Add a Baracus to Your Implementations

  Presented by Lora McCoy • Regional Director, IIBA Americas Central

Stakeholders always approach you to proactively seek council on security, continuity and disaster recovery considerations for intended change, right? NO?! Very often, InfoSec is not considered (or downright avoided) when solutions are selected or defined. This can lead to significant delays, or even cancellation of change, which can become costly, frustrating and time consuming. It creates this viscous cycle of resistance to collaboration and mutual change enablement. Enter the Mr. T of the change world. BAs (Business Analysts) can leverage the BA discipline and associated techniques to not only ensure these often-unsung heroes of risk mitigation or (better yet) avoidance are engaged before implementation, but even enlist them as an actively consulted resource for technology change. (We really aren’t that scary…really) In this session, we will introduce the idea of the BA, how to leverage the value of such on your change efforts and how to champion it in your organization.

Save Money and Plan BEFORE a Disaster Strikes

  Presented by Daniel Hanttula • President of InfraGard Oklahoma

Millions of dollars are spent to build, furnish and staff a data center or IT-enabled facility, but how much is spent to protect it? Disaster Recovery usually only receives the funding it needs after an incident. However, there are many systems and services you can employ to inexpensively prepare for the inevitable which will also help you begin discussions for improving preparedness. Your organization can drastically improve physical security and disaster readiness. Daniel Hanttula is President of InfraGard Oklahoma, a former member of the MS-ISAC Business Continuity, Disaster Recovery and Cyber Exercise Workgroup, and the reason Oklahoma was included in CyberStorm V, the Department of Homeland Security’s (DHS) biennial exercise series. He will discuss how to put the spotlight back on your BCP-DR program to help gain funding and awareness for your program – no matter what condition your DR program is currently in.

Guide for Evaluating Service & Security of Cloud Service Providers

  Presented by Curtis Coleman • Director of Cybersecurity Program, Oklahoma Christian University

Cloud computing is rapidly transforming the IT landscape for small to medium-sized businesses, as well as non-profit organizations. Many data owners are showing strong interest in outsourced Cloud offerings that can help them reduce costs and increase enterprise agility. The Cloud services offer enormous economic benefits, but they also may pose significant potential risks in safeguarding information assets, and in complying with a myriad of regulations.

The audience take away from this talk is to provide CIOs, Directors, and Managers of businesses and organizations an ability to make pragmatic decisions about where and when to use Cloud solutions by outlining specific issues and security challenges that should be raised with hosting providers before selecting a vendor, or after the fact of selecting a provider, as well as highlight the ways the vendor might respond in any service RFP so that data owners might conduct business in the Cloud with confidence. This talk will provide a questionnaire and security assessment resources based on Cloud Security Alliance recommendations and industry standards.

For over fifteen years, Coleman led the cybersecurity department at Seagate, a large multi-national digital storage manufacturing company. In that role he managed the efforts to implement cybersecurity policies, practices, and technology to insure the protection of Seagate’s data and systems. He also has served on advisory boards for major corporations including Intel, Oracle, and Salesforce. Coleman holds multiple cybersecurity certifications including Certified Information Systems Security Professional and Certified Information Security Manager. He speaks at cybersecurity conferences all across the country and was listed among the Top 150 Security Executive Rankings for 2012 through 2017.

The Unconscious Bias: How is it Holding You and Your Team Back?

  Presented by  Oklahoma Women In Technology

Workplace diversity is proven to increase productivity and company profit. However, studies show that our unconscious bias prevents from achieving diverse teams and more importantly, inclusive teams.

There’s been plenty of talk about workplace diversity in recent years, but less evidence of progress, particularly when you examine leadership ranks. It requires changing the mindsets of large groups of people, some of whom may not realize anything’s wrong with the status quo. Before you can begin improving equality at work, however, you need to become aware of and confront the unconscious bias at your company. We all have bias. If we don’t acknowledge it, we can’t do anything about it.

Join our panel discussion as we explore how unconscious is holding us back in work and preventing us from obtaining the high achieving teams we desire.

  • Brandy Semore • Co-Founder and Advisory Board Director – OK Women in Technology
  • Mike Wood • Vice President& Information Security Officer, INTEGRIS Health
  • Dr. W. Christopher Hudson • Vice President, Hudson & Associates Consulting
  • Gene Hopper • Founder & Partner, Mettise Group

Regulations, Lawsuits and Employment in the Global Online Environment

  Presented by Carrie L. Palmer, Esq. •Managing Member, Resolution Legal Group

Lawmakers, corporations and employees battle to balance individual interests in online personas with the inherent security need to protect private personal and corporate data being used for targeted marketing in unparalleled ways. We will traverse the increasing body of enacted and pending privacy and security legislation, protecting corporate and client data from inside (employee) threats and consider the opportunity for unprecedented litigation arising from this new collection of regulations.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Active Directory Security: Early Stage Attack Activities to Watch For

  Presented by STEALTHbits Technologies

Attackers have demonstrated a consistent and ongoing ability to obtain access to workstations inside the network boundary through phishing and other web and email attacks. From here, attackers set their sights on gaining control of Active Directory as a means to an end; compromising Active Directory is an easy way to gain access to all critical corporate data and resources. Darin will discuss two early stage attack activities: LDAP reconnaissance and Password Spraying—that allow attackers to move laterally inside your AD environment. Detection strategies and mitigation steps will also be explained.

Digital Extortion & Trend Micro Security Predictions for 2019

  Presented by Trend Micro

Digital extortion has increasingly become cybercriminals’ first and foremost money-making modus operandi. It’s mostly due to ransomware —cybercriminals’ currently most popular weapon of choice, helping them in extorting cash from users all over the world and in hitting big businesses and organizations. This session provides insight from Trend Micro Research’s 2019 Security Predictions on the current threat landscape.