Without security, technology services simply aren’t viable. That’s a fundamental IT truth in our hypermobile world — with workers (and sometimes the public too) needing access to government resources anywhere and anytime.
What do you need to know now to keep your organization’s data, networks, systems and users safe? Please join StateTech magazine as we peel back the layers needed for deep security, with experts focused on the unique infrastructure security demands of state and local governments.
We look forward to an open exchange of ideas between the speakers and the audience, so please register to take part in this complimentary event.
You will learn:
• About the cyberthreat landscape for state and local government.
• The elements critical to modern incident response plans.
• How to build and use a threat intelligence program.
• Ways to integrate agentless security into the software-defined data center.
Registration & Continental Breakfast
Welcome and Preview of the DayVanessa Jo RobertsEditorial DirectorStateTech Magazine
Keynote: 2015 State of SecuritySadik Al-AbdullaDirector, Security SolutionsCDW
Security breaches have been all over the news and full of startling statistics, such as "average length of penetration before detection >200 days." During this session, we will make sense of the hype, discuss the basics of root cause and attribution, and then move on to share findings from more than 3,000 security assessments.
The session will conclude with an exploration of industry accepted best practices for how to think about, architect and execute adaptive security for today's threat landscape.
Presentation: Cyberthreat Landscape for State and Local GovernmentKevin ThompsonThreat AnalystFireEye
This session will cover the importance of threat intelligence to state and local agencies. It will cover incident response, the need for strategic analysis and the latest threats to government organizations, delving into which vectors (web versus email) we are seeing targeting state and local organizations in the United States.
Panel: Sharing Threat IntelligencePaul BivianCISOCity of ChicagoRicardo LafosseCISOCook County, Ill.Aamir LakhaniSenior Security Strategist, FortiGuard LabsFortiGuardAugust NevermanCIO & CISOBrown County, Wis.Kevin ThompsonThreat AnalystFireEye
Sharing threat intelligence is critical for protecting government agencies and citizens alike. The panel will discuss how to make this intelligence actionable, what information should be shared and how to share it with other government agencies and citizens.
Presentation: Seeking the Intelligence in Threat IntelligenceAamir LakhaniSenior Security Strategist, FortiGuard LabsFortiGuard
Threat intelligence is a buzz phrase taking the industry by storm. OEMs and vendors are offering threat intelligence services and products. What does it mean? Fortinet’s FortiGuard Advanced Research Labs detects, categorizes, and blocks thousands of threats every day.
This talk will give insight into threat intelligence, key indicators about how to build a threat intelligence program and how to use threat intelligence in an actionable manner. We will look at the threat landscape and debunk fact from fiction on what threat intelligence can really accomplish.
Lunch: Table Topic Discussions
Presentation: Modern Incident Response PlansMatthew McCormackChief Technical Officer, Global Public SectorRSA
It is clear from just a cursory review of daily cyber breach news announcements that something is fundamentally flawed in the way companies secure digital assets. Intelligence-driven approaches that leverage Big Data are touted as the right strategy for detecting and stopping these advanced threats, but what does an operational intelligence-driven security program actually look like?
This session describes three critical capabilities of a next generation security program — identity access management, security analytics and business context — and outlines ways to integrate these capabilities to provide in-depth defense that can identify and neutralize the threats of today and tomorrow.
Presentation: Virtualization and Security in the Modern Data CenterBob LewinskiRegional Technical LeaderTrend Micro
This session is a must for any organization looking to simplify and take charge of security in a dynamic data center. The focus will be on how to maximize your current virtualization investment and minimize capital and operating costs by leveraging VMware Security APIs (including NSX) to deliver agentless security at the hypervisor level.
The session will detail ways that deep security can help you secure various cloud implementations from a single console. At the end of the session, you will have a clear understanding of deep security modules, with an emphasis on delivering agentless security, which includes anti-malware, web and file reputation, intrusion prevention, vulnerability shielding, and integrity monitoring.
The session will also touch on regulatory compliance and economies of scale, and highlight infrastructure integration.
Panel: Where Do You Focus Your Cybersecurity Efforts?Paul BivianCISOCity of ChicagoRicardo LafosseCISOCook County, Ill.Bob LewinskiRegional Technical LeaderTrend MicroMatthew McCormackChief Technical Officer, Global Public SectorRSAAugust NevermanCIO & CISOBrown County, Wis.
State and Local government agencies are data-rich targets, with limited resources. The panel will discuss the value of adding security controls to your data and other approaches for keeping government tech assets safe.