2014 Montana Government IT Conference. Securing Data Networks and People



Similar documents
CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

El Camino College Homeland Security Spring 2016 Courses

U.S. Cyber Security Readiness

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

WILLIAM OETTINGER PHONE (702)

Fast Facts About The Cyber Security Job Market

An Overview of Large US Military Cybersecurity Organizations

ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER

Homeland Security: Information Assurance Challenges and Opportunities. Building the National Cyber Security Division

Douglas M. DePeppe Cyberlaw Attorney

Challenges in Cybersecurity. Major General Bret Daugherty, The Adjutant General, Washington Army and Air National Guard

National Cybersecurity & Communications Integration Center (NCCIC)

( 4EC C11392)

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

CyberSecurity Solutions. Delivering

National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work

Reliable, Repeatable, Measurable, Affordable

Cyber threats are growing.

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

Developing a Mature Security Operations Center

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

CURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Preventing and Defending Against Cyber Attacks October 2011

DHS, National Cyber Security Division Overview

ISOO Notice : Update on Recent Cyber Incidents at OPM

THOMAS WELCH, CISSP, CPP, CISA, CISM, CFI, CHS-III SUMMARY

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

DHS. CMSI Webinar Series

Cyber Security Awareness Day

How To Understand And Manage Cybersecurity Risk

Washington State Fusion Center. The Pacific Northwest Economic Region

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education

Cyber Security Awareness Workshop

Incident Response. Summary of Expertise and Experience

Preventing and Defending Against Cyber Attacks November 2010

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

Program Drill-Downs National

Curriculum Vitae EXPERIENCE WORK HISTORY

SCAC Annual Conference. Cybersecurity Demystified

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

Representative James R. Langevin Chairman of the Homeland Security Subcommittee on Emerging Threats, Cyber Security and Science and Technology

Program Agenda. Agenda Welcome Remarks, IDMA Vice President, Dana Reynolds

CYBER SECURITY FOR LONG TERM EVOLUTION

2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing

University of Maryland University College. American Military University. Henley-Putnam University

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

Risk, Threat, and Vulnerability Assessment

Report on CAP Cybersecurity November 5, 2015

ADDRESS 001 UNITED STATES SENATE 002 U.S. HOUSE OF REPRESENTATIVES 003 COMMISSION SECURITY & COOPERATION IN EUROPE 006 U.S. CAPITOL POLICE+D32

WASHINGTON MILITARY DEPARTMENT. Washington State. Significant Cyber Incident Annex

IA/CYBERSECURITY IS CRITICAL TO OPERATE IN CYBERSPACE

DONALD F. CONWAY, CPA, Managing Director, The Mercadien Group

Strategic Progress Update July 2014 March 2015

Department of Defense DIRECTIVE

Industry Impact of Big Data in the Cloud: An IBM Perspective

AT&T Cybersecurity Policy Overview

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Workshop C. 11:00 a.m. to 12:15 p.m.

Shon Harris s Newly Updated CISSP Materials

Manned Information Security

Regulatory Compliance

2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP

Preventing and Defending Against Cyber Attacks June 2011

OFFICE OF ENTERPRISE TECHNOLOGY SERVICES QUARTERLY REPORT ON

Web Portals and Higher Education Technologies to Make IT Personal

Middle Class Economics: Cybersecurity Updated August 7, 2015

About Our 2015 WTA Cyber Security Speakers and Sessions

Educa&onal Event Spring Cyber Security - Implications for Records Managers Art Ehuan

AGENDA HIP Ho AA w i rivacy d The B reach Happen? I P nc AA Secu dent R rit esp y o nse Corrective Action Plan What We Learned ACRONYMS USED

ACA INFORMATION TECHNOLOGY READINESS AND DATA SECURITY

Panel Session: High Impact Workforce Initiatives Redefine the Government Information Security Workforce

Working with the FBI

Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE

Cybersecurity A Clear and Present Danger

Executive Cyber Security Training. One Day Training Course

September 24, Mr. Hogan and Ms. Newton:

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems

A Tipping Point The Fight for our Nation s Cyber Security

How to Lead the People in a Program Based Environment

Improving Emergency Planning, Response and Recovery with Virtual Alabama

Larry (Chip) H. Monts Jr.

Department of Defense DIRECTIVE

NSA Surveillance, National Security and Privacy

S. Robert Radus, CPA CFE PI Curricula Vitae. Examination of plaintiff, respondent, and defendant books and records to determine:

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

National Initiative for Cybersecurity Education

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative (302)

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

Bellevue University Cybersecurity Programs & Courses

Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing:

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

Transcription:

Presenter: Matt Bennett, Genetec Leveraging the Cloud for Hybrid Video Surveillance Matt is based in Seattle, WA and is the Western North America pre-sales engineer for Genetec (the world s leader in unified video surveillance, access control, and license plate recognition). Matt works with Genetec s system integrators, and end users and helps them to design complex, global security systems leveraging best of breed technology from a wide array of manufacturers. With over 7 years in the pre-sales engineering field, Matt has been providing unique solutions to customer issues in the fields of virtualization, cloud computing, backup and disaster recovery, business intelligence, and process improvement. Presenter: Christopher Beier, IBM Trusteer Smarter Prevention Against Advanced Threats Christopher has 20 years in the security field across many functional roles at Symantec, McAfee and IBM. Christopher is currently head of Product Marketing at IBM/Trusteer. 1

Presenter: Scott Fairchild, Charter Business Low Tech Threats in a High Tech Environment Scott Fairchild is a telecommunications veteran with nearly 20 years of experience in the industry. Over that span, he has led the development of Ethernet, Internet, VPN, and security and managed services for several Fortune 500 companies. For the past 5 years he has led networking, Internet and managed services product development for Charter Business (a division of Charter Communications) and has lead teams responsible for delivering innovative new products to the carrier, enterprise, government, healthcare and small business markets. Presenter: Eric Frazee, Manager of Enterprise Security Protecting Your Sensitive Information in a Dangerous World Through Data Tagging, Redaction, and Enhanced Network Security and Awareness Eric was born and raised in Sioux Falls, SD. After graduating High School Eric attended the University of Montana and obtained a Bachelors of Business Administration emphasis Information Systems. After graduation Eric spent the 10 years working as a network engineer for Cisco Systems partners across the Pacific Northwest. Working on projects ranging from small businesses, to local, and state governments and nuclear power facilities. For the last two years Eric has been with Washington Corporations severing as Network Engineer and most recently Enterprise IT Security Manager. 2

Presenter: Kevin B. McDonald Alvaka Networks Low Tech Threats in a High Tech Environment Kevin B. McDonald, CHPSE, President of Noloki Healthcare IT & Compliance, a division of Alvaka Networks. Since 1999 McDonald has been working in various capacities as a technology and security consultant. He has become a highly trusted technology and cyber security and public policy advisor to many of America's most influential organizations and individuals. Kevin is a Certified HIPAA Privacy and Security Expert. He has been the appointed Chairman of the Orange County Sheriff/Coroner's Technology Advisory Council (T.A.C) since 2009. He is a member of the US Secrets Service s Los Angeles Electronic Crime Task Force (LAECTF) and the High Tech Crimes Consortium (HTCC). Noloki and McDonald support organizations and businesses on issues surrounding advanced integrated technologies that improve data liquidity, personal, physical and logical security, regulatory compliance, and organizational development. Kevin has written for and been interviewed in dozens of national and regional publications, and other media outlets. Presenter: Karen Palmer, COO & Director of Operations and Forensics Protecting Your Sensitive Information in a Dangerous World Through Data Tagging, Redaction, and Enhanced Network Security and Awareness Karen Palmer is the Director of Operations at LMG Security. She has over 20 years of experience in information technology, most recently serving as Director of Technology for Billings Public Schools, where she was responsible for securing and supporting 18,000 users, 8,500 computers, 5,000 mobile devices, 2,000 telephones, 50 miles of network, and one very temperamental vending machine. A true geek, she considers "digital forensics" a perfectly acceptable answer to the question, But what do you do for fun? Karen is President and a founding member of the Montana High Tech Crime Investigation Association (HTCIA) and is CompTIA A+ certified. 3

Presenter: Chris Schrichte, President and CEO Protecting Your Sensitive Information in a Dangerous World Through Data Tagging, Redaction, and Enhanced Network Security and Awareness Chris Schrichte is the President and CEO of TeraDact Solutions, Inc. and is an inventor of several of TeraDact's patents. Chris is also one of the founding members of NewMarket, the principal investor in TeraDact. Prior to founding NewMarket in 1998, Chris was a Senior Vice President in Prudential Securities' Investment Banking Group. While at Prudential, Chris was a member of the President's Council in 1995 and the Chairman's Council in 1996 and 1997. Prior to Prudential, Chris held similar positions with Smith Barney and Alex Brown & Sons. Chris Schrichte is a graduate of the Virginia Military Institute and earned an MBA from Duke University's JB Fuqua School of Business. Presenter: Thomas G. Trobridge (Tom), Chief Operating Officer Protecting Your Sensitive Information in a Dangerous World Through Data Tagging, Redaction, and Enhanced Network Security and Awareness Tom retired from the U.S. Army as a Colonel after serving over 24 years as a Signal Officer. He worked in a variety of leadership and staff positions with responsibility for providing electronic communications and information technology services to some of the nation s most elite special military units including Special Forces, Ranger and the Joint Special Operations Command. He has been involved in conducting numerous operations supporting vital national security objectives. Tom was also responsible for the rapid development and implementation of highly innovative information technology equipment and operational procedures that produced distinct advantages to the operators from the community of users he supported. Most recently, Tom served as the Chief Information Officer and Director of Information Technology Services for the City of Alexandria, Virginia. Under his leadership, the City received national recognition for their infrastructure modernization and innovative IT initiatives. Tom is a graduate of Virginia Military Institute and holds a Master of Science degrees from Syracuse University and the National Defense University, Eisenhower School (Industrial College of the Armed Forces). Tom holds certificates as a Chief Information Officer in Federal Executive Competencies and as a Department of Defense Chief Information Officer. 4

Presenter: Jimmy Weg, Department of Justice Montana Forensics After graduating from Fairleigh Dickinson University, I was a senior examiner for the National Association of Securities Dealers in New York City. Thereafter, I was Chief of Enforcement for the Montana Securities Department, where I established and headed the agency s law enforcement efforts against securities fraud. In 1996, I became the first Supervising Agent of the Medicaid Fraud Control Unit of the Montana Division of Criminal Investigation (DCI), Department of Justice. I formed the DCI Computer Crime Unit in November 2000, and serve as Agent in Charge. I conduct and supervise computer forensics for state, local, and federal agencies, and I m a Certified Forensic Computer Examiner (CFCE). I also serve as a peace officer for the state of Montana. I ve received hundreds of hours of training in computer forensics and computer crime and have conducted more than 1,000 forensic examinations. I publish a web log that teaches the use of virtualization in computer forensics and have subscribers worldwide. I ve testified as an expert in computer forensics in state and federal courts throughout Montana. Photo Not Available Jeffrey H. Wright Cyber Exercises 101 & Montana OpDigitalTreasure Over the past 12 years, Jeff Wright has been instrumental in major cyber efforts at the Department of Homeland Security (DHS) and the Department of Defense (DoD). At DHS, he was the first Cyber Exercise Program Director for the Office of Cybersecurity and Communications and the architect for the National Cyber Exercise series Cyber Storm, a ground breaking effort to bring together all levels of government and the private sector to exercise cyber incident response across the entire cyber community. His work in cyber exercises includes extensive collaboration with interagency groups, federal departments, state and local governments, international partners and the private sector. Mr. Wright is currently the lead exercise planner for DHS US-CERT. Prior to joining DHS, he supported DoD's International Information Assurance Program focusing on international cyber policy, cyber exercises, and real-time 24/7 operational coordination and intelligence exchange with allied military CERTs. Other prior work included Manager, Cyber Test and 5

Analysis Division with Dynetics, Inc., providing vulnerability assessments, penetration testing, and software security testing for government clients. Mr. Wright holds an MPA from Cornell University, a Certificate in Business Administration from the University of Notre Dame, and a BA from Davidson College. He is a Certified Information Systems Security Professional (CISSP) and holds a Master Exercise Practitioner (MEP) certificate from the DHS Emergency Management Institute. Mr. Wright also was a contributing subject matter expert to the CSIS Cybersecurity Commission report Securing Cyberspace for the 44 th Presidency in 2008 as well as National Institute of Standards and Technology (NIST) Special Publication 800-84, Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities from the in 2006. 6