IT Summit - Spring
Monday-Tuesday, April 9-10, 2018
SynerComm's 16th Annual IT Conference at Historic Lambeau Field
Upcoming Sessions
Information Subject to Change
Click on a track to filter the results below
Keynote: InfoSec's Midlife Crisis [And What You Can Do About It]
Monday • 1:30PM - 2:25PM
• Room: Johnny Blood/Willie Davis Room
- Title
- InfoSec's Midlife Crisis [And What You Can Do About It]
- Abstract
- After 20 years of InfoSec & App Sec, it's clear that something is not working. We've been spending so much time & money we are still hit by a continuous stream of news and information about data losses and breaches positions the InfoSec industry in a unique situation. It also puts all of us security practitioners under the spotlight with everything to gain and lose. There was never a better time to take a deeper look into how we got here as an industry, what's working and what's not, and why it feels that we are failing. Obviously, we need to do something different, but what? How do we change the trajectory? Join us for a thought-provoking, disruptive view of our industry and what it means to your future as a risk and security professional.
- Speaker
- Tsion (TJ) Gonen Details
- Presented by
Test Drive: ForeScout - Protect the Network from the Endpoint with key CIS Top 20 basic and foundational Controls
Monday • 2:30PM - 3:20PM
• Room: Paul Hornung Room
- Title
- Test Drive: ForeScout - Protect the Network from the Endpoint with key CIS Top 20 basic and foundational Controls
- Abstract
- ForeScout will be used to demonstrate how to mitigate the evolution of the endpoint threats using key CIS Top 20 basic and foundational controls to identify and control risk related to all types of endpoints: corporate-owned devices, BYOD, COPE, and even IoT devices that pose particularly challenging problems as these devices do not support most conventional endpoint agents and tools, making them unusually difficult to detect and quarantine or remediate on connection to the network. We will review five discovery, control, and orchestration use cases: Asset Management, Device Compliance, Incident Response, Network Access Control, and Network Segmentation.
- Speaker
- Christopher Kudulis Details
- Presented by
Keynote: Playing the Never-Ending Game - Analogies from the NFL
Monday • 4:30PM - 5:15PM
• Room: Johnny Blood/Willie Davis Room
- Title
- Playing the Never-Ending Game - Analogies from the NFL
- Abstract
- In this keynote, Wayne Larrivee – the voice of the Green Bay Packers - will draw some insightful analogies of the challenges IT professionals have to deal with in a developing a winning Information Security program each year for a game that is played 24-hours per day/365-days a year to those of preparing a winning NFL team to compete each year.
- Speaker
- Wayne Larrivee Details
- Presented by
Keynote: Lessons from the Frontlines: 5 New Approaches for Cloud Security
Tuesday • 8:45AM - 9:30AM
• Room: Johnny Blood/Willie Davis Room
- Title
- Lessons from the Frontlines: 5 New Approaches for Cloud Security
- Abstract
- Organizations of all sizes are struggling on how to best move or build security controls into their public cloud deployments. These IaaS platforms and native services provide an entirely new sandbox to play in, but often create friction when risk professionals try to employ techniques or tools built for on-premises environments. Join us today where Tim will share insight from his time at AWS, and from the thousands of customers Barracuda has worked with, across all cloud providers, on a few critical sources of friction and how to move past them.
- Speaker
- Tim Jefferson Details
- Presented by
Keynote: Building, Improving, and Maturing Your ISP - What you need to know!
Tuesday • 9:30AM - 10:15AM
• Room: Johnny Blood/Willie Davis Room
- Title
- Building, Improving, and Maturing Your ISP - What you need to know!
- Abstract
SynerComm consultants will answer these questions using vetted methods, frameworks and metrics from actual customer success stories of them efficiently and effectively planning, executing, and measuring progress in their Information Security Programs.>
- Is my ISP effective?
- Do I have the right controls?
- Am I secure?
- How do I measure progress?
- Speaker
- Bill Curtis, Lisa Niles, Brian Judd, Marc Spindt Details
- Presented by
Addressing the Security Gap between IT and OT Resources
Tuesday • 10:30AM - 11:10AM
• Room: Johnny Blood/Willie Davis Room
- Title
- Addressing the Security Gap between IT and OT Resources
- Abstract
There is a significant difference, in the realm of security, when it comes to protecting IT (Information Technology) and OT (Operational Technology) assets.
This presentation will explain how ForeScout addresses both of these technology areas, with a single product, and uniform policies across the environment.
- Speaker
- Christopher Kudulis Details
- Presented by
5 Efficient Ways to Reduce Cybersecurity Risk Today
Tuesday • 10:30AM - 11:10AM
• Room: Paul Hornung Room
- Title
- 5 Efficient Ways to Reduce Cybersecurity Risk Today
- Abstract
- This session will provide specific and concrete action items that can help measurably reduce cybersecurity risk. We will discuss threats impacting organizations today highlighting statistics about cybersecurity weaknesses by industry. The highlight of this session will be revealing five key methods to effectively reduce cybersecurity risk that can be applied to organizations in any vertical and of any size.
- Speaker
- Dolly J. Krishnaswamy Details
- Presented by
- Presentation
- Download
The Problem of Security Agent Fatigue and What To Do About It
Tuesday • 10:30AM - 11:10AM
• Room: Bart Starr Room
- Title
- The Problem of Security Agent Fatigue and What To Do About It
- Abstract
The malware threatscape is constantly evolving, with new attacks being developed every day. Security software has likewise evolved to address this reality. Solutions that target emerging threats tend to be narrowly focused and require the addition of more traditional antivirus software from another vendor in order to provide complete protection. Stacking security agents from different vendors increases resource requirements on endpoints and adds complexity to security management.
Join this presentation to discuss how you we will address the causes and issues of agent fatigue and discuss how these issues can be addressed.
- Speaker
- Steve McIntyre Details
- Presented by
Dark Web 101: What Every Security Professional Should Know
Tuesday • 11:15AM - 11:55AM
• Room: Johnny Blood/Willie Davis Room
- Title
- Dark Web 101: What Every Security Professional Should Know
- Abstract
The Dark Web combined with Bitcoin is the perfect storm of capitalism where hackers are attempting to penetrate your organization in hopes of monetizing their efforts. One of the most difficult challenges for cybersecurity teams is to have visibility into what types of information has been exfiltrated from their specific organization and what to do should they find themselves targeted.
In this session, we'll cover the external threat intelligence landscape and more specifically the type of tools that are available to gain visibility into the dark web, how to dynamically update your existing defenses with the latest information from trusted sources, and how to take full advantage of this critical pillar in your cybersecurity program.
- Speaker
- Troy Dixler Details
- Presented by
How do you get ahead when you can't even keep up? Solving hard problems in the cloud era.
Tuesday • 11:15AM - 11:55AM
• Room: Paul Hornung Room
- Title
- How do you get ahead when you can't even keep up? Solving hard problems in the cloud era.
- Abstract
- Most people are satisfied if they can just keep up in this ever more complex world of technology but Scott Sneddon encourages you to be more ambitious and get ahead. In this session, he will outline a simple path to a secure and automated multicloud environment that enables you to take control and get ahead. The key is eradicating complexity and Scott will lead you through how you can solve the hard problems leaving you and your team to focus on business outcomes.
- Speaker
- Scott Sneddon Details
- Presented by
Removing the Fog from the Cloud
Tuesday • 11:15AM - 11:55AM
• Room: Bart Starr Room
- Title
- Removing the Fog from the Cloud
- Abstract
- The past year has proved that companies using cloud-based infrastructure are just as vulnerable, even more so, than companies with traditional on-premise security solutions and architectures. While we've seen many headline making breaches like Tesla and Uber, these haven't led to a clear and defined strategy for protecting cloud-based applications and assets. The only consistent trend is that everyone is doing things differently when it comes to cloud security. This session will focus on some of the most recent trends, common oversights and missed opportunities for customers that are navigating their own unique efforts to transition to the cloud.
- Speaker
- Katie O'Shea Details
- Presented by
A Risk Adaptive Approach to Data Protection
Tuesday • 1:30PM - 2:10PM
• Room: Johnny Blood/Willie Davis Room
- Title
- A Risk Adaptive Approach to Data Protection
- Abstract
- Every IT security department's job, to protect data, has become more challenging as the security perimeter has dissolved with the adoption of cloud applications. The traditional threat-centric approach is to apply rigid policies to a dynamic environment and decide what is good or bad without context. This black and white approach results in frustrated users and overwhelmed admins. The reality is, everybody operates in the grey. Join us as we discuss a new human-centric approach to security, which considers the context of user behavior and adapts appropriately to help security teams make better decisions. We will explore how an effective data security system should cut through the noise of alerts and provide early warning signals to prevent the loss of important data.
- Speaker
- Bharath Vasudevan Details
- Presented by
How do you defend what you cant see? A10 can help shine a light into the dark places of your network by best of breed SSL Decryption and Hybrid DDOS protection.
Tuesday • 1:30PM - 2:10PM
• Room: Paul Hornung Room
- Title
- How do you defend what you cant see? A10 can help shine a light into the dark places of your network by best of breed SSL Decryption and Hybrid DDOS protection.
- Abstract
- Nextgen firewalls, IPS, and DLP do not work unless the traffic is decrypted. SSL & TLS based attacks are on the rise however the exercise of decrypting that traffic is laborious especially as key sizes increase. A lot of companies are decrypting SSL traffic coming into their network with ADCs, but not many of them are looking at the SSL traffic going out. How can you leverage a platform to help fill in the gaps in your DDOS strategy.
- Speaker
- Mike Repp Details
- Presented by
Closing Point Solution Gaps via the Pulse Secure-FortiFabric - 2018 Overview
Tuesday • 1:30PM - 2:10PM
• Room: Bart Starr Room
- Title
- Closing Point Solution Gaps via the Pulse Secure-FortiFabric - 2018 Overview
- Abstract
Can Enterprise Level Security integration be realized cost-effectively by business of all sizes-scale? How can disparate point solutions and investments be aligned in real time to better effect?
In this presentation, Pulse Secure's America's Director of Cybersecurity Solutions' Strategy Jim Hebler provides an overview of Pulse's alignment within Fortinet's FortiFabric integration.
Whether provided onsite for internal implementation and integration - or aligned within a hybrid-driven Managed Security Service - the Pulse Secure-Fortifabric approach - driven by the certified professionals at partners like Synercomm - is the next-steps, best-in-science approach required to manage the mobility and device onslaught enabled by the Digital Revolution.
- Speaker
- Jim Hebler Details
- Presented by
(ISP 1 of 3) Information Security Program Management
Tuesday • 2:15PM - 2:40PM
• Room: Johnny Blood/Willie Davis Room
- Title
- (ISP 1 of 3) Information Security Program Management
- Abstract
- To be effective at defining and deploying a strategy you must understand the rules (customers, frameworks, ISMS). This session will explore the elements necessary to define, assess, improve, & mature your information security program. Start with the basic blocking and tackling and the rest will become evident.
- Speaker
- Bill Curtis Details
- Presented by
- Presentation
- Download
Putting the 'Sec' in DevOps: Maturing SDLC Security
Tuesday • 2:15PM - 2:40PM
• Room: Paul Hornung Room
- Title
- Putting the 'Sec' in DevOps: Maturing SDLC Security
- Abstract
- Static code review, dynamic code review, API security. Do not wait until your applications are deployed to start testing security. In this session will be present topics and concepts to make security an integral part your organization's software development culture and operation. Join us to learn how DevSecOps can be applied to drive security maturity in your software development life cycle.
- Speaker
- Bill Kiley Details
- Presented by
- Presentation
- Download
Adversary Simulation: Combining the Best of Audit and Penetration Testing
Tuesday • 2:15PM - 2:40PM
• Room: Bart Starr Room
- Title
- Adversary Simulation: Combining the Best of Audit and Penetration Testing
- Abstract
- In this session on we will define adversary simulation, its benefits, and why you should be doing them. Using SynerComm Playbooks, you can gain a better understanding of security risks against known adversary behavior, for planning security improvements, and verifying defenses work as expected.
- Speaker
- Brian Judd Details
- Presented by
- Presentation
- Download
(ISP 2 of 3) Determining the framework requirements, the recommended controls, implementation roadmaps
Tuesday • 2:45PM - 3:10PM
• Room: Johnny Blood/Willie Davis Room
- Title
- (ISP 2 of 3) Determining the framework requirements, the recommended controls, implementation roadmaps
- Abstract
- This session is to discuss determining the correct control, doing a gap assessment vs what you already have, implementation roadmaps and monitor for controls effectiveness.
- Speaker
- Lisa Niles Details
- Presented by
- Presentation
- Download
Oohs and AWS: Wow your organization with Cloud Success!
Tuesday • 2:45PM - 3:10PM
• Room: Paul Hornung Room
- Title
- Oohs and AWS: Wow your organization with Cloud Success!
- Abstract
- Amazon Web Services continues to grow in popularity and many organizations are benefitting from securely operating cloud services. While every organization hopes they will benefit from utilizing the "Cloud," hope is not a strategy. Let's discuss together a checklist for success to make sure yours is one of those organizations who do benefit from the cloud!
- Speaker
- Aaron Howell Details
- Presented by
- Presentation
- Download
Risk Assessment: Identify and Prioritize Information System Risks
Tuesday • 2:45PM - 3:10PM
• Room: Bart Starr Room
- Title
- Risk Assessment: Identify and Prioritize Information System Risks
- Abstract
- Is your InfoSec Program making you more secure? Are you investing in the right areas? What are the right areas? It is difficult to manage what you do not understand and even more difficult to secure what you are not managing. This talk will explore SynerComm's methodology for completing a risk assessment. From defining scope to validating controls and assessing risk, SynerComm will walk your organization through the assessment of risk.
- Speaker
- Bill Curtis Details
- Presented by
- Presentation
- Download
(ISP 3 of 3) Validating your Information Security Program
Tuesday • 3:25PM - 3:50PM
• Room: Johnny Blood/Willie Davis Room
SOARing to New Heights: Augmenting SIEM with a more holistic approach
Tuesday • 3:25PM - 3:50PM
• Room: Paul Hornung Room
- Title
- SOARing to New Heights: Augmenting SIEM with a more holistic approach
- Abstract
- Security Incident and Event Management (SIEM) is a powerful tool in any organization but it is generally a reactive solution. Rounding out SIEM with Security Orchestration, Automation and Response (SOAR) adds a proactive and more holistic element to your security. Learn more about SOAR and how your organization can benefit from some of its tenets.
- Speaker
- Nate Ressel Details
- Presented by
- Presentation
- Download
Infamous Breaches: Lessons Learned
Tuesday • 3:25PM - 3:50PM
• Room: Bart Starr Room
- Title
- Infamous Breaches: Lessons Learned
- Abstract
- Data breaches in 2017 were worse than those in 2016, and the 2016 breaches were worse than 2015, and so on. Are information security programs learning the lessons from organizations in the news? Probably not, as many of the reported breaches are due to failures of basic information technology processes. Simply put, organizations are failing at fundamental security tasks which if implemented would lead to fewer breaches and greater security for their data. We will explore the basics, why they matter, and when failure to implement the basics led to breaches you may have heard of (and some you may not have). To be effective at defining and deploying a strategy you must understand the rules (customers, frameworks, ISMS). This session will explore the elements necessary to define, assess, improve, & mature your information security program. Start with the basic blocking and tackling and the rest will become evident.
- Speaker
- Bill Curtis Details
- Presented by