ICS and Cybersecurity’s Critical Path

  Presented by NebraskaCERT

Industrial Controls Systems are increasingly vulnerable to attack. Organizational budgets don’t always allow for the full replacement of operational technology (OT) or building automation management (BAM) equipment that was initially purchased on a longer lifecycle than most typical IT purchases. Security is becoming paramount to ensuring access to critical systems and information and continues to be an exploitable risk in organizations, even during a pandemic, due to ransomware, phishing, and poor asset management techniques. Strategic security that is aligned with your organization needs to be balanced with the budget, risk, and organizational culture.

How do organizations implement critical security controls while still supporting the goals of production, user experience, and efficiency? When buildings are designed and built, and the building administration systems are put into place, how does this impact the risk of healthcare, manufacturing, or financial organization? Are those systems part of the cybersecurity risk analysis?

During this presentation, attendees will review best practices on both sides of the ICS security and IT security continuum. In addition, a simple approach that focuses on the fundamentals of security to reduce risk in these environments is presented. Attendees will walk away from this workshop with actionable knowledge on how to facilitate the conversation as to how OT/BAM security and IT security must work together to align risk with cost in most environments. 

Presenter: Matt Morton • Board Member for NebraskaCERT

Infoblox Threat Intelligence Report: July – September 2020

  Presented by Infoblox

This session will dive into recent Threat Intelligence Research including new malware variants and trends that were prominent over the July-September 2020 timeframe. We will examine specific Ransomware, Infostealers, Trojans, and RATS! attacks that surfaced over the last 90 days. Discover tips to improve your defenses and defeat these types of treats.

The Number One Challenge In The Digital Transformation to the Cloud – You

  Presented by Check Point

Using public clouds for enterprise datacenters is now mainstream; the advantages are significant and the gained agility undisputable. However, the number of services and options being offered is daunting. With these choices come consequences; one misconfiguration can put your entire organization at risk…or worse.

Another reality you will face as you scale is the challenge of using a ‘one-size-fits-all’ interface. Imagine scrolling through lists of assets when the numbers are in the hundreds or even thousands. Think about trying to find a misconfigured or exposed S3 bucket when you have thousands; it’s like finding a needle in a stack of needles.

If you’re like most enterprises, you have a resource gap and don’t have the experienced, trained security professionals maintaining your cloud environment(s). This gap exacerbates risks. The cloud environments available today are extremely comprehensive and powerful, but in unskilled hands, one fat-finger can have dire consequences. As you implement ephemeral cloud-native services like Lambda functions and other cloud-native platform components, new challenges will arise when conducting threat-detection and attribution.

In this session, you’ll see your future and what to expect managing your public cloud-based datacenter. You’ll learn why Gartner says, “Through 2023, at least 99% of cloud security failures will be the customer’s fault.” We will highlight the top challenges you will face and show you what you should prepare for before you scale. We will also detail recommended best practices for securing and maintaining compliance in your public cloud data center.

Cyber AI and Geopolitics: Managing Tomorrow’s Cyber Risk

  Presented by Darktrace

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher. Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and Americas CISO, JR Tietsort to discuss this new era of cyber-threat and how Cyber AI can help defenders regain the upper hand.

This speaking session will include a Q&A with our experts, and explore:

  • How nation-state attacks are changing
  • How organizations can respond to the classic balance of security and productivity
  • How organizational maturity in risk management is maintained whilst ensuring cyber defense

The Rise of the Cyber Attack, How Can We Protect Ourselves?

  Presented by Kenneth A. Schmutz • Supervisory Special Agent, FBI

This presentation will highlight the rise in cyber-attacks coming from criminals, nation state actors, insiders, and terrorists. These attacks include ransomware, business email compromise, data theft, and theft of intellectual property. Supervisory Special Agent Schmutz will discuss ways in which these cyber adversaries are getting into our systems including current investigations being worked by the FBI’s Omaha Cyber Task Force. He will finish by providing ideas and resources that companies have used to reduce their vulnerability to these attacks.

Supervisory Special Agent (SSA) Schmutz graduated from Utah State University with a Bachelors and Masters degree in Information Systems. He worked for 13 years in the private sector for IT companies prior to joining the FBI in 2004. SSA Schmutz investigated computer intrusions his whole career which included his time in Seattle, Chicago and the FBI’s Cyber Division in Washington DC where he focused on cyber threats to the critical infrastructure. In August of 2012, he was transferred to the Omaha Field Division where he serves as the supervisor of the FBI’s Cyber Task Force (CTF).

Responsible Administration: The Admin Insider (Threat)

  Presented by One Identity

System Administrators are critical people to every organization. They design, build, and maintain all the parts and pieces that enable business, whether that’s retail, healthcare, or even a government agency. Ensuring sysadmin tasks are performed as securely as possible without hampering their ability to keep our business running is a delicate balance. These “insiders” not only know how the systems operate but have the credentials and privileges to operate them.

In this session, we will demonstrate an Active Directory breach using pass-the-hash and discuss ways to enable the System Administrators to operate in a way that not only protects the business from threats but also enables them to perform the intricate tasks they accomplish daily to keep business flowing under the covers.

Hot Topics in ComPriSec

  Presented by INTERFACE Advisory Council

Compliance, Privacy, and Security (ComPriSec) Professionals struggle in their role with competing priorities and responsibilities. This panel of ComPriSec industry experts defines each role, provides management strategies, and explains solutions for common challenges. Any gaps are room for lawsuits, breaches, and leaked data. Here you will learn how to bridge the new normal worlds of ComPriSec.

Moderated by:
Ron Woerner, CISSP, CISM • Technology Professor for the College of Science and Technology, Bellevue University

Panelists:
Rob LaMagna-Reiter, CISSP, CISM, CDPSE, CHP, PCIP, Sec+ • Chief Information Security Officer, FNTS
Lisa McKee, CISA, CDPSE, PCIP, MSSL • Senior Manager Security and Privacy Solutions, Protiviti
Matt Morton, HCISPP, CISM, CISSP, CGEIT • Board Member for NebraskaCERT

Master the Edge: How to Achieve Context-Aware, Zero Trust Network Access

  Presented by Aruba & Structured

Have you been tasked with implementing Zero Trust Network Access but are unsure of how to go about it? Are you confused about how to achieve “minimum access”? Are you struggling with employing “continuous adaptive risk & trust assessment” on your network? If so, attend this session. Learn how to deploy an open, multi-vendor Enterprise security framework that gives security and IT teams an integrated way to gain visibility, control, and advanced threat defense. See how security prioritization and machine learning helps organizations leverage existing third-party solutions to better protect investments and implement proactive risk controls.

Cyber AI and Geopolitics: Managing Tomorrow’s Cyber Risk

  Presented by Darktrace

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher. Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and Americas CISO, JR Tietsort to discuss this new era of cyber-threat and how Cyber AI can help defenders regain the upper hand.

This speaking session will include a Q&A with our experts, and explore:

  • How nation-state attacks are changing
  • How organizations can respond to the classic balance of security and productivity
  • How organizational maturity in risk management is maintained whilst ensuring cyber defense

The Top 10 List: Ransomware Preparation

  Presented by Tonaquint Data Center

Carl Wilkins, Director of Cloud Operations for Tonaquint Data Centers provides a Top 10 list of things you can do to mitigate the risk of Ransomware affecting you. Topics will include how to protect your data, how to protect your systems and infrastructure, and situations to be aware of that might indicate the presence of Ransomware in your environment.