Illuminating Behavioral Patterns to Assist Technology for Insider Threats

  Presented by Vanguard Infrastructures & HPE

Today, intellectual property theft is responsible for the greatest transfer of wealth among the countries of the world and frequently involves utilizing the company Insider. The security of the company is every employees’ responsibility. Technological innovations in Machine Learning can identify both the human and machine insider threat. In addition, employees must be educated as to what to look for when looking for the Insider Threat. Sensitizing your employees to scenario indicators, elicitation techniques involving behavioral manipulation, and the other principles can create a security force multiplication that will provide greater protection for your company. Vanguard Infrastructures is presenting information and strategies to incorporate the eyes and ears of your employees in the hunt for the insider.

Current Developments in Cybersecurity Litigation

  Presented by Brad Frazer • IT Lawyer at Hawley Troxell

Despite enterprise use of best IT and security practices, routine deployment of software patches and widespread engagement of consultants and outside experts, hacks still occur—regularly. There appear to be no perfect solutions to enterprise network security, given the breadth of the hackers’ skill sets and the value to them of that which they seek: the PII, PHI and IP that resides on your or your cloud host’s servers. We have learned through sad experience that the real cost of a hack is in the remediation, which often comes only after the lawyers have gotten involved. Recent hacks have spawned much, much litigation, and there are lessons to be found in those court proceedings. This interactive session will offer a survey of recent data breach/cybersecurity litigation and present best practices that an enterprise CTO, CIO or CISO might take away from those cases.

Achieving Your Best ROI on Today’s 3rd Generation Security Solutions

  Presented by Fortinet

The old adage of having just a firewall, let alone a limited featured stateful firewall of the 1st Generation of Security Solution, does not achieve a high enough Security posture to mitigate your Risk. Today, we are past our 2nd Generation of Point solution, where “Defense In-Depth” was the trend leading to 20+ individual solutions that gave you the illusion of protection because you had so many, or one solution was a “back-up” for another. Today, with our broad networks (expanded WIFI, SD-WAN, BYOD, IOT), we know that not to be the case. The more complex your Security environment and populated with multiple non-integrated vendor solutions, the more likely for there to be a chink in your protection for a hacker to exploit.

The goal is share with everyone how you can achieve the best ROI by implementing today’s 3rd Generation of Security Solution, where internal segments, points of inspection and simplification of point-solutions are key features to the Integrated Security Fabric which all leads to Automation. Thus improving your Security Posture, Simplifying and Reducing the number of Solutions needed, and all why doing this at internal LAN network speeds, because as many Network Admins know, Slow is Broken.

Leveraging AI to Defend Against Insider Threats in Your Digital Landscape

  Presented by Vanguard Infrastructures & HPE

The single largest vulnerability to a company’s intellectual property (IP) is their employee or the trusted insider; the person with the keys to the kingdom. However, recent media and government disclosures have expanded this threat to include machine compromises installed during manufacturing. So, the threat could come from the trusted insider or the machine an unwitting employee is utilizing. Too few companies have a strategy to adequately combat these vulnerabilities, mainly due to a lack of knowledge the events are taking place. Vanguard Infrastructures presents a strategy that marries observed human behaviors, demeanors, actions, etc., with artificial intelligence and machine learning to assist companies by providing data and creating visibility into network events that might be a threat to the company. This presentation’s goal is to put more power into the hands of the company to protect their IP, identify potential problem behaviors of trusted employees and machines, and assist the company in ensuring their future.

Moderator:

  • Troy Cooper • Vanguard Infrastructures CEO Co-Founder

Panel Experts:

  • Vijay Richard • Vanguard Infrastructures Exec VP Co-Founder
  • Chris Kaufman • Vanguard Infrastructures Chief AI Strategist
  • Ann Hinkle • Vanguard Infrastructure Chief of Security Services
  • Scott Olsen • HPE Enterprise Architect

A Look at Grand Rapids IT/Cyber Security Networking, Growth, and Education

  Presented by Andrew Rozema • Department Head at Grand Rapids community College Computer Information Systems Department

Join us for a discussion regarding the various Associations, groups, and GRCC, which afford Grand Rapidians many educational and networking opportunities to advance themselves and their careers. As Western Michigan continues to grow, there are many ways that you can advance your career and benefit from. Bring your questions to set yourself up for career success!

Andrew Rozema is the department head of the Grand Rapids Community College Computer Information Systems department, an Assistant Professor, and the director of the Grand Rapids Community College Center for Cybersecurity Studies. Prof. Rozema led GRCC’s efforts to earn the NSA DHS Center of Academic Excellence designation, and now mentors and reviews other institutions as they do the same.
After 20 years in various IT, security, and managerial roles in industry, Prof. Rozema focused his attention on educating the next generation of IT and cybersecurity professionals.

As an educator Prof. Rozema teaches cybersecurity related courses for Grand Rapids Community College, the ISC2 as well as serving as a mentor for students with the SANS Institute and as an instructor for the ISC2.

Prof. Rozema holds a Bachelor of Science in Information Assurance and Security from Capella University, and a Master of Computer Information Systems with a focus on Security from Boston University. Prof. Rozema has done postgraduate work with the SANS Technology Institute and is currently a student in the interdisciplinary Ph.D. program at the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University.

Project Management for Non-Project Managers

  Presented by Jeff Kissinger • President, Western Michigan Chapter of PMI and Senior Project Manager of Grand Rapids Community College

Project management principles are applicable to any business or profession where change is necessary to grow and survive. This interactive and entertaining presentation is an overview of the key project management terms, knowledge areas, and processes that are detailed in the Project Management Institute’s A Guide to the Project Management Body of Knowledge (PMBOK Guide). Attendees will learn how to apply project management principles to their professions, so they can better implement projects and other change initiatives more successfully.

Preparing for the California Consumer Privacy Act (CCPA)

  Presented by Norbert F. Kugele, Esq., CIPP

California’s new Consumer Privacy Act will go into effect on January 1, 2020, giving California residents new rights relating to their personal data—even when the data is held by organizations outside of California. In this session, we’ll cover from a legal perspective the obligations the CCPA puts on organizations and the steps organizations need to take to comply.

What I Wish I Knew BEFORE I Moved to the Cloud

  Presented by CSA West Michigan

As more companies must interact with cloud to drive their business forward, more do so without truly understanding security and the long-term ramifications in doing so.

Join Aaron Bregg and Lloyd Guyout, of Cloud Security Alliance West Michigan Chapter, for an in-depth discussion. This session will talk about what things we knew before moving to the cloud. Bring your questions for this interactive discussion!

Integrating Physical Security Without Introducing New Vulnerabilities

  Presented by Jake Kuncaitis, CSSA • Project Manager, Riverview Service, Inc.

Today’s complex physical security and IoT environments are requiring increased cooperation from (internal and external) IT resources to maximize their potential. What steps can we take to ensure adding physical security at the edge does not increase core network vulnerabilities? Jake will share his expertise on IoT and answer your questions.