EVENT SUMMARY

SIM's Cybersecurity Special Interest Group (SIG) is hosting its second annual Virtual Conference on Thursday, September 20, 2018, from 11:00 am ET – 4:30 pm ET. This exclusive executive event will offer attendees the opportunity to engage with the sharpest minds on significant cybersecurity issues.

With concurrent Risk and Strategy tracks, we explore practical applications of this year’s theme “TRUST -- THE GREATEST CASUALTY OF CYBER WAR” – building cyber resilient organizations and leveraging cyber trust as a strategic advantage.

Society needs trust in order to function. Consider all of the people, processes and institutions we place our trust in as we go about our daily lives. The fact we don’t really think about it is an indication of how well trust has worked – until now.

In the past few years, we’ve seen breaches of striking proportions, the disclosure of some serious hardware and software flaws, and questionable behavior by some of the largest consumer technology companies. Cybercriminals and state-sponsored actors are becoming increasingly more sophisticated and aggressive in their abilities to exploit our behaviors and technology flaws -- putting all of us at greater risk. Lack of trust is now becoming pervasive.

Mark your calendars and join us at SIM’s Cybersecurity Virtual Conference to hear from an impressive lineup of experts who will share their stories and experiences in preparing for the cyber challenges of tomorrow.

By attending the Cybersecurity Virtual Conference you will:
* Gain insights and knowledge into the emerging cyber threats of tomorrow
* Learn how to build cyber resilient organizations
* Develop approaches for integrating cybersecurity into organizational strategy

The issues in front of us have yet to be resolved and they will continue to linger. As threat actors become more creative and sophisticated, we have to adapt to get ahead of them.

Register for the 2018 Cybersecurity Virtual Conference today!

REGISTER NOW!

Early bird registration through July 15th is only $59 for SIM Members and $89 for Non-Member Practitioners. On July 16th registration fees increase to $75 for SIM Members and $199 for Non-Member Practitioners.

SESSIONS

All times are Eastern Time Printable Schedule || Times, presenters and sessions are subject to change.

11:00 AM
-to-
11:15 AM


Track:
Risk

12:35 PM
-to-
12:50 PM


Track:
Risk

QUICK HIT 1 Global Cyber News Coffee Break

Laszlo  Gonc


12:35 PM
-to-
12:50 PM


Track:
Strategy

Cybersecurity: A “Competitive Advantage” or an over Hyped term?

Don  Devine

This session will explore the question of whether Cybersecurity is or can be a “Competitive Advantage” or is that just Hype.

For the past several years, and for good reason, Cybersecurity has been a much talked about topic in the Board room. We have read and heard countless articles and industry presentatons touting that more and more top executives have embraced cybersecurity as a strategic priority and "Competitive Advantage." There is no doubt that cybersecurity is a top priority for most organizations, but can it truly be a competitive advantage or is that just sales / marketing hype?


2:10 PM
-to-
2:40 PM


Track:
Strategy

Leveraging Blockchain to Create Trusted Data Assets

Margaret  Mitchell

Learn how to leverage blockchain to increase the value of your companies core data assets by wrapping them in unbreakable trust.

As more of your company’s assets become digitized the need for a trusted history of those digitize assets becomes more important. But it is easy for the origination, ownership and history of that data to get lost. In this Quick Tip you will learn how to leverage blockchain to turn a data asset into a trusted data asset.

In this session you will learn what is a trusted data asset and why creating trusted data assets is important to creating long term value for your company. Topics covered are:
  • What is a trusted data asset; how traditional data management techniques can create a data trust vacuum
  • The basics of how block chain works
  • How to use blockchain to transform data assets into trusted data assets
  • How those trusted data assets can create long term sustainable value for your company.


2:40 PM
-to-
2:55 PM


Track:
Risk

The Death of The Password

Cathy  Tran

What comes after the password? This session provides a brief history of the password, how we got here, and what's coming next in the future of user authentication.

Passwords have played a crucial role within user authentication for years, but as security threats evolve, the password model becomes increasingly insufficient to restrict access to authorized users. Although the password is unable to meet our security and user requirements, passwords are ubiquitous in authentication despite alternatives that would, in theory, be more reliable and secure. A suitable authentication standard must meet certain logistical requirements to contend with the password. Passwords are inexpensive, scalable, and easy to learn, but insecure and inconvenient. In our academic research, we developed a theoretical authentication model utilizing blockchain and machine learning, modeled after the protection ring.


2:40 PM
-to-
2:55 PM


Track:
Risk

Cyber Trends for 2019

Dr. Leon  kappelman


4:35 PM
-to-
4:45 PM


Track:
Risk

Don Devine

Don Devine is a senior information security, privacy, regulatory compliance, audit, and risk management leader for Fortune 500 companies. Don works with senior executives to prioritize security needs in accordance with the organization's financial constraints and directives. He is also an experienced presenter in advising senior management on cyber security risks and regulatory issues.

Don currently holds CISSP, CISM, CISA, and CRISC designations and is the Senior Director, World Wide Information Security and Compliance (CISO) for Aspect Software. Aspect is the world’s leading enterprise cloud contact center and workforce optimization solution.

Laszlo Gonc

Laszlo is a recognized senior executive with over twenty-five years of progressive experience in business and information technology. He is responsible for helping organizations, corporate and non-profit alike, navigate the digital frontier advising on cyber security, IT risk mitigation, and building digital technology strategies that drive performance and business value. He has experience across a number of industries advising senior executives, developing security strategies, evaluating IT risk and spearheading critical security projects for senior leadership.

A member of Infragard, ISSA and ISACA, he serves as Chair of the Project Management Institute (PMI) Executive Council, Executive Vice President for the Chicago chapter of the Association of Information Technology Professionals (AITP) as well as the boards of Society for Information Management (SIM) and Illinois Technology Foundation (ITF). In early 2016, he helped form the SIM national Cybersecurity SIG for senior technology leaders and continues to serve as Programming Lead.

He is an invited guest speaker at professional associations, industry conferences and universities providing thought leadership on the state of cyber security, mitigating technology risk, and implementing project management best practices.

Laszlo holds a Bachelor of Science Commerce degree in Operations Management from DePaul University and is a certified CISSP security professional.

Mike Maier

Mike Maier has played a pivotal role in shaping technology in the cities or companies he has served throughout his career. Mike has undertaken bold initiatives in bringing technology to the citizenry through focus group meetings and public/private partnership to help close the digital divide. Mike possesses a wide range of knowledge in all areas of municipal operations.

Mike currently serves as the Chief Technology Officer for the City of Fort Lauderdale, Florida, a city with a residential population of approximately 175,000, 12 million annual tourists, and an area of approximately 36 square miles. Fort Lauderdale is also home to Florida’s deepest port and sits in the pathway of many tropical storms and hurricanes, located just 25 miles north of Miami.

Margaret Mitchell

Margaret Mitchell is a full-stack IT leader with extensive experience leading global teams in the development and implementation of digital products for both mobile and web. She has overseen the deployment of complex business intelligence, big data, analytics and database solutions, and led the bootstrap of a profitable startup from within a large corporation.

Margaret is currently the Vice President of Research and Development at Resonea, Inc., a medical device company focused on sleep disorder diagnostic and remediation software and equipment.

Dr. Shawn Murray

Dr. Shawn Murray is President/CEO at Murray Security Services and is assigned to the United States Missile Defense Agency as a Principal Scientist. He is assigned as a Senior Cyber Security Professional and is an officer in the U.S. Civil Air Patrol. His previous assignments include work with the U.S. Army Cyber Command in Europe, U.S. Air Force and with Commercial Industry in various roles in Information Assurance and Cyber Security. Dr. Murray has worked with NSA, FBI, CIA and the U.S. Defense and State Departments on various Cyber initiatives.

Dr. Murray has several industry recognized certifications to include the C|CISO, CISSP and CRISC. He holds several degrees to include an Applied Doctorate in Computer Science with a concentration in Enterprise Information Systems. Dr. Murray was elected to the International Board of Directors for the Information Systems Security Association in 2016. He is a professional member of IEEE, ACM, ISSA, ISC2 and is an FBI Infragard program partner.

Dr. Suku Nair

Dr. Suku Nair is the director of the AT&T Center for Virtualization at SMU, Dallas. He is a University Distinguished Professor in the Computer Science and Engineering department at the Lyle School of Engineering (past chair 2008-2016). He is also the founder of the Cyber Security program at SMU, which currently enjoys the NSA/DHS Center of Excellence in Information Assurance Education and Cyber Defense designation.

Dr. Nair’s research interests include Software Defined Networks, Virtualization Technologies, and Cyber Security. His research is supported through funds from NSF, NSA/DHS, NIST, ONR, and various industry including Lockheed Martin, Alcatel, Raytheon, IBM, AT&T, and Google.

Dr. Nair has been a consultant to various IT, Telecom, Retail, and Cyber Security Companies. Some of his recent awards include the Dallas 500 award and CIO/CTO award for Outstanding Tech Advocate from the D CEO magazine, SMU Ford Research Fellowship, IBM faculty award, Distinguished University Citizen Award, and the University Distinguished Professorship.

Caren Shiozaki

Caren Shiozaki is Executive Vice President and Chief Information Officer for TMST, Inc., a mortgage company based in Santa Fe, NM. The company is currently in Chapter 11. Due to the company’s circumstance, in addition to the usual CIO duties, she focuses on cybersecurity, risk management, and information governance. She is responsible for litigation support projects involving large-scale data management and forensic data analysis. Prior to TMST, Ms. Shiozaki was Vice President and CIO for Belo Corp, one of the nation’s largest media companies with a diversified group of market-leading television, newspaper, cable and interactive media assets headquartered in Dallas, TX. She has extensive experience in both technologies and business roles at American Express and Bank of America. Ms. Shiozaki is Vice Chair of the SIM National Board of Directors and is a member of the Dallas and Arizona chapters. She is the founder of SIM’s national Cybersecurity Special Interest Group. She holds ISACA’s CGEIT certification and is also a certified e-Discovery Specialist.

Cathy Tran

Cathy Tran is a master’s student at the University of Texas at Dallas studying Information Technology and Systems and an incoming Information Security Project Analyst at Visa, Inc.  

Cathy has focused her research on the future of user-centered authentication models (i.e. passwords) and how technologies such as blockchain and machine learning will be instrumental in securing our lives moving forward.

Sponsors