Loading…
InnoTech Austin has ended
Visit innotechaustin.com to begin your registration. 
Security Track [clear filter]
Thursday, November 16
 

9:30am CST

Healthcare - An Identity Thief's SuperStore
Healthcare records include some of the most complete - and thus, most valuable - personal identities available online. Yet, they are also among the most vulnerable, making them a primary target for cybercriminals. Julie will talk about some of the cybersecurity challenges in healthcare and how the cybersecurity community can help.

Speakers
avatar for Julie Rennecker, PhD

Julie Rennecker, PhD

Chief Experience Officer, Third Rock
Julie Rennecker, PhD, is the Chief Experience Officer at Third Rock, an Austin-based cybersecurity compliance software and consulting firm. Julie’s background includes bedside clinical experience as an RN in ICU, ER, and behavioral health; a PhD in Organizational Behavior from... Read More →


Thursday November 16, 2017 9:30am - 10:15am CST
Room 17A

10:45am CST

How Quantum Computing Will Impact Your Present Identification Tools and Methods
Quantum computing is a new initiative that will change computing forever.  This talk will present an overview of quantum computing, how it works and how it may be used to bypass current authentication controls, steal your identity, and what you can do about it.

Speakers
DJ

Dr. Jim Keeler

CEO, KP, LLC
Dr. James D. Keeler (Jim) earned a Bachelor of Science in Physics and Mathematics from the University of California at Davis with Highest Honors and a Ph. D. in Theoretical Physics from the University of California at San Diego, with a Post Doctoral Fellowship at Stanford University... Read More →


Thursday November 16, 2017 10:45am - 11:30am CST
Room 17A

11:00am CST

Moving Sucks. Making Secure Cloud Migration Painless
There’s no denying it; moving is never fun. This is especially true for organizations planning a secure cloud migration without upending their entire business model. Fortunately, there’s a way to make this move less painful and your new cloud environment even more secure. In this 50-minute presentation, Dan Mannion, Armor, outlines how organizations can complete their move to the cloud without impacting their security posture – enabling seamless operations despite migrating to an open public cloud environment. 
 
Attendees will learn: 
 
·         How to plan their secure cloud migration
·         Why a secure environment isn’t the same as being secure
·         Ways to manage the operational impact of shared responsibility on Azure, AWS and private clouds

Speakers

Thursday November 16, 2017 11:00am - 12:00pm CST
Room 12A

11:30am CST

ISSA Security Summit Luncheon: Not “If” But “When” - What Businesses Should Know About the Impact of Identity Theft on Consumers
Over 17 million consumers reported thefts of their personal information in 2014, and the problem continues to grow. American businesses lose billions of dollars a year because of identity crimes. Businesses are often hit twice by identity thieves: first by having to forgo collection of unauthorized debts and second by losing the customers whose identities were stolen. Understanding the impact of identity theft on consumers helps businesses react to customer identity theft claims more effectively.

Speakers
avatar for Paula Pierce

Paula Pierce

Attorney
Paula Pierce is an attorney with over 30 years of experience assisting consumers. Since 2006, she has assisted individuals with identity theft recovery. She also advises small businesses on identity theft issues. She writes and speaks extensively on identity theft. She currently serves... Read More →


Thursday November 16, 2017 11:30am - 1:00pm CST
Room 18AB

1:00pm CST

Defending Against Ransomware, You Already Have the Capability, Why Are We Not Using It?
Ransomware is still a leading thorn in Healthcare’s IT and Information Security’s side.  I have listened in on many ransomware talks, at ISC2 Congress, SecureWorks ESS, BlackHat, RMISC, BSides and others, and they all fail at any real prescriptive help.  They all miss the one FREE thing we CAN do to eliminate the bulk of the ransomware attacks.  You do not need a fancy product with blinky blue lights to reduce the risk of ransomware dramatically.  This talk will walk attendees through what we did to curb the ransomware threat and how you can do it too!  It is easy, free and nothing needs to be purchased, it just takes a little Active Directory and Email changes to implement, and a little bit of user education.
Yeah yeah yeah, everyone needs to be better at backups and not pay the ransom, but that is still a responsive effort and takes a lot of time.  Recovering takes hours of people labor, loss of productivity and the costs incurred while the issue is dealt with and data is restored.  What if we can stop the way ransomware is allowed to infect our systems and drop or block it without buying any more technology?  We all have what we need to stop it and it is called Microsoft Windows and it works to curb ransomware infections, just no one, until now has told us how.

Speakers
MG

Michael Gough

Malware Archaeologist
Michael is a Malware Archaeologist, Blue Team defender, Incident Responder and logoholic.  Michael developed several Windows logging cheat sheets to help the security industry understand Windows logging, where to start and what to look for.  Michael is co-developer of LOG-MD, a... Read More →


Thursday November 16, 2017 1:00pm - 1:45pm CST
Room 17A

2:30pm CST

How Open Source Intelligence (OSINT) Leads to an Effective Red Team Attack
  • Everyone loves social media and sharing their life with the rest of the world. Think you have nothing to hide nor anything of value that an attacker would want? Think again. OSINT refers to intelligence collected from publicly available sources. The first part of this talk will cover the various OSINT tools attackers use to gather information about their targets. The second part will cover how attackers use the information gathered to launch successful attacks against designated targets.

Speakers
avatar for Summer Lee

Summer Lee

GuidePoint Security, Senior Security Consultant
Summer Lee (crazian) is a Senior Security Consultant and part of the Threat & Attack Simulation (TAS) team for GuidePoint Security. She started using social engineer tactics at a very young age which led her to have a special interest in physical Red Team engagements. Crazian is... Read More →


Thursday November 16, 2017 2:30pm - 3:15pm CST
Room 17A

3:30pm CST

Cybersecurity Incident Response – Fortune Favors the Prepared!
The talk is a walkthrough of an incident scenario, with a way-back machine twist that will let us go back in time to see what we could have done to be more prepared. It’s inevitable that at some point things will go bad, so let’s be ready when it does.

Speakers
avatar for Brian A. Engle, CISSP, CISA

Brian A. Engle, CISSP, CISA

Brian Engle is the Founder and CEO of Riskceptional Strategies, a consulting partner focused on enabling the development of successful strategies for building, operating, and evolving risk-based cybersecurity programs. Riskceptional helps organizations implement sustainable, programmatic... Read More →


Thursday November 16, 2017 3:30pm - 4:15pm CST
Room 17A
 
Filter sessions
Apply filters to sessions.