If You Don’t Protect the Key, Don’t Encrypt the Data

  Presented by nCipher Security

For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.

Birds of a Feather

  Presented by Advisory Council

Want an opportunity to discuss in small groups and learn from other attendees? Join your fellow attendees in informal round table discussions on a variety of IT topics. Several lunch tables will have designated topics. Look for the “Birds of a Feather” topic signs to join the conversation. Tables will be located just outside of the theaters.

Topics include:

  • Data Privacy
  • Business Continuity Planning
  • Cyber risk as an element of ERM
  • Agile
  • Transition to Cloud

Welcome to the New Age of Converged Data Protection

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won’t be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

Architecting the New SD-WAN Edge for the Cloud-first Enterprise

  Presented by Silver Peak

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

The Oprah Effect: Giving Away Free Cars To All Attendees

  Presented by Randy Stone • Director, Stroz Friedberg DFIR

How do you solve a crime when you have thousands of international witnesses that speak dozens of languages and each hold only tiny pieces of the puzzle? All the while, each hour that passes, could be costing an organization millions? This is the dilemma that IT security professionals face. A lot of lip service is given to IT security and incident response, but how much of your preparation is theory and how well practiced are you for when something happens? Join Randy Stone for a no-holds-barred discussion on the dos and don’ts of incident response, diving into his experience, first in law enforcement forensics and later as an incident response professional. Discover actionable ways to respond to incidents and avoid being blindsided should disaster strike.

Randy is a Director with the Stroz Friedberg Incident Response Team, investigating and managing intrusion and malware investigations worldwide. As a consultant for corporate Incident Response, Randy has had the opportunity to apply his forensic and security skills in the corporate environment for clients of Stroz Friedberg, Dell SecureWorks and IBM. Randy’s broad background in investigative techniques has helped him successfully complete difficult investigations in numerous engagements worldwide, including intrusions, malware infections, enterprise-wide ransomware and nation-state attacks.

Prior to his current work of corporate Incident Response, Randy was a police officer with the Wichita (Kansas) Police Department for 23 years, 12 of which were spent as a Detective in computer forensics and computer crime investigations. Randy was an original member of the Forensic Computer Crime Unit (FCCU) and designed the original team structure and mission. During his law enforcement career, he conducted computer forensic examinations for hundreds of cases including capital murder, the BTK serial killer, child exploitation, cyber stalking, financial crimes and numerous other cases. He has received awards from the FBI and the High Technology Crime Investigation Association (HTCIA) for his computer forensic investigations and has testified in Federal and State courts as a fact and expert witness.

Want to Advance Your Career? Start with Your Community

  Moderated by INTERFACE Kansas City Advisory Council

The old adage says that “it takes a village” and this is true, even for your career. Are you taking advantage of the community around you? Kansas City’s IT community is growing larger by the day with multiple associations/groups leading the way. With so many to choose from, how do you know what group is right for you? Join us for a conversation about the IT associations that make up the community. Discover what opportunities you may be missing, how you can be a part of KC’s IT community, and find new ways to grow as a professional.

Moderator:

  • Jeffery Wheat • Board Member; InfraGard

Panelists:

  • Donna Gomez • Security Risk and Compliance Analyst; Johnson County Government/President; ISACA Greater Kansas City Chapter
  • Raj Bhatia • VP of Marketing; Project Management Institute (PMI)
  • Naeem Babri • President; Information Systems Security Association (ISSA)
  • Marc Vasquez • President; International Association of Security Awareness Professional (IASAP)
  • Cheryl Cooper • Founder and President; Women in Security Mentors (WinS)

Welcome to the New Age of Converged Data Protection

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won’t be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

DoD Supply Chain Security: Stealing Stealth and the Nuclear Option

  Presented by Jeffrey L. Westeman • CSCP; VP of Programs, Air Capital Chapter of AFCEA

The integrated supply chains we rely upon to manufacture stealth aircraft, build submarines, and design new weapon platforms to protect our country are at risk from threat actors who exploit the connectivity of our global distribution systems to steal intellectual property, allowing nation states to modernize their economies, advance their military capabilities, and weaken U.S. global influence. We’ll review the history and reasoning behind the contractual requirements for cyber security at defense contractors as detailed in Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012, and outline steps your organization must take to adequately safeguard controlled, unclassified information (CUI) as specified by NIST800-171, “Protecting CUI in Nonfederal Information Systems and Organizations”. We’ll also discuss MITRE’s 2018 “Deliver Uncompromised” report and how the recommendations will reshape future defense acquisitions.

The presenter for this workshop is Jeffrey Westeman, CSCP, VP of Programs for Air Capital Chapter of AFCEA. Mr. Westeman has over 35 years of experience in information technology, security operations, supply chain management, and manufacturing. He has presented or provided training for various organizations, including Boeing Defense, Boeing Commercial, Spirit AeroSystems, Sikorsky, Cessna, Triumph Group, INFOR, APICS, Institute of Internal Auditors Association (IIA), and Wichita State University.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.