Upcoming Event: INTERFACE Portland March 8th
Upcoming Event: INTERFACE Arkansas March 22nd
Upcoming Event: INTERFACE Charlotte March 29th

Anatomy of a Breach: Postmortem

  Presented by Jeff Dover • Sr. Compliance Consultant, Legacy Health

This presentation centers around a breach case study. Specifically, the presentation focuses in depth on the lead up to a significant breach, the immediate response, the public response, the regulatory response, ongoing follow up, and the aftermath.

Jeff earned his JD from Willamette University in 2004 and his CHC designation in 2016. He has over three years of experience as a state regulator and six in the Medicare, Medicaid, and Commercial lines of business on both the payor and payee side. Jeff has taught undergraduate Healthcare Law, Regulation, Compliance, and Ethics since 2010.

Defend Yourself! The Art of Cyber Security?

  Presented by Jonathan Kimmitt • CISO, University of Tulsa

Why are there so many different kinds of martial arts in the world? The simple answer is because there are many different kinds of attackers. The techniques you deploy against an attacker in hand to hand combat is very different from if your attacker was on horseback. Cyber Security is very similar, where defense tactics may be different based on the attacker, risk, or the vulnerability.

In this interactive discussion, we will look at our organizations from a very old point of view, and ask some basic ‘self-defense’ questions.

Jonathan Kimmitt is a seasoned IT leader, currently serving as Chief IT Security Officer for the University of Tulsa. His primary responsibility is the development and execution of the University’s IT Security Initiative. Jonathan has 15 years of experience at TU in Information Services & Security Operations, and has been involved with all aspects of IT at the University. For the past several years, Jonathan has been focused on moving the campus forward in IT Security with an ever more arduous environment in higher education. With both the lack of funding and the increase in technical complexity, Jonathan’s expression of “Simple Security Works”, has been the founding principle of IT Security at the University.

Homeland Security Perspective: Building Cybersecurity Capacity and Capability

  Presented by Ronald Watters • Cyber Security Advisor, Office of Cybersecurity & Communications, Dept. of Homeland Security

Ron serves as the Region X (WA, OR, AK, ID) Cybersecurity Advisor for the Stakeholder Engagement and Cyber Infrastructure Resilience Division of the Office of Cybersecurity and Communications (CS&C) National Protection and Programs Directorate (NPPD). Based in Seattle, WA, he supports the Department of Homeland Security (DHS) mission of strengthening the security and resilience of the nation’s critical infrastructure.

Prior to joining DHS, Ron served 27 years with the U.S. Navy and Naval Reserve as a Submarine Sonar Technician and Diver. Finding not much use for a Submarine Sonar Technician in the Surface reserve, Ron utilized his talents as an Intelligence Analyst and was placed accordingly. Ron retired from the US Navy in 2007. During his active duty, Ron completed his Bachelor’s degree in Public Administration with Criminal Justice emphasis (Cum Laude). Ron received his two Master’s Degrees in Education (School Administration and Secondary Education) at Loyola Marymount University. He continued his education and achieved certification as a Microsoft Certified Systems Engineer and Microsoft Certified Trainer, in 1998 he was hired as the Computer science department chairman at Chaminade College Preparatory High School in West Hills, CA until he was recalled to Active duty following 9/11.

Upon his demobilization he was offered a position as the Deputy Information Systems Management Officer with the 4th Marine Corps recruiting District in New Cumberland, PA. He rose to the position of S-6 before leaving in 2009 to take a position as the Chief, Information Assurance Division, Directorate of Information Management Ft Irwin, CA. Ron remained in that positon until he left to become the Branch Manager of the Cybersecurity Branch of the Puget Sound Naval Shipyard in March of 2016. Ron interviewed and was hired as the Region X Cybersecurity advisor in June of 2017 and fills that position presently. Ron’s computer certifications are numerous including Microsoft Certified Systems Engineer (MCSE), Certified Novell Administrator (CNA), GIAC Security Leadership Certification (GSLC), CompTia Security+ CE, and Microsoft Certified Trainer (MCT). In addition to the professional certifications, Ron has been awarded numerous Commander’s Coins for excellence and received Two Commander’s Awards for his work at Fort Irwin.

Cyber Security: You Can Take Action

  Presented by Brigadier General Linda Medler (USAF, Retired) • CISO, Raytheon Missile Systems

Today’s Cyber Landscape, Who is Who at the Federal Level regarding Cyber activities, Some examples of the changing risk, and Some things folks can do to take action.

Linda R. Medler is the Chief Information Security Officer at Raytheon Missile Systems. Raytheon Company (NYSE: RTN), with 2016 sales of $24 billion and 63,000 employees worldwide, is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. Raytheon is headquartered in Waltham, Massachusetts.

In her current role, Medler is responsible for fostering business relationships and integrating information security technologies and best practices to achieve strategic business goals. She originally joined Raytheon in June 2015 as the director of Cyber for the RMS Advanced Missile Systems product line in Tucson, Arizona. In this role, she was responsible for synchronizing, testing and incorporating cyber initiatives and capability development across RMS products lines in accordance with Office of the Secretary of Defense guidance and directives.

Before joining Raytheon, Medler was president and CEO of LA Medler and Associates, LLC, providing cyber strategy consulting services to commercial clients and numerous Department of Defense customers and academic institutions. In 2014, she retired from the U.S. Air Force as a brigadier general and as director of Capability and Resource Integration for the United States Cyber Command. In this role, she orchestrated the development of the current DoD Cyber Mission Force strategy and resourcing plan.

Medler’s previous assignments included director of Communications and Networks for the Joint Staff, Joint Chiefs of Staff deputy CIO, chief of staff for Air Force Materiel Command, Secretary of Defense corporate fellow, and presidential communications officer at the White House Communications Agency. She commanded at the squadron, group and wing level, and deployed to Afghanistan to lead more than 100 coalition personnel responsible for fielding the Afghan National Army. In 2005, she commanded the 97th Air Expeditionary Group to provide humanitarian relief operations in the wake of Hurricane Katrina.

Medler currently sits on the National Board of Operation Homefront, a national philanthropic organization assisting wounded warriors and their families. She is a member of the Arizona Secretary of State’s Technology, Transparency and Commerce Council and a special advisor to the Arizona Cyber Threat Response Alliance. She is a board member of the United Way of Tucson and Southern Arizona, a member of the National Board of Advisors for the Eller College of Management at the University of Arizona, and a member of the Board of the Arizona State University Research Enterprise. She holds a bachelor’s degree in business management and management information systems from the University of Arkansas at Little Rock. She has also earned master degrees in business administration and management information systems from the University of Arizona, and in national strategic studies from the Naval War College.

Spending Your Time Where It Counts

  Presented by Kelli Burns • Chief Information Security Officer & Associate Vice President, Symetra

“As leaders, our job is to help build a foundation.” Join Kelli Burns, Chief Information Security Officer & Associate Vice President at Symetra- an insurance, benefits and retirement company, as she discusses why culture is the foundation for innovation. From Cybersecurity risks to regulatory compliance and day to day operations, learn how to factor the time to build a culture of engagement from one of Seattle’s best.

Kelli is a Graduate of the University of Montana with a Bachelor of Science in Management Information Systems. She holds her Certified Information Security Manager and Certified Information Systems Auditor certifications and held the ISO 27001 Implementer and Auditor certification in the past. Kelli has 10+ years of experience in IT Consulting and Security with the last four being focused on building an Information Security program at Symetra. Kelli oversees the Identity and Access Management, Incident Response, IT Risk Management, Disaster Recovery, Privacy and Vendor Information Security Oversight Programs. She leads a team of security professionals at Symetra, responsible for developing, maintaining, overseeing, and operating security tools, processes, and policies. Kelli oversees the protection of information assets via security event management, risk assessments, technology reviews and incident response. Kelli sits on the University of Montana Advisory Board to help build our next generation of security professionals.

FBI Cyber Task Force: Criminal Trends and New Tactics

  Presented by Adam Marre • Special Agent, Federal Bureau of Investigation

The FBI is the lead federal agency for investigating cyber-attacks by criminals, overseas adversaries, and terrorists.

Join Special Agent Marre for a discussion of current cyber-criminal trends the FBI is tracking locally, nationally, and globally. He will also present new methods and schemes criminals and state-sponsored actors are using to steal secrets, defraud victims, and make money.

Special Agent Adam Marre has been an FBI Special Agent for 11 years. Throughout his career, he has investigated a wide variety of criminal and national security cyber matters. He is currently assigned to the FBI Cyber Task Force in Salt Lake City and investigates criminally-motivated and national security based network intrusions.

Cyber Security: Time to Challenge the Status Quo

  Presented by Rich Fennessy • CEO, Kudelski Security, Inc.

This presentation will explore the current cyber security situation facing the world economy and will examine new approaches for challenging the status quo and reducing the quantity and negative impact of cyberattacks. As part of this discussion, we will feature Arizona’s newest cyber security solutions company (Kudelski Security) and investigate the rational for creating their new North American headquarters location in Phoenix, Arizona.

Protecting Wisconsin from the Cyber Threat

  Presented by Byron Franz • Special Agent, FBI

The theft of intellectual property or trade secret information may cost the U.S. between $300-$400 billion dollars a year and result in the net loss of millions of jobs. The protection of business secrets is therefore of great importance to our economy. This presentation will describe some of the cyber and insider threats to business secrets and suggest some possible mitigating actions. The presentation will also highlight the importance of working with the FBI and other law enforcement agencies to neutralize the threats to business and academia.

Byron Franz is a Special Agent of the Federal Bureau of Investigation (FBI) and has worked national security matters for over 20 years. He currently serves on FBI Milwaukee’s Cyber Squad, where his job is to raise awareness of cyber and insider threats to business, academia, and state/local governments. He holds a B.A. in Russian and a law degree, both from the University of Wisconsin-Madison.

Certain Measures For Uncertain Times: Matching Business Disruptions With Cyber Measures

  Presented by Val Mukherjee • Executive Director, Cyber Advisory Services for Ernst and Young

We are living in a very uncertain world, where every facet of business and society is subjected to disruptive trends. Digital technologies have not only given us amenities that has transformed the world around us, but they have also made information more accessible, at times to the wrong hands. While traditional enterprise information security has morphed in many ways to meet the current needs, there are too many moving parts around people, processes, and technology, with competing needs for attention and resources. This talk will discuss the various aspects of digital disruption and how businesses can elevate their cybersecurity posture to benefit from the digital innovation.

Valmiki (Val) is a globally recognized expert in cyber and cloud security industry with focus on innovation and collaboration to address the information security needs of the future. He is a Cyber Futurist, Diplomat and Evangelist who promotes international cooperation and collaboration on Trusted Cyber.

Val is considered an original thought leader in the domain of Cyber Peace and in 2014 established the Cyber Peace Alliance, a global think/do tank of cybersecurity and policy experts advancing the concept of a secure and trusted Cyberspace. In September 2015, Val founded the Cyber Future Foundation and its constituents including the Cyber Peace Alliance to take the initiative forward.

Val is known for his commitment to the information security community and is constantly engaged as a leader and contributor within many standards initiatives, security alliances and consortiums. Val is a leader in the Global Cloud Security Alliance community, founder of North Texas Regional Cloud Security Alliance Organization and also a member of NIST Standard Development Organization efforts.

Val is also one of the original SMEs of Cloud based Security as a Service domain and contributed directly to the growth and adoption of the domain through his involvement at the Cloud Security Alliance.

Val, in various progressive leadership roles, has served as a catalyst for many business and practices in the cybersecurity domain. Val is a visionary strategist who has helped leading global organizations with strategy & roadmap, cyber program management, and cyber transformation initiatives. He is a trusted advisor to the Boardroom, C-Suite and Executive owners of Cybersecurity, Cloud and Information Risk Management programs of several leading global organizations.

Specialties: Organization Building • Leadership Development in Cyber • International Relationships • Cybersecurity Subject Matter Expertise • Executive Strategy & Roadmap • Cyber Transformation Advisory • Policy Development

Cyber Security: A Path from FUD to Pragmatism

  Presented by Reid Stephan • Associate CIO, St. Luke’s Health System

Cyber security has never been a hotter topic, or had more executive attention and business focus. With that attention and focus has come significant fear, uncertainty, and doubt (FUD), creating a potentially confusing landscape. This presentation, which seeks to cut through vendor hype and incident driven overreactions, will outline a pragmatic approach to cyber security with the goal of providing ideas to improve security posture without misallocating or wasting resources.

Reid Stephan is the Associate CIO at St. Luke’s Health System and is responsible for the design, development, release and maintenance of technology systems and services for system wide operations. He has over 20 years of IT experience leading various teams, including 9 years leading HP’s global corporate IT security incident response program, and serving as St. Luke’s Chief Information Security Officer (CISO) prior to his current role. He holds a Bachelor of Management Information Systems from the University of Idaho and an MBA in Technology Management from the University of Phoenix. He is a HealthCare Information Security and Privacy Practitioner (HCISPP) and a CHIME Certified Healthcare (CHCIO) Eligible professional.