to a data breach, device loss or corporate account takeover will either minimize or compound the impact of the event. In this session, Jeff Olejnik will review components of an effective Incident Response Program (IRP) and facilitate an interactive group tabletop exercise to simulate the decision that needs to be made during a crisis.

Attendees will…

  • Have a better understanding of the roles, procedures and knowledge that need to be in place to efficiently execute an IRP
  • Go through the complete incident response life cycle
  • Execute various aspects of an IRP in response to an incident.
  • Gain a better understanding of where their IRP is strong and where it needs work.
  • Have the opportunity to compare and discuss tenets of their IRPs with their peers.

(706) 355-6093


Breakouts | Technical Track

DDoS - What It Is and Why Nobody Wants to Talk About It
David McKenney, Cosentry, Director, Product Engineering

DDoS attacks (Distributed Denial of Service) are a growing problem in frequency, sophistication and size. In this breakout session we will talk about the history of the problem, it’s current effects and some mitigation steps you can take to protect your online business. You’ll also hear more about the anatomy of common attacks, how the landscape has changed, and why these attacks can be challenging to mitigate. Learn from an industry expert who will share proactive steps you can take to be prepared to react to attacks on your own infrastructure, your clients and your business.

Register

 

Examining Your Security Posture in the Software Defined Data Center
Eric Shulze, Trend Micro, Senior Sales Engineer

Like many organizations you may be managing a multi-faceted infrastructure leveraging virtual, private and public cloud environments. Given the complexity of these dynamic environments, you can be faced with limited visibility across platforms, performance lag, difficulty proving compliance and gaps within your security strategy. In this session we will discuss a comprehensive security model specific for VMWare environments that includes: vSphere, Horizon, vCloud and NSX, and you will learn how to:

  • Enable automated security across multiple environments
  • Correlate IT and security incidents and respond accordingly
  • Ease security deployment and management for lower cost of ownership

Register

 

The Future of Authentication
(907) 787-5589, Cosentry, Chief Technology Officer

Join Kevin Dohrmann for an analysis about the current state of identity authentication in our online lives. With all the publicity that security breaches are getting, and the difficulty in keeping personal and corporate data secure, Dohrmann will discuss best practices along with where and how security and biometric technology might change in a few years. Our business and private lives are inundated with secure websites, email access, financial and healthcare apps, all requiring passwords that are continuously changing in complexity. Dohrmann will offer opinions and predictions of where this particular sector of identity management and authentication is headed.

6318429290

 

Good Guys Playing Bad Guy: Using Security Assessments to Identify Vulnerabilities

Conducting a periodic information security risk assessment should be a vital part of your organization's information security program. But, why? And, what exactly is an information security risk assessment? And, what's the difference between a review, an assessment and an audit? In this talk, we'll look at the many different ways to assess risk and understand your organization's information security posture.

Register

CLOSING KEYNOTE

Outsiders and Insiders: Mitigating Risks to Your Business Secrets
Byron Franz, Federal Bureau of Investigation, Special Agent, Milwaukee Division

Some estimates place the theft of Intellectual Property (IP) secrets from U.S. businesses at up to $400 billion this year. Much of this can be traced to the outsider threat of hackers gaining persistence onto corporate computer networks and exfiltrating sensitive data and insiders abusing an employer’s trust by taking trade secrets with them when they quit or are involuntarily terminated. Special Agent Franz will suggest some possible steps business can consider to mitigate these threats.

7042449577

IN PARTNERSHIP WITH