SIEM: Past, Present, and Future

  Presented by Fortinet

The IT environment is in constant evolution and it’s getting more complex. As a result, organizations are investing in integrating SOCs (Security Operation Center) to improve the visibility, detection, and automated remediation of security events. In this presentation, we will review the history of SIEM and discuss selection criteria that will help organizations analyzing different SIEM tools.

The Modern Datacenter

  Presented by Trend Micro

The Datacenter is the heart of the organization. So why would you treat it any different than the Data that is crucial to the survival of your organization’s reputation? Security requirements do not go away when you move part of your data center workloads to the cloud. Although most security controls can be easily applied to systems in the cloud, the weight of those controls and what constitutes an immediate concern versus a lower priority alert, can be different. We will discuss the need for advanced visibility to differentiate your cloud systems versus your internal data center with central visibility. With the dynamic nature of the cloud, and the flexibility of the modern data center, it is important to apply the same security controls but view the alerts differently depending on their origin.

A New Era of Data Protection: Converged DR and Backup

  Presented by Zerto

In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

  • The cost and business impact of downtime and data loss can be immense
  • Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters
  • Having a plan and process in place will help you mitigate the impact of an outage on your business.

In this presentation we will address the challenges, needs, strategies, and solutions.

Managing the Trio of Software, Security, and Data

  Presented by Keller Schroeder, Applications Solutions Group

During this session, hear two case studies of successful Enterprise Resource Planning (ERP) implementations, including how software, security, and data played parts in the solutions that incorporated modern usability for some less-than-tech-savvy users with:

  • Responsive designs
  • Multi-factor authentication
  • Role-based security
  • Data encryption
  • Centralized print management
  • Smart light bulbs
  • Internet of Things (IoT)
  • Real-time updates and notifications
  • Content Management
  • Business-to-Consumer (B2C) E-commerce
  • Search Engine Optimization (SEO)
  • Email and Blogging integration

The Human Firewall is on Fire

  Presented by Keller Schroeder, Infrastructure Solutions Group and Mimecast

91% of all cyber-attacks begin with email. Who has never experienced a targeted email spoofing/spear-phishing attack, or had to deal with recovering from a fraudulent wire transfer request? Email security invariable includes end user cyber security education along with a robust suite of email security tools to compliment the necessary defense in depth strategy to protect your company from reputational of financial loss.

Leveraging MITRE ATT&CK to Reduce the Cybersecurity Skills Gap

  Presented by Keller Schroeder, Infrastructure Solutions Group and Carbon Black

The Cybersecurity skills gap has plagued our industry for years, we are now starting to experience the adverse effects of this deficit. Leaving many of our organizations exposed to the evolving threat landscape, the skills gap is directly impacting us all.

Major Implications Discussed:

  • Employee Fatigue and Turnover of Understaffed Organizations
  • Undertrained Personnel leading to potential Missteps
  • Financial Implications of a Breach

The goal of this presentation is to develop understand of the problems we as a community are facing and develop a go-forward plan to reduce the existing skills gap in your organization.

Cyber Threats, Detection & Mitigation

  Presented by Casper Cromwell • FBI Special Agent

The FBI ranks cybercrime very high on its list of priorities. With the economic growth of Nashville, threats are increasing. Large health companies and public universities are some of the most common targets of cyber criminals. Join us for a thorough discussion regarding the landscape of cyber threats facing Nashville. Special Agent Cromwell will discuss the current cyber threatscape and preventative strategies. Also, you will learn more about the resources the FBI has available and how you can go about initiating contact.

NextGen BIA: It’s Not Just for Business Continuity Anymore!

  Presented by Megan Epperson • ACP National Board of Directors

The parade of discussions regarding the venerable concept of the BIA include streamlining the BIA, mechanizing the BIA, integrating the BIA with the Risk Assessment, and many others, including eliminating the BIA altogether as proposed by select new BCM methodologies. This presentation will describe a major expansion of the BIA across multiple risk disciplines supporting a fundamental business intelligence and requirements contribution to all the risk domains. This expanded BIA approach will incorporate various risk disciplines to include Information Security, Physical Security, Incident Management, Risk Management, and Operational Risk.