agendas - information security summit · 2019-08-26 · aligning app sec with digital...

6
Agendas: * Monday: Professional Training / OCITA / CSO Xchange * Tuesday: Professional Training / Career Connection / NOCHE / EnergyTech * Wednesday: 17th Annual ISS Day - 1 / EnergyTech * Thursday: 17th Annual ISS Day - 2 / EnergyTech * Friday: 17th Annual ISS Day - 3 / EnergyTech

Upload: others

Post on 28-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Agendas - Information Security Summit · 2019-08-26 · Aligning App Sec With Digital Transformation. O365 Hijacking and Best Practices to Protect Yourself; LUNCH ... ENERGYTECH PRESENTATION

Agendas:

* Monday: Professional Training / OCITA / CSO Xchange* Tuesday: Professional Training / Career Connection / NOCHE / EnergyTech* Wednesday: 17th Annual ISS Day-1 / EnergyTech * Thursday: 17th Annual ISS Day-2 / EnergyTech* Friday: 17th Annual ISS Day-3 / EnergyTech

Page 2: Agendas - Information Security Summit · 2019-08-26 · Aligning App Sec With Digital Transformation. O365 Hijacking and Best Practices to Protect Yourself; LUNCH ... ENERGYTECH PRESENTATION

7:30 8:30 8:45 9:00 9:30 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00 3:30 4:00 4:30 5:00 - 7:00 PM

1

2

3

Café'

5

8

LUNCH - Concourse

11

12

18

19

20

26

Grand Ball-room

Brian Kelley Jeremy Mio, Information Security Officer

Ohio Turnpike Cuyahoga County

Technology Break / Visit with our SPONSORS.

17

SPONSOR ROOM - RED SEAL

Danilo Casino - Technology Strategist

ISS PLANNING GROUP / VOLUNTEER ROOM

ENERGYTECH PLANNING GROUP ROOM

CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi

SPONSOR ROOM - IBM

✘ceptional Networking.

SPONSOR ROOM - LOGICALIS

Oracle Database Security Master Class

Daniel MorganDBSecWorx

OCITA - KEYNOTE ADDRESS

Ervan Rodgers, II

CIO - State of Ohio

LUNCH - Concourse

Break with our SPONSORS.

LUNCH - Concourse

LUNCH - ConcourseIntroduction to Malware Analysis

SPONSOR ROOM - TENABLE

21

Jerod BrennenBrennen Consulting

DOORS OPEN Registration /

Continental Breakfast - Sponsor Exhibit Area

RESERVED FOR ENERGYTECH

OCITA Program

24

OCITA Program

Tom Fisher, Enterprise GIS Applications Admin.

The SUMMIT 2019 Gold Sponsors:

RESERVED FOR ENERGYTECH

Professional ✘clerator Training Day

AM PMRoom #

Monday, October 21

16

The I-X Center - Cleveland

SPONSOR ROOM - OKTA

SPONSOR ROOM - CHECK POINT SOFTWARE TECHNOLOGIES

10

Steve Hunt

Microsoft Technology State & Local Govt

Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & Logicalis

ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing

CSO ✘change Fall Meeting CSO ✘change Fall Meeting

HBI Principal, Director, ISSA Distinguiished Fellow

Correction From Collaboration

Tyler HudakTrustedSec

Introduction to Malware Analysis

Tyler HudakTrustedSec

Open Source Intelligence (OSINT) Gathering Essential Training

Jerod BrennenBrennen Consulting

Oracle Database Security Master Class

Daniel MorganDBSecWorx

Open Source Intelligence (OSINT) Gathering Essential Training

OCITA Program OCITA Program

Cuyahoga County

SPONSOR ROOM - HURRICANE LABS

SOCC - Gov't Services Beverlyn Johns,

Business Transformation

Pgm. Mgr. / DAS

Surprising Secrets of the Most Cyber Resilient Orgs

Page 3: Agendas - Information Security Summit · 2019-08-26 · Aligning App Sec With Digital Transformation. O365 Hijacking and Best Practices to Protect Yourself; LUNCH ... ENERGYTECH PRESENTATION

7:30 8:30 8:45 9:00 9:30 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00 3:30 4:00 4:30 5:00 - 7:00 PM

1

2

3

Café'

4

5

8

11

12

Employers:

ODHE: New Incumbent Worker Training Initiatives

Cheri RiceODHE

Main Hallway

18

19

20

Employers:

Ohio Department of Higher Education

(ODHE)

Cheri Rice / ODHE

26

Grand B'room

CAPTURE THE FLAG!

10ENERGYTECH ENERGYTECH ENERGYTECH ENERGYTECH

PRESENTER NAME PRESENTER NAME

The SUMMIT 2019 Gold Sponsors:

CAREER CONNECTIONTuesday, October 22 - SPONSORED BY CUYAHOGA COMMUNITY COLLEGE

The I-X Center - ClevelandCorrection From Collaboration

Room #AM PM

DOORS OPEN Registration /

Continental Breakfast - Sponsor Exhibit Area

RESERVED FOR ENERGYTECH

ISS PLANNING GROUP / VOLUNTEER ROOM

ENERGYTECH PLANNING GROUP ROOM

CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi

✘ceptional Networking.

ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing

CAPTURE THE FLAG

Brought to you by: Baldwin Wallace University

LUNCH - Concourse

ENERGYTECH ENERGYTECH

PRESENTER NAME PRESENTER NAME PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY

21

Passport to IT Careers for High School Students

17

SPONSOR ROOM - RED SEAL

SPONSOR ROOM - HURRICAN LABS

SPONSOR ROOM - IBM

Innovations and Alignment in Cybersecurity Education

Presented by NOCHE and NEOCC

Regional IT Educators Consortium Inaugural Meeting

Presented by RITE

Meet the Professionals Speed Networking

Organized by RITE

Supported by NOCHE

Oracle Database Security Master Class

Daniel MorganDBSecWorx

Oracle Database Security Master Class

Daniel MorganDBSecWorx

High School Sudents: NEO Passport Employer Showcase - Organized by RITECollege/University Students: Linking IT Talent to Opportunity Internship and Job Fair. Presented by Business Growth and Development

Services at GCP and NOCHE

24

PRESENTER NAME PRESENTER NAME

Introducton to Malware Analysis

Tyler HudakTrustedSec

Introduction to Malware Analysis

Tyler HudakTrustedSec

PRESENTER COMPANY PRESENTER COMPANY

RESERVED FOR ENERGYTECH

LUNCH - Concourse

C/U Faculty & Staff ONLY: College / University Students: College / University Students: College / University Students:

22ENERGYTECH ENERGYTECH

Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & Logicalis

RESERVED FOR ENERGYTECH

SPONSOR ROOM - LOGICALIS

PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY

PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY

PRESENTER NAME PRESENTER NAME

ENERGYTECH ENERGYTECH

PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY

PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY

Aligning Opportunities Report and Discussion

How to Get Future Ready

Presented by TeamNEO Presented by RITE HR IT Roundtable

ENERGYTECH ENERGYTECH

PRESENTER NAME PRESENTER NAME

SPONSOR ROOM - OKTA

SPONSOR ROOM - TENABLE

ENERGYTECH ENERGYTECH

Rev Up Your Technology IQ!

Presented by RITE and CIO Forum

College / University Students:LUNCH -

Concourse

High School Students:

Presented by RITE

LUNCH - Concourse

College/University Faculty & Staff + Employers: C/U Faculty & Staff ONLY:

COLLEGE / University Students + Employers:

Linking Talent to Opportunity in IT Internship and Entry-Level Job Fair

Presented by Business Growth and Development Services at GCP and NOCHE

PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY

ENERGYTECH ENERGYTECH

PRESENTER NAME PRESENTER NAME

ENERGYTECH ENERGYTECH

PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY

13-14

7

15-16

Rev Up Your Technology IQ!

Presented by CIO Forum and RITE

HS / College / University Faculty: HighSchool Faculty Only:

High School Students:

Passport to IT Careers for High School Students

Presented by RITE

College / University Students:

ENERGYTECH ENERGYTECH

PRESENTER NAME PRESENTER NAME

Incorporating CoolTech Challenge into Your Classroom

Presented by RITE

SPONSOR ROOM - CHECK POINT SOFTWARE TECHNOLOGIES

ENERGYTECH ENERGYTECH

Brought to you by: Baldwin Wallace University

9ENERGYTECH ENERGYTECH

Page 4: Agendas - Information Security Summit · 2019-08-26 · Aligning App Sec With Digital Transformation. O365 Hijacking and Best Practices to Protect Yourself; LUNCH ... ENERGYTECH PRESENTATION

7:00 8:00 8:30 9:00 9:30 9:45 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00 3:30 4:00 4:30 5:00 - 7:00 PM

1

2

3

Café'

4

5

6

8

11

12

18

19

20

26

Grand B'room

EnergtTech Opening Remarks

M. Jenning-Bates / PAL-V

ISS / EnergyTech Announcements,

Partner Message and Keynote Introduction

SPONSOR ROOM - HURRICANE LABS

Bob Kalka

IBM

Capturing the Bayrob Group!Ulmer Panel Discussion

The California Consumer Privacy Act: Implementing Sustainable Compliance

Solutions

Ryan Macfarlane / Duncan Brown

BREAK Visit the Café

PRESENTER NAME Steven G. Stransky

Technology Concepts & Design, Inc. (TCDI)FBI - Supervisory Special Agent / US

Assistant Attorney Ulmer Berne, LLP Thompson Hine LLP

Tyler Hudak, Steve Stransky, Josh Kelley, Paul Sems, Ned Sherry

Pam Gerber, Todd Riley, Billy Heiser, Rockie Brockway, Stephen Marchewitz

Alex Hammerstone, Bob Salandre, Steve Stransky, Rockie Brockway

PRESENTER COMPANY PRESENTER COMPANYPRESENTER NAME

Correction From Collaboration

Room #AM PM

DOORS OPEN Registration /

Continental Breakfast - Sponsor Exhibit Area

RESERVED FOR ENERGYTECH

ISS PLANNING GROUP / VOLUNTEER ROOM

ENERGYTECH PLANNING GROUP ROOM

CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi

MANUFACTURING Tra✘ - TrustedSec

KEYNOTE ADDRESS: Dr HH Schmitt

SPONSOR ROOM - READ SEAL

SPEAKER READY ROOM

SPONSOR ROOM - CHECK POINT SOFTWARE TECHNOLOGIES

9

KEYNOTE ADDRESS: Joe Weiss

KEYNOTE: Top Cybersecurity Issues when Migrating to the Cloud

RESERVED FOR ENERGYTECH

Break with our SPONSORS.

KEYNOTE ADDRESS

Joe Weiss

Break with our SPONSORS.

Larry Cox Joshua Skeens Steve Bryant Tom Hardin

SonicWall GATE, LLC. Franciscan Alliance

Loren W. Wagner

Symantec CentraComm CentraComm

SPONSOR ROOM - OKTA

SPONSOR ROOM - TENABLE

Break with our SPONSORS.

Announcements, Partner Message and Keynote Introduction

10Super Charge Your Cybersecurity Career Cyber Defense….Try Offense Top 5 Quick Wins in Cybersecurity Essentials Next-Gen SOC - A Case Study at Palo Alto

Steven Hunt Tony Pietrocola Chad Voller / Bryan Smith Kevin FlanaganHuntBI Agile1 BMF Cyber Technology Group Palo Alto Networks

BREAK Visit the Café

Aligning App Sec With Digital TransformationO365 Hijacking and Best Practices to Protect

Yourself

LUNCH - Concourse

The Impossibility of Security IAM SystemsCyber Incident Response- Addressing the

Concerns of the Business

13-14

Security Built On 1 Simple Premise – Trust No One

Business Cyber Survival: Are You at Risk?

LUNCH - Concourse

Business Cyber Survival: Are You at Risk?

Drew Vanover Loren W. Wagner

David Kennedy

Challenges Facing Manufacturers - Attack Landscape, Recent Breaches, etc.

Building an IR Program

TrustedSec

Incident Response: Under the Microscope

16

Timothy M. Opsitnick

LEGAL and COMPLIANCE Tra✘ - Ulmer LEGAL and COMPLIANCE Tra✘ - Ulmer

22

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

17

An Introduction to FAIR – Cyber Risk Quantification

Anatomy of a Cyber AttackDemystifying Industrial Control System Cyber

RiskComputer Capers - Then and Now

Michael Radigan Matt Radolec Michael Radigan Steve Margolis / Luke MargolisLeidos Cyber, Inc. Varonis Leidos Cyber, Inc.

PRESENTER NAME PRESENTER NAME PRESENTER NAME

SPONSOR ROOM - IBM

PRESENTER COMPANY

PRESENTER COMPANY

24

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

15

21Anti Hacker Techniques and Technologies Digital Survival

SOC-as-a-Service & Tales from the Trenches: Cyber Security War Stories

New Targets on Cybercriminals' Radar

John Aron Kevin Baker Marty Sanders Shaked VaxAronetics Westfield Artic Wolf Networks IBM

BREAK Visit the Café LUNCH - Concourse

PRESENTER COMPANY PRESENTER COMPANY

The SUMMIT 2019 Gold Sponsors:

17 Annual Information Security Summit - DAY 01Wednesday, October 23

The I-X Center - Cleveland

PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY

23

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

PRESENTER NAME

PRESENTER NAME

PRESENTER NAME PRESENTER NAME PRESENTER NAME

PRESENTER COMPANY

ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing

PRESENTER COMPANY PRESENTER COMPANY

PRESENTER NAME PRESENTER NAME

RESERVED FOR ENERGYTECH

Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & Logicalis

Securing the 4th Industrial RevolutionThe Changing Contractual and Compliance

Landscape

MANUFACTURING Tra✘ - TrustedSec

Xceptional Networking.

✘ceptional Networking

Reception (Area TBD)

SPONSOR ROOM - LOGICALIS

25

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

PRESENTER NAME PRESENTER NAME PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY

TrustedSecWednesday's Tra✘ Sponsors:

Ulmer Byrne

Page 5: Agendas - Information Security Summit · 2019-08-26 · Aligning App Sec With Digital Transformation. O365 Hijacking and Best Practices to Protect Yourself; LUNCH ... ENERGYTECH PRESENTATION

7:30 8:15 8:30 9:00 9:30 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00 3:30 4:00 4:30 5:00 - 7:00 PM

1

2

3

Café'

4

5

6

8

11

12

18

19

20

NOCHE Breakout Room

26

Grand B'room

Correction From Collaboration

Room #AM PM

DOORS OPEN Registration /

Continental Breakfast - Sponsor Exhibit Area

RESERVED FOR ENERGYTECH

ISS PLANNING GROUP / VOLUNTEER ROOM

ENERGYTECH PLANNING GROUP ROOM

CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi

My CEO Told Me We Have to Move Our Datacenter to the Cloud…So, What’s the Big

Deal?

Grant AsplundGlobal Cloud Evangelist Check Point Softwarre

21

Jack Jones

Visit the Café and break with our

SPONSORSLUNCH - Concourse

SPONSOR ROOM - CHECKPOINT SOFTWARE TECHNOLOGIES

Dave Russo / CrobProgressive Insurance Arista Networks RedSeal Red Hat, Inc

SPONSOR ROOM - OKTA

SPONSOR ROOM - TENABLE

Announcements, Partner Message and Keynote Introduction

Co-Founder, Chief Risk Scientist Risklens, Inc

PRESENTER COMPANY TrustedSec

Break with our SPONSORS.

Kate Kuehn PRESENTER NAME PRESENTER NAME Alex Hammerstone

Senseon PRESENTER COMPANY

PRESENTER COMPANY PRESENTER COMPANY

RESERVED

AI / MACHINE LEARNING Tra✘ - ASMGi AI / MACHINE LEARNING Tra✘ - ASMGi

9

Visit the Café and break with our

SPONSORS

Magic + Ultra + Humans = Disaster: The USS Indianapolis

Your next security strategy (Is the security model of today broken?)

LUNCH - Concourse

Considerations for an Effective Awareness Program: Thinking Like an Attacker

The People Priority- Developing a Security Awareness Program with your Employees in

Mind

Break with our SPONSORS.

John O'Leary Laurence Pitt Ken Smith Lauren ZinkO'Leary Management Education Juniper Networks University of Mount Union / SANS TI AmTrust Financial

10

Case Study - Growing Security Champions at Progressive

Wireless Intrusion Prevention – Wireless threat vectors that network managers need to

defend against.

Best Practices Building a Resilience Cyber Security Strategy

SDLC for DevSecOps – Why It’s Important to Embrace Agile

David Upson Jeff Burke Kurt Van Etten

John O'Leary Christopher BerensternOne Identity Cequence Security O'Leary Management Education BSI

13-14Welcome, Partner

Message and Keynote Introduction

Visit the Café and break with our

SPONSORS

Developing Super Women in Security PRESENTATION TITLE

LUNCH - Concourse

PRESENTATION TITLEWhy No One Listens to Us – Articulating

Information Security Risk as Business Risk

17

What Does a Mature Cybersecurity Program Look Like?

SPONSOR ROOM - RED SEAL

Break with our SPONSORS.

SPONSOR ROOM - HURRICANE LABS

SPONSOR ROOM - IBM

PRESENTER NAME PRESENTER NAME PRESENTER NAMENOCHE Breakout Room PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY

22

The Internet of Things That Shouldn't Be On The Internet

Dealing With Digital Lifestyles Zero Trust - Doing it The Right WayEverything You Know About How to Cyber

Secure Your Organization Just Changed

Chris Bush Patrick McCrann Andy Hicks Caston ThomasMcAfee Aetna Guardicore InterWorks, LLC

RESERVED FOR ENERGYTECH

The SUMMIT 2019 Gold Sponsors::

17th Annual Information Security Summit - DAY 02Thursday, October 24 - Sponsored By CEQUENCE SECURITY

The I-X Center - Cleveland

25

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

PRESENTER NAME PRESENTER NAME PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY

24

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

PRESENTER NAME

Xceptional Networking. CASINO NIGHT!!

RESERVED FOR ENERGYTECH

ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing

SPEAKER READY ROOM

✘ceptional Networking. CASINO

NIGHT!!

Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & Logicalis

HEALTHCARE TECHNOLOGY Tra✘ - Check Point Software HEALTHCARE TECHNOLOGY Tra✘ - Check Point Software

15

SPONSOR ROOM - LOGICALIS

PRESENTER NAME PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY

23

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

PRESENTER NAME

16

CLOUD SECURITY Tra✘ CLOUD SECURITY Tra✘

Malicious Bot Attacks: The New #1 Cyber Threat

Scaling Multicloud and Hybrid Cloud Usage without Sacrificing Data Security and

ComplianceCyber Cat & Cyber Mouse Rockin’ the CASB

Carl Gustas Glen Roebuck Laurence Pitt Cory KramerCequence Security Thales E-Security Juniper Networks Logicalis

Can AI/ML help us solve real cyber problems and protect our enterprises from cyber-attacks? In each of these 4 sessions we will learn how AI/ML is being used to identify risks and

anomalous behaviors and ultimately automate detection and response to cyber threats to better protect our enterprises.

Can AI/ML help us solve real cyber problems and protect our enterprises from cyber-attacks? In each of these 4 sessions we will learn how AI/ML is being used to identify risks and

anomalous behaviors and ultimately automate detection and response to cyber threats to better protect our enterprises.

Presenters / Panelists to be AnnouncedTra✘ is Sponsored and Moderated by ASMGi

Presenters / Panelists to be AnnouncedTra✘ is Sponsored and Moderated by ASMGi

RESERVED RESERVED RESERVED

PRESENTER NAME PRESENTER NAME PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY

The Path to IAM Maturity Don't Take a Knife to a Gun Fight Customer Service, Disservice or Self-ServiceRegulations & Privacy Requirements Across

the Globe

Jerod Brennan Ameya Talwalkar

Thursday's Tra✘ Sponsors:Check Point ASMGi

Page 6: Agendas - Information Security Summit · 2019-08-26 · Aligning App Sec With Digital Transformation. O365 Hijacking and Best Practices to Protect Yourself; LUNCH ... ENERGYTECH PRESENTATION

7:30 8:15 8:30 9:00 9:30 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00

1

2

3

Café'

4

5

6

8

11

12

NOCHE Breakout Room

18

19

20

26

Grand B'room

9OEN

10

13-14Welcome , Partner

Message and Announcements

Visit the Café and break with our

SPONSORS

PRESENTATION TITLE

LUNCH - Concourse

PRESENTATION TITLE PRESENTATION TITLE

PRESENTER NAME PRESENTER NAME

Visit the Café and break with our

SPONSORS

Instruction through Practical Experience: CTFs as a Teaching Tool

Incident Response on Mac OS

LUNCH - Concourse

The Strategic Advantage of Adaptive Multi-Engine Advance Threat Protection

Cleveland Clinic PRESENTER COMPANY PRESENTER COMPANY

PRESENTER NAME

SPONSOR ROOM - OKTA

SPONSOR ROOM - TENABLE

Sonic Wall PRESENTER COMPANY

Recent Trends in Information Security and Privacy Laws

What is ITIL? A Security Practitioner’s Introduction

PRESENTATION TITLE PRESENTATION TITLE

Mehmet Munur Chris Stransky PRESENTER NAME PRESENTER NAMETsibouris & Associates, LLC

SPONSOR ROOM - CHECK POINT SOFTWARE TECHNOLOGIES

Correction From Collaboration

Room #AM PM

DOORS OPEN Registration /

Continental Breakfast - Sponsor Exhibit Area

RESERVED FOR ENERGYTECH

ISS PLANNING GROUP / VOLUNTEER ROOM

ENERGYTECH PLANNING GROUP ROOM

CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi

ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing

Conference Ends. GRAND PRIZE DRAWING !!Drawing for prizes.

Winners must be Present

Break with our SPONSORS.

Ken Smith Thomas Reed "Cyber Risk PRESENTER NAMEUniversity of Mount Union / SANS TI Malwarebytes

16

EXECUTIVE Tra✘- CSO ✘change EXECUTIVE Tra✘- CSO ✘change

Duties, Responsibilities and Compartmentalization of the Person

Responsible for Security

Buidling an Effecive Security and Sustainable Information Security Team

45 Minute Security Metrics Workshop

Richard Ullom Kevin Baker Jack Nichelson Gary SheehanNOCHE Breakout Room Western Reserve Group Mutual Westfield Group MRK Elon University

15

CYBER RISKTra✘- ASMGi CYBER RISKTra✘- ASMGi

Throughout the day we will share some of the most widely adopted frameworks and methodologies for identifying and managing cyber risk, and introduce some emerging trends

regarding quantification, prioritization and treatment of risk.

Throughout the day we will share some of the most widely adopted frameworks and methodologies for identifying and managing cyber risk, and introduce some emerging trends

regarding quantification, prioritization and treatment of risk.

Presenters / Panelists to be Announced Presenters / Panelists to be AnnouncedTra✘ is Sponsored and Moderated by ASMGi Tra✘ is Sponsored and Moderated by ASMGi

24

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

PRESENTER NAME

RESERVED FOR ENERGYTECH

RESERVED FOR ENERGYTECH

The Privacy Gameshow Medley Luxury Item or Lifeline? Defense in Depth: DNSAI and Cybersecurity – Connecting the

Machines

Chris Stapenhurst Joseph Salazar Luke Teeters Keith RayleVeritas Attivo Networks Palo Alto Networks Fortinet, Inc.

Break with our SPONSORS.

SPONSOR ROOM - LOGICALIS

SPONSOR ROOM - READ SEAL

ENERGYTECH PRESENTATION ROOM

PRESENTER NAME

25

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

ENERGYTECH PRESENTATION ROOM

PRESENTER NAME PRESENTER NAME PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY

Visit the Café and break with our

SPONSORSLUNCH - Concourse

PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY

21

22

Identity as The New Perimeter

Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & LogicalisThe SUMMIT 2019 Gold Sponsors:

17th Annual Information Security Summit - Day 03Friday, October 25 - Sponsored By The CSO Xchange

The I-X Center - Cleveland

SPEAKER READY ROOM

17Incident Response - What Really Happens OPEN

Security Endgame: Why utilizing a Security Stack at your company is like wielding the

Infinity Gauntlet.

Defense in Depth Requires Securing Databases

Greg Kelley Patrcik Duffy Mitch Spaulding Daniel MorganVestige Digital Investigations Quadax Dark Rhino Security DBSecWorx

To Be Announced

PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY

23

Converged Perimeters – The Future of Network and Content Security in a Cloud

World

Delivering Trust and Confidence Through Resilience

Securing Unstructured Data in Office 365 OPEN

Mark Mahovlich Kurt Van Ettan Tim Beamer PRESENTERICM Cyber RedSeal Logicalis COMPANY NAME

Jack Nichelson / Jason Middaugh Timothy Roth Crob Chris ZannetosMRK / Cisco Systems Red Hat, Inc Covered Security

KEYNOTE: The Ethics of A.I & the DNA Malware

Eddie DoyleGlobal Security Strategist

Check Point Software

True Crime - The First 48 hours on Your Network

Choose Your Own Disaster – Big Trouble in Little Startup

Fitbit for online security? Lessons learned from the Use of Behavior Science

SPONSOR ROOM - HURRICANE LABS

SPONSOR ROOM - IBM

ASMGiFriday's Tra✘ Sponsors:

CSO ✘change