CYBER SECURITY CONFERENCE OKLAHOMA STATE UNIVERSITY CYBER SECURITY CONFERENCE OKLAHOMA STATE UNIVERSITY MAY 3, 2018

Similar documents
OKLAHOMA STATE UNIVERSITY 4 TH ANNUAL CYBER SECURITY CONFERENCE APRIL 9, 2019 OKLAHOMA CITY, OK COX CONVENTION CENTER 8:00 A.M. - 3:30 P.M. Security T

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

Information Security Officer (ISO) Education

FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

INFORMATION SECURITY OFFICER (ISO) EDUCATION Securing Your Bank s Future. May 17, 2017 TBA Barrett Training Center Nashville, Tenn.

CALIFORNIA CAREER DEVELOPMENT ASSOCIATION 2016 SOUTHERN CA REGIONAL CONFERENCE

FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES

WEBCAST MEETING THE CHALLENGES OF FERPA IN ADVANCEMENT. February 21, 2013 :: 1:00-2:45 p.m. EST

Managing Projects Using PMI s Standards facilitated by: Mr. Andreas Solomou

Professional Training Course - Cybercrime Investigation Body of Knowledge -

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN

1 st Annual Meeting for Abacus Latin America Members

Legal, Ethical, and Professional Issues in Information Security

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS

DATA CENTER DESIGN: CONSTRUCTION CONSIDERATIONS

IT Audit Essentials. Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur

CFE Exam Review Course

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

RENEWAL APPLICATION CERTIFIED NURSE MANAGER AND LEADER

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

TCJIUG Texas Criminal Justice Information Users' Group PO Box Austin, TX 78768

Memphis Chapter. President s Message. This annual event is designed to provide students with a

ACUIA Region 5 Meeting October 3-4, 2011 SEFCU, Albany, NY

National Cyber Security and Cyber Terrorism Summit

HOW TO APPLY. Access to the Internal Job Openings (click here)

MANAGING PROJECTS USING PMI S STANDARDS. Facilitated by Mr. Andreas Solomou. 12, 19, 26 November and 3, 10 December :30 17:00

Data Breach Preparation and Response. April 21, 2017

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

Appendix B: Certified Technology Specialist Design (CTS-D) - Exam Application

MAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world

Short courses presented by the NWU Programme in Forensic Accountancy

Data Security and Privacy at Handshake

Pacific Northwest. ESD in Cleanrooms. Regional ESD. Tutorial. February 7, 2001 Doubletree Hotel Lloyd Center Portland, OR. Audit Measurements

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

INFORMATION TECHNOLOGY AUDIT &

Exhibitor Invitation SHAV 2018 March Williamsburg, Virginia

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

CAP Examination Application

SCHEME OF DELEGATION (Based on the model produced to the National Governors Association)

IV. CBP Certified Building Professional Application

DECEMBER 11, 2018 CIRAGAN PALACE KEMPINSKI. From War Room to Board Room: Connect for the Digital Future CYBERSECURITY CONFERENCE SPONSOR INFOPACK

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

2018 Government Professional Accounting Seminar

A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

Cyber 360: The Business Law Update

INVITATION TO EXHIBIT

Sage Data Security Services Directory

The fast track to top skills and top jobs in cyber. Guaranteed.

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

108th Annual ICA Conference Registration

Assessment and Compliance with Sarbanes-Oxley (SOX) Requirements DataGuardZ Whitepaper

WELCOME TO THE INNOVATIVE PAYMENTS ASSOCIATION

Chapter 4 EDGE Approval Protocol for Auditors Version 3.0 June 2017

Could the BIGGEST Threat to Your Business be INSIDE Your Company?

Subject: University Information Technology Resource Security Policy: OUTDATED

4A Healthcare Data Security & Privacy

STAY LINKED IN. #TrendingNow: Get Linked In on the Latest in Labor and Employment News NOV. Thursday, November 10, :00 am 5:00 pm

Cybersecurity and the Board of Directors

Investigating Insider Threats

We are striving to make this our most successful conference and trade show to date and are looking forward to your attendance.

2019 Exhibitor Invitation

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Cyber, Information Security, and Data Protection

Article II - Standards Section V - Continuing Education Requirements

Privacy Notice. General Information Protection Regulation ( GDPR )

TABLE OF CONTENTS ... 8

Middle District Bankruptcy Bar Association, Inc. Conference. Registration Materials June 14-15, 2018

Credit Card Data Compromise: Incident Response Plan

ATTENDEE REGISTRATION POLICY

chief information security officer

Constitution Towson University Sport Clubs Organization Campus Recreation Services. Article I Name. Article II Membership

A. Risks of Specific Securities Utilized A. Disciplinary Information... 15

PRODUCT SAFETY PROFESSIONAL CERTIFICATION PROGRAM DETAILS. Overview

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals

Please initial each page and mail, FAX, or your completed application to: Milwaukee NARI W. Dearbourn Ave Wauwatosa, WI

The Institute of Internal Auditors San Gabriel Valley Chapter

2 nd Annual Meeting for Abacus North America Members

A-LIST 2016 Event Sponsorship Form

Saskatchewan Public Works Association P.O. Box 131 Saskatoon, SK S7K 3K

Congratulations Silver Boeing Performance Excellence Award recipient!

Certified Exporter Approved Provider Program

National Association of Construction Auditors Instructions

SUBJECT: Training Policy-04 Defense Finance and Accounting Service Civilian Certifications, and Related Expenses

Skills Academy. Forensic Studies Courses

EXAM PREPARATION GUIDE

Number of CPE Hours Required for CCSA, CFSA, CGAP, CRMA. Specialty Certification CPE Requirements. Required Attestations at Time of CPE Reporting

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

GOVERNMENT RELATIONS AND PUBLIC POLICY COMMITTEE [EFFECTIVE: DECEMBER 2015]

Personnel Certification

Is Your Compliance Strategy Putting Your Business at Risk?

FORM ADV PART 2B BROCHURE SUPPLEMENT

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Cybersecurity & Privacy Enhancements

CERTIFICATION RENEWAL APPLICATION CERTIFIED PROFESSIONAL IN HEALTHCARE RISK MANAGEMENT

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

Transcription:

MAY 3, 2018 Hilton Garden Inn and Edmond Conference Center Edmond, OK CYBER 8 a.m.- 4 p.m., APRIL 28, 2017 OKLAHOMA CITY, COX CONVENTION CENTER SECURITY CONFERENCE Featuring state and national experts on cyber security one of the hot topics of 2017 in business. Security is SPONSORS Not Possible: GOLD The Human Element 8:00 am - 3:30 pm Gold Sponsor Silver Sponsors

With the increasing risk and sophistication of cyber attacks, there is a continuous need to adapt your business strategy to protect sensitive business and personal information. The third annual Cyber Security Conference brings local and national experts to Oklahoma and is sponsored by the Management Science and Information Systems Department, Spears School of Business, Oklahoma State University. WHO SHOULD ATTEND? The conference is designed for senior-level leaders, human resource and information technology management professionals, operational technology specialists, systems data administrators, and other business leaders involved in the decision-making process for cyber security strategy, implementation, and management. The conference will be beneficial to those in a range of industries including: legal practices, accounting firms, insurance brokers, personal information suppliers, wholesalers, public sector suppliers, schools and colleges, and those involved in decision making on or delivery of cyber security in central government, local government, police and fire services, health services, and education. PROGRAM AGENDA BENEFITS OF ATTENDING? Learn from cyber security experts and take advantage of the question and answer and networking opportunities to develop new ideas and obtain information you need to address cyber security in your organization. SECURITY IS NOT POSSIBLE: THE HUMAN ELEMENT Understand the human element risks your organization faces Explore the nature and motivation behind internal and external people who pose a risk to your organizations security Develop a cyber security strategy for your organization 7:30 a.m. Registration and Continental Breakfast 8:00 a.m. Pre-conference: Cyber Security Table Topic Discussions and Networking Breakfast 9:15 a.m. Welcome This pre-conference session will include roundtable conversations on cyber security topics. Discussions are meant to be open and candid exchanges where participants can ask questions and share experiences. Facilitators will guide discussions by presenting targeted issues and topics related to cyber security issues. During the session participants are invited to all table topics of interest. A breakfast buffet will also be available, and participants are encouraged to network with other pre-conference attendees and facilitators. Dr. Rick Wilson, W. Paul Miller Professor of Business Administration, Department Head, Management Science and Information Systems, Spears School of Business, Oklahoma State University 9:30 a.m. Timing is Everything When it comes to cyber security, timing creates the crime and affects the outcome of the investigation. FBI cases will be reviewed that illustrate the importance of this timing concept with takeaways for you to advance your organization s security. David Weiss, Computer Scientist, Retired, FBI, Shawnee, OK

10:15 a.m. You Mean I Get to Deal with Legal, Too? Using Legal to Assess Risk in Areas You Might have Overlooked 11:00 a.m. Break Your company speaks in a thousand ways learn how public and even internal statements can create liability in ways you never thought about before. Marketing, websites, contracts and correspondence are a few of the key concerns to consider. IT has a key role to play in these categories from both the standpoint of assessing and managing risk as well as participating in litigation related matters. Discussing these matters with your legal team at the appropriate times can save a lot of headaches in the future. Carrie L. Palmer, J.D., Resolution Legal Group, Oklahoma City, OK 11:15 a.m. Insider Threat: It s Not as Easy as You Think Lessons learned from creating and implementing a top-tier insider threat program will be discussed. You will take away practical information to develop and/or improve your own program. Dave Komendat, Vice President, Chief Security Officer, The Boeing Company, Seattle, WA Noon 12:20 Q & A Session Moderator: Dr. Mark Weiser, Regents Service Professor, Director, Center for Telecommunications and Network Security, Department of Management Science and Information Systems, Spears School of Business, Oklahoma State University Carrie L. Palmer, J.D., Resolution Legal Group, Oklahoma City, OK David Weiss, Computer Scientist, Retired, FBI, Shawnee, OK Dave Komendat, Vice President, Chief Security Officer, The Boeing Company, Seattle, WA 12:20 p.m. Lunch 1:15 p.m. Criminal Conversations: Former U.S. Most Wanted Cybercriminal and Internet Godfather Discusses Cybercrime and How to Protect Yourself, Family and Business 2:00 p.m. Break Reformed cybercriminal turned security consultant, Brett Johnson, delves into his past as one of the world s most notorious computer criminals. He will discuss the current state of cybercrime, examine the most popular crimes that criminals are engaged in today, and provide advice on how to protect you, your family, and your business. Brett Johnson, Consultant, AnglerPhish.com, Birmingham, AL 2:15 p.m. What Now? Tips for How to Defend Against these Threats This panel session will discuss how you and your company can defend against internal and external threats by providing tips, advice, and lessons learned from local cyber security thought leaders. Moderator: Dr. Jim Burkman, Clinical Associate Professor, MSIB Graduate Coordinator, Department of Management Science and Information Systems, Spears School of Business, Oklahoma State University Ronald Hulshizer, Managing Director, BKD LLP, Oklahoma City, OK Denise Calvert, Senior Supervisor, IT Risk and Compliance, Devon Energy, Oklahoma City, OK Kent Nabors, Information Security, Hobby Lobby, Oklahoma City, OK 3:30 p.m. Conference Summary Oklahoma State University, in compliance with Title VI and VII of the Civil Rights Act of 1964, Executive Order 11246 as amended, Title IX of the Education Amendments of 1972, Americans with Disabilities Act of 1990, and other federal laws and regulations, does not discriminate on the basis of race, color, national origin, sex, age, religion, disability, or status as a veteran in any of its policies, practices or procedures. This includes but is not limited to admissions, employment, financial aid, and educational services. Title IX of the Education Amendments and Oklahoma State University policy prohibit discrimination in the provision of services or benefits offered by the University based on gender. Any person (student, faculty or staff) who believes that discriminatory practices have been engaged in based upon gender may discuss their concerns and file informal or formal complaints of possible violations of Title IX with the OSU Title IX Coordinator, Mackenzie Wilfong, J.D., Director of Affirmative Action, 408 Whitehurst, Oklahoma State University, Stillwater, OK 74078, (405) 744-5371 or (405) 744-5576 (fax). This publication, Job# 4980, issued by Oklahoma State University as authorized by the Spears School of Business, was printed by University Printing, 1,200 copies at a cost of $ / 2/16

SPEAKER BIOGRAPHIES Brett Johnson has been a central figure in the cybercrime world for almost 20 years as a former United States Most Wanted person and The Original Internet Godfather as referred to by the United States Secret Service. Brett founded and was a leader of one of the first darknet markets, ShadowCrew, and was instrumental in developing many areas of online fraud. After being captured, escaping prison, and being captured again, Brett finally accepted responsibility for his actions. He now consults with Fortune 500 companies, cyber security firms, financial organizations, law enforcement and others. He speaks frequently regarding his experience and knowledge of cybercrime in order to help others stay safe online. David Weiss was a computer scientist for the FBI and retired in August 2016. During his 32-year career at the FBI, David performed thousands of digital forensic examinations, malware analysis, and digital evidence crime scene searches. David received the FBI Director s Award for Technical/Scientific Advancement for his work on the Alfred P. Murrah Federal Building bombing. Dave Komendat is the vice president and Chief Security Officer for The Boeing Company. He is responsible for Boeing s global security and fire protection policy and procedures, site security, executive protection, supply chain security, structural and aircraft fire protection, government and proprietary information security, data protection, business continuity and disaster preparedness, and security background investigations. Dave is the Boeing interface for both national and international security policy engagement with several government and industry advisory groups. Carrie Palmer is an attorney with Resolution Legal Group. She has been traversing the territory between litigation and technology for 20 years and is a well-known speaker, consultant, trainer, and strategist on issues concerning data security such as technology related policies and procedures, employee privacy, data confidentiality, and ethics in the digital age. As an attorney who has defended claims against businesses for more than 20 years, Carrie recognizes that technology presents businesses with great risk if not properly considered and with great opportunity if understood, respected, and operated within a properly drafted set of policies and procedures. Ronald Hulshizer has more than 25 years of experience helping companies with information technology, security, and financial accounting issues. His primary focus is delivering cyber security and internal audit IT and IT security services to financial institutions. Ronald s team conducts Federal Financial Institutions Examination Council reviews, general IT control reviews, internal and external penetration tests, business continuity plan, cyber security, social engineering, and model validation reviews for approximately 250 financial institutions. Denise Calvert is a senior IT supervisor at Devon Energy responsible for IT risk/compliance, identity management, and SAP security. Denise has more than 25 years of experience in the energy industry, most of which was spent in the IT Audit and security/risk/controls space. She holds a bachelor s degree in Computer Science from the University of Central Oklahoma and is a Certified Information Security Manager (CISM) and Certified Information Systems Auditor (CISA). Kent Nabors leads the cyber security team for Hobby Lobby. Before moving into the retail industry, he worked for MidFirst Bank for 18 years serving in a number of roles including CISO. Early in his career, Kent worked in bank examinations with both the Federal Deposit Insurance Corporation and the Federal Reserve Bank of Kansas City. He serves on the board of directors for the Oklahoma chapter of InfraGard and has been a speaker on cyber security topics at conferences and corporate events across the country.

MAY 3, 2018, HILTON GARDEN INN AND EDMOND CONFERENCE CENTER, EDMOND, OK REGISTRATION NAME: [ ] Mr. [ ] Ms. [ ] Dr. Title Company/Affiliation: Address: Email: City: State: Zip: Phone: ( ) Fax: ( ) Gold Sponsor $4,000 Yes! I wish to be a gold sponsor of the Cyber Security Conference $4,000: Includes 8 registrations to the Cyber Security pre-conference and conference, two invitations to a sponsor and speaker dinner on May 2 in Oklahoma City, an exhibit booth at the conference, and prominent recognition in conference promotion and materials. (Deductible- $1,440; Non-deductible- $2,560) Silver Sponsor $2,500 Yes! I wish to be a silver sponsor of the Cyber Security Conference $2,500: Includes 4 registrations to the Cyber Security pre-conference and conference, an exhibit booth at the conference, and prominent recognition in conference promotion and materials. (Deductible- $1,080; Non-deductible- $1,420) *The IRS requires us to inform you the extent to which your gift for this event is tax deductible. The fair market value of benefits you will receive is listed within each level; therefore the amount of your gift greater than the benefit amount listed may be considered tax deductible. REGISTER ONLINE: cepd.okstate.edu Multiple Registration Discount (3 or more people) Conference and pre-conference registration with table topics and networking breakfast (Conference registration required to attend pre-conference) - $255 per person Cyber Security Conference only - $225 per person. Individual Registration Conference and pre-conference registration with table topics and networking breakfast (Conference registration required to attend pre-conference) - $280 per person Cyber Security Conference only - $250 per person Conference Materials Registration fee includes materials in electronic format, refreshments, and lunch. If you would prefer a hard copy of conference materials in a binder, please check the information below for an additional fee of $15 per binder. Yes! I would like to have a binder of conference materials provided for the Cyber Security Conference. Payment Information A check payable to the OSU Foundation (for sponsorship) or Oklahoma State University (for individual) is enclosed for the amount of $. Mail registration form and check to: OSU Center for Executive and Professional Development Spears School of Business 215 Business Building Oklahoma State University Stillwater, OK 74078-4011 USA If paying by credit card, please fax registration form to 405-744-6143 or call 405-744-5208. Charge $ to my Visa MasterCard Card No. Expiration date Security Code Zip Code Oklahoma State University in compliance with Title VI and VII of the Civil Rights Act of 1964, Executive Order 11246 as amended, Title IX of the Education Amendments of 1972, Americans with Disabilities Act of 1990, and other federal laws and regulations, does not discriminate on the basis of race, color, national origin, sex, age, religion, disability, or status as a veteran in any of its policies, practices or procedures. This includes but is not limited to admissions, employment, financial aid, and educational services. Title IX of the Education Amendments and Oklahoma State University policy prohibit discrimination in the provision of services of benefits offered by the University based on gender. Any person (student, faculty or staff) who believes that discriminatory practices have been engaged in based upon gender may discuss their concerns and file informal or formal complaints of possible violations of Title IX with the OSU Title IX Coordinator, Dr. Carolyn Hernandez, director of Affirmative Action, 408 Whitehurst, Oklahoma State University, Stillwater, OK 74078, (405) 744-5371 or (405) 744-5576 (fax). This publication, which was issued by Oklahoma State University as authorized by the dean of the Spears School of Business. 500 copies printed at XXXXX in Tulsa,OK at a cost of $XXXXX.XX.

CENTER FOR EXECUTIVE AND PROFESSIONAL DEVELOPMENT Spears School of Business 215 BUSINESS BUILDING STILLWATER, OKLAHOMA 74078-4011 USA MAY 3, 2018 HILTON GARDEN INN AND EDMOND CONFERENCE CENTER, EDMOND, OK