Home»Event
Place: Swissotel Chicago, 323 East Upper Wacker Drive
Date: 2015-06-03 04:00:00
Time: 0000-01-01 13:30:00 - 0000-01-01 20:30:00

Without security, technology services simply aren’t viable. That’s a fundamental IT truth in our hypermobile world — with workers (and sometimes the public too) needing access to government resources anywhere and anytime.

What do you need to know now to keep your organization’s data, networks, systems and users safe? Please join StateTech magazine as we peel back the layers needed for deep security, with experts focused on the unique infrastructure security demands of state and local governments.

 

 

Agenda

We look forward to an open exchange of ideas between the speakers and the audience, so please register to take part in this complimentary event.

You will learn:

• About the cyberthreat landscape for state and local government.
• The elements critical to modern incident response plans.
• How to build and use a threat intelligence program.
• Ways to integrate agentless security into the software-defined data center.

  • 7:45am

    Registration & Continental Breakfast

  • 8:30am

    Welcome and Preview of the Day

    Vanessa Jo Roberts
    Editorial Director
    StateTech Magazine
  • 8:45am

    Keynote: 2015 State of Security

    Sadik Al-Abdulla
    Director, Security Solutions
    CDW

    Security breaches have been all over the news and full of startling statistics, such as "average length of penetration before detection >200 days." During this session, we will make sense of the hype, discuss the basics of root cause and attribution, and then move on to share findings from more than 3,000 security assessments.

    The session will conclude with an exploration of industry accepted best practices for how to think about, architect and execute adaptive security for today's threat landscape.

  • 9:45am

    Presentation: Cyberthreat Landscape for State and Local Government

    Kevin Thompson
    Threat Analyst
    FireEye

    This session will cover the importance of threat intelligence to state and local agencies. It will cover incident response, the need for strategic analysis and the latest threats to government organizations, delving into which vectors (web versus email) we are seeing targeting state and local organizations in the United States.

  • 10:15am

    Break

  • 10:30am

    Panel: Sharing Threat Intelligence

    Paul Bivian
    CISO
    City of Chicago
    Ricardo Lafosse
    CISO
    Cook County, Ill.
    Aamir Lakhani
    Senior Security Strategist, FortiGuard Labs
    FortiGuard
    August Neverman
    CIO & CISO
    Brown County, Wis.
    Kevin Thompson
    Threat Analyst
    FireEye

    Sharing threat intelligence is critical for protecting government agencies and citizens alike. The panel will discuss how to make this intelligence actionable, what information should be shared and how to share it with other government agencies and citizens.

  • 11:30am

    Presentation: Seeking the Intelligence in Threat Intelligence

    Aamir Lakhani
    Senior Security Strategist, FortiGuard Labs
    FortiGuard

    Threat intelligence is a buzz phrase taking the industry by storm. OEMs and vendors are offering threat intelligence services and products. What does it mean? Fortinet’s FortiGuard Advanced Research Labs detects, categorizes, and blocks thousands of threats every day.

    This talk will give insight into threat intelligence, key indicators about how to build a threat intelligence program and how to use threat intelligence in an actionable manner. We will look at the threat landscape and debunk fact from fiction on what threat intelligence can really accomplish.

  • 12:00pm

    Lunch: Table Topic Discussions

  • 1:15pm

    Presentation: Modern Incident Response Plans

    Matthew McCormack
    Chief Technical Officer, Global Public Sector
    RSA

    It is clear from just a cursory review of daily cyber breach news announcements that something is fundamentally flawed in the way companies secure digital assets. Intelligence-driven approaches that leverage Big Data are touted as the right strategy for detecting and stopping these advanced threats, but what does an operational intelligence-driven security program actually look like?

    This session describes three critical capabilities of a next generation security program — identity access management, security analytics and business context — and outlines ways to integrate these capabilities to provide in-depth defense that can identify and neutralize the threats of today and tomorrow.

  • 1:45pm

    Presentation: Virtualization and Security in the Modern Data Center

    Bob Lewinski
    Regional Technical Leader
    Trend Micro

    This session is a must for any organization looking to simplify and take charge of security in a dynamic data center. The focus will be on how to maximize your current virtualization investment and minimize capital and operating costs by leveraging VMware Security APIs (including NSX) to deliver agentless security at the hypervisor level.

    The session will detail ways that deep security can help you secure various cloud implementations from a single console. At the end of the session, you will have a clear understanding of deep security modules, with an emphasis on delivering agentless security, which includes anti-malware, web and file reputation, intrusion prevention, vulnerability shielding, and integrity monitoring.

    The session will also touch on regulatory compliance and economies of scale, and highlight infrastructure integration.

  • 2:15pm

    Panel: Where Do You Focus Your Cybersecurity Efforts?

    Paul Bivian
    CISO
    City of Chicago
    Ricardo Lafosse
    CISO
    Cook County, Ill.
    Bob Lewinski
    Regional Technical Leader
    Trend Micro
    Matthew McCormack
    Chief Technical Officer, Global Public Sector
    RSA
    August Neverman
    CIO & CISO
    Brown County, Wis.

    State and Local government agencies are data-rich targets, with limited resources. The panel will discuss the value of adding security controls to your data and other approaches for keeping government tech assets safe.

  • 3:00pm

    Wrap-Up

Learn from these experts! Register Now

Latest From This Event

Close

Become an Insider

Unlock white papers, personalized recommendations and other premium content for an in-depth look at evolving IT