In Partnership With
Select Criteria: Tracks = Cybersecurity Track

Tuesday, March 06

11:45 AM - 12:30 PM

  • Room:   N220D
  • Session Number:  T223
  • Tuesday, March 06, 11:45 AM - 12:30 PM
This session is an executive level cybersecurity presentation that shows leaders how to design a defense in-depth cyber security strategy for protecting their organization. This design is based on four interdependent security zones – Physical Infrastructure Security, Local Host Security, Local Network Security and Edge Protection.  The US government’s cybersecurity...
Speakers
Chuck Brooks

Managing Director/VP
eITPrep Educational Technologies Group

William Fisher

Security Engineer
National Cybersecurity Center of Excellence at the National Institute of Standards and Technology


Tuesday, March 06

1:30 PM - 2:15 PM

  • Room:   N220D
  • Session Number:  T233
  • Tuesday, March 06, 1:30 PM - 2:15 PM
Cybersecurity is constantly evolving, becoming more complex and costly as the number of cyber threats grow. Many organizations are increasing their focus on implementing countermeasures to safeguard their vital assets and data. Without a comprehensive plan for identifying threats and mitigating them before they penetrate networks, hackers, malicious users and...
Speaker
Edwin Waleh

Information Security Assurance Analyst
Avtec Inc.


Tuesday, March 06

2:30 PM - 5:30 PM

  • Room:   N220D
  • Session Number:  T243
  • Tuesday, March 06, 2:30 PM - 5:30 PM
This session is a hands-on presentation that introduces attendees to hacking tools and techniques used by white-hat hackers for penetration-testing activities. Attendees are encouraged to bring their own notebook PCs to participate in the activities. Software tools will be supplied to the attendees in the form of two USB thumb...
Speaker
Chuck Brooks

Managing Director/VP
eITPrep Educational Technologies Group


Wednesday, March 07

2:45 PM - 4:00 PM

  • Room:   N220D
  • Session Number:  W23
  • Wednesday, March 07, 2:45 PM - 4:00 PM
Frequently, we hear that networks are "closed" and therefore safe, from a cybersecurity perspective. Unfortunately, this approach leads to the creation of trusted networks which are only as strong as their weakest links. As cyberthreats are evolving from eavesdropping and man-in-the-middle attack to DDoS advanced persistent threat (APT), malware/ransomware, network...
Speakers
Aaron Riley

Malware Research Analyst
Phishme

Bill Butler

Chair, Cyber & Information Security and Director, Critical Infrastructures & Cyber Protection Ctr
Capitol Technology University

Hansen Chan

Product Marketing Manager
Nokia

Timothy Lorello

President & CEO
SecuLore Solutions


Wednesday, March 07

4:15 PM - 5:30 PM

  • Room:   N220E
  • Session Number:  W34
  • Wednesday, March 07, 4:15 PM - 5:30 PM
P25 system security and encryption has become increasingly important to protect mission-critical communications from unauthorized listeners. Explore P25 security standards updates, enhanced sharing between Key management facilities and devices and a future new P25 Link Layer Encryption standard. P25 authentication and AES encryption applications will be detailed. Proper planning and...
Speakers
James Downes

Supervisory Manager, Office of Emergency Communications
US Department of Homeland Security

Jeremy Elder

Systems Product Line Manager
Harris Corporation

Jim Holthaus

Vice President - Chief Technology Office
BK Technologies

Richard (Alan) Massie

Electronics Engineer
Federal Bureau of Investigation

Stephen Nichols

Director
Project 25 Technology Interest Group


Thursday, March 08

2:15 PM - 3:30 PM

  • Room:   N220D
  • Session Number:  TH23
  • Thursday, March 08, 2:15 PM - 3:30 PM
In today’s environment, threats come at you from all angles that can block you from communicating in serious situations.  Jamming and interference (intentional or not) can block you from communicating at all.  A hacker can intercept your communications and stop it from reaching its destination, or they can let it...
Speaker
Jay English

CTO
APCO international


Thursday, March 08

3:45 PM - 5:00 PM

  • Room:   N220D
  • Session Number:  TH33
  • Thursday, March 08, 3:45 PM - 5:00 PM
Discuss lessons learned from both large and small data breaches (e.g., Target, small web design company) and the takeaways from them, i.e., the significant change to the legal landscape that continues to occur in the data security/data breach arena which means that no companies are immune from liability. Examine the...
Speakers
Curtis Levinson

CISO
MetTel, Inc.

Jerry Hutcheson

Owner
Cybercreed Consulting

John Deveney

President
DEVENEY

Kathy Winger

Attorney at Law
Law Offices of Kathy Delaney Winger


Friday, March 09

8:15 AM - 9:30 AM

  • Room:   N220C
  • Session Number:  F05
  • Friday, March 09, 8:15 AM - 9:30 AM
Ongoing risk assessments and business workflow assessments consistently point to employees as the biggest cyber risk in any organization and a key component of cybersecurity preparation. Discuss how cybercriminals are targeting company employees as the entry point from which to launch cyberattacks, and the measures that companies can take to...
Speakers
Aaron Riley

Malware Research Analyst
Phishme

Curtis Levinson

CISO
MetTel, Inc.


Friday, March 09

11:15 AM - 12:30 PM

  • Room:   N220C
  • Session Number:  F25
  • Friday, March 09, 11:15 AM - 12:30 PM
Current attack vectors indicate that nefarious attacks are increasingly targeting critical infrastructure across ICS, SCADA, IIoT, and even P25 communications. Most organizations lack a defense-in-depth strategy to address the evolving wireless threat landscape of Wi-Fi, ZigBee, Z-Wave, Bluetooth, P25, and more. These attacks occur from the Internet, the neighboring airspace,...
Speaker
Michael Raggo

Chief Security Officer
802 Secure, Inc.