Wisconsinâs Security Summit is a half-day conference for IT professionals and business executives to learn from technology industry experts about the current threat landscape, the latest risk mitigation strategies and current tools available to protect your organization. Come with your challenges and questions, and leave with actionable strategies and big picture perspective. REGISTER HERE
Generously Sponsored by:
Join us for lunch and network with your peers before the conference kicks off with our featured keynote at noon.
Jim Stickley has been breaking into corporations for over 20 years and in this session he will be sharing how criminals are gaining ground. From cyberattacks to social engineering, criminals are waging war against corporations, financial institutions and even government agencies. While everyone wants to think they are secure, the reality is that criminals are winning. In this session, Stickley will address some of the bigger issues organizations are facing today. By demonstrating techniques used by Stickley to infiltrate real corporations, attendees will get a chance to see firsthand how criminals are gaining access to their networks, avoiding detection and ultimately gathering the information necessary to commit fraud. Technical and non-technical attendees alike will benefit from the information and experiences shared during this session.
Famous last words:Â “It can’t happen to us.” Cyber attacks are on the rise in frequency and sophistication. Being proactive begins with an understanding that everyone is a target, and implementing appropriate safeguards and contingency plans. Our panel of experts will discuss key strategies you can implement to prevent, detect and respond to today’s cyber security threats.
Attendees are welcome to attend any breakout session in either track. Breakout sessions in the Business Track will be given with a business leader audience in mind; breakout sessions in the Technical Track will be given with more technical detail.
Check back for updates to the program as we confirm additional speakers and topics.
Your business has a 50% chance of being hit with a DDoS attack. If your organization is hit, it has an 80% chance of being hit more than once. DDoS attacks not only disrupt networks, but they also disrupt your business. In its ongoing work as a top tier DDoS protection service provider, Neustar will share its latest insights and research on how DDoS attacks threaten and impact business. In this session, decision makers will have an opportunity to learn about the:
Join Neustarâs Joe Loveless for this important session that can help you better shape strategies and actions against DDoS attacks.
Does your organization use software developed or customized in-house? If so, are you aware of the security risks and how they can be exploited by malicious attackers? Unlike your network infrastructure you canât rely on a security appliance for protection, and unlike commercial software you canât just apply the latest security patches. This session will discuss popular types of application attacks, the challenges that software developers face in securing code, and recommendations for improving the security health of your systems from the outset.
As a PCI Forensic Investigator, Sikich sees firsthand through our hundreds of investigations and assessments the common techniques attackers use to compromise computer networks and the security gaps that allow these breaches. This session will cover common breach scenarios and will provide some basic questions you should be asking to determine if your environment is vulnerable
Bad stuff happens. How your organization responds to a data breach, device loss or corporate account takeover will either minimize or compound the impact of the event. In this session, Jeff Olejnik will review components of an effective Incident Response Program (IRP) and facilitate an interactive group tabletop exercise to simulate the decision that needs to be made during a crisis.
DDoS attacks (Distributed Denial of Service) are a growing problem in frequency, sophistication and size. In this breakout session we will talk about the history of the problem, itâs current effects and some mitigation steps you can take to protect your online business. Youâll also hear more about the anatomy of common attacks, how the landscape has changed, and why these attacks can be challenging to mitigate. Learn from an industry expert who will share proactive steps you can take to be prepared to react to attacks on your own infrastructure, your clients and your business.
Like many organizations you may be managing a multi-faceted infrastructure leveraging virtual, private and public cloud environments. Given the complexity of these dynamic environments, you can be faced with limited visibility across platforms, performance lag, difficulty proving compliance and gaps within your security strategy. In this session we will discuss a comprehensive security model specific for VMWare environments that includes: vSphere, Horizon, vCloud and NSX, and you will learn how to:
Join Kevin Dohrmann for an analysis about the current state of identity authentication in our online lives. With all the publicity that security breaches are getting, and the difficulty in keeping personal and corporate data secure, Dohrmann will discuss best practices along with where and how security and biometric technology might change in a few years. Our business and private lives are inundated with secure websites, email access, financial and healthcare apps, all requiring passwords that are continuously changing in complexity. Dohrmann will offer opinions and predictions of where this particular sector of identity management and authentication is headed.
Conducting a periodic information security risk assessment should be a vital part of your organization's information security program. But, why? And, what exactly is an information security risk assessment? And, what's the difference between a review, an assessment and an audit? In this talk, we'll look at the many different ways to assess risk and understand your organization's information security posture.
Some estimates place the theft of Intellectual Property (IP) secrets from U.S. businesses at up to $400 billion this year. Much of this can be traced to the outsider threat of hackers gaining persistence onto corporate computer networks and exfiltrating sensitive data and insiders abusing an employerâs trust by taking trade secrets with them when they quit or are involuntarily terminated. Special Agent Franz will suggest some possible steps business can consider to mitigate these threats.
IN PARTNERSHIP WITH