In Partnership With
Select Criteria: Tracks = Cybersecurity Track

11:45 AM - 12:30 PM

  • Room:   N220D
  • Session Number:  T223
  • Tuesday, March 06, 11:45 AM - 12:30 PM
This session is an executive level cybersecurity presentation that shows leaders how to design a defense in-depth cyber security strategy for protecting their organization. This design is based on four interdependent security zones – Physical Infrastructure Security, Local Host Security, Local Network Security and Edge Protection.  The US government’s cybersecurity...
Speakers
Chuck Brooks

Managing Director/VP
eITPrep Educational Technologies Group

William Fisher

Security Engineer
National Cybersecurity Center of Excellence at the National Institute of Standards and Technology


1:30 PM - 2:15 PM

  • Room:   N220D
  • Session Number:  T233
  • Tuesday, March 06, 1:30 PM - 2:15 PM
Cybersecurity is constantly evolving, becoming more complex and costly as the number of cyber threats grow. Many organizations are increasing their focus on implementing countermeasures to safeguard their vital assets and data. Without a comprehensive plan for identifying threats and mitigating them before they penetrate networks, hackers, malicious users and...
Speaker
Edwin Waleh

Security Product Manager
Avtec Inc.


2:30 PM - 5:30 PM

  • Room:   N220D
  • Session Number:  T243
  • Tuesday, March 06, 2:30 PM - 5:30 PM
This session is a hands-on presentation that introduces attendees to hacking tools and techniques used by white-hat hackers for penetration-testing activities. Attendees are encouraged to bring their own notebook PCs to participate in the activities. Software tools will be supplied to the attendees in the form of two USB thumb...
Speaker
Chuck Brooks

Managing Director/VP
eITPrep Educational Technologies Group


2:45 PM - 4:00 PM

  • Room:   N220D
  • Session Number:  W23
  • Wednesday, March 07, 2:45 PM - 4:00 PM
Frequently, we hear that networks are "closed" and therefore safe, from a cybersecurity perspective. Unfortunately, this approach leads to the creation of trusted networks which are only as strong as their weakest links. As cyberthreats are evolving from eavesdropping and man-in-the-middle attack to DDoS advanced persistent threat (APT), malware/ransomware, network...
Speakers
Aaron Riley

Network Security Analyst
State of Missouri - Office of Cyber Security - Security Operations Center

Bill Butler

Chair, Cyber & Information Security and Director, Critical Infrastructures & Cyber Protection Ctr
Capitol Technology University

Hansen Chan

Product Marketing Manager
Nokia

Timothy Lorello

President & CEO
SecuLore Solutions


4:15 PM - 5:30 PM

  • Room:   N220E
  • Session Number:  W34
  • Wednesday, March 07, 4:15 PM - 5:30 PM
P25 system security and encryption has become increasingly important to protect mission-critical communications from unauthorized listeners. Explore P25 security standards updates, enhanced sharing between Key management facilities and devices and a future new P25 Link Layer Encryption standard. P25 authentication and AES encryption applications will be detailed. Proper planning and...
Speakers
James Downes

Supervisory Manager, Office of Emergency Communications
US Department of Homeland Security

Jeremy Elder

Systems Product Line Manager
Harris Corporation

Jim Holthaus

Vice President - Chief Technology Office
BK Technologies

Richard (Alan) Massie

Electronics Engineer
Federal Bureau of Investigation

Stephen Nichols

Director
Project 25 Technology Interest Group


2:15 PM - 3:30 PM

  • Room:   N220D
  • Session Number:  TH23
  • Thursday, March 08, 2:15 PM - 3:30 PM
In today’s environment, threats come at you from all angles that can block you from communicating in serious situations.  Jamming and interference (intentional or not) can block you from communicating at all.  A hacker can intercept your communications and stop it from reaching its destination, or they can let it...
Speaker
Jay English

CTO
APCO international


3:45 PM - 5:00 PM

  • Room:   N220D
  • Session Number:  TH33
  • Thursday, March 08, 3:45 PM - 5:00 PM
Discuss lessons learned from both large and small data breaches (e.g., Target, small web design company) and the takeaways from them, i.e., the significant change to the legal landscape that continues to occur in the data security/data breach arena which means that no companies are immune from liability. Examine the...
Speakers
Curtis Levinson

United States Cyber Defense Advisor to NATO
NATO

Jerry Hutcheson

Owner
Cybercreed Consulting

John Deveney

President
DEVENEY

Kathy Winger

Attorney at Law
Law Offices of Kathy Delaney Winger


8:15 AM - 9:30 AM

  • Room:   N220C
  • Session Number:  F05
  • Friday, March 09, 8:15 AM - 9:30 AM
Ongoing risk assessments and business workflow assessments consistently point to employees as the biggest cyber risk in any organization and a key component of cybersecurity preparation. Discuss how cybercriminals are targeting company employees as the entry point from which to launch cyberattacks, and the measures that companies can take to...
Speakers
Aaron Riley

Network Security Analyst
State of Missouri - Office of Cyber Security - Security Operations Center

Curtis Levinson

United States Cyber Defense Advisor to NATO
NATO


9:45 AM - 11:00 AM

  • Room:   N220C
  • Session Number:  F15
  • Friday, March 09, 9:45 AM - 11:00 AM
Everyone knows that security testing on a production network is a no-no.  However, duplicating a network in real equipment can get expensive – prohibitively so.  One solution is to create a virtual environment to run the tests. Hear about a number of programs that can allow you to segregate your...
Speaker
David Parker

Professor of Computer Science/Business/CIS Academic Advisor
Arizona Western College


11:15 AM - 12:30 PM

  • Room:   N220C
  • Session Number:  F25
  • Friday, March 09, 11:15 AM - 12:30 PM
Current attack vectors indicate that nefarious attacks are increasingly targeting critical infrastructure across ICS, SCADA, IIoT, and even P25 communications. Most organizations lack a defense-in-depth strategy to address the evolving wireless threat landscape of Wi-Fi, ZigBee, Z-Wave, Bluetooth, P25, and more. These attacks occur from the Internet, the neighboring airspace,...
Speaker
Michael Raggo

Chief Security Officer
802 Secure, Inc.