Agenda - Institute of Internal Auditors › chicago › About › Documents › IIA...Title...

2
Day 1 Keynote Law Enforcement Key Note Session 1 Security. Risks. Compliance. How can third party assurance help your business drive efficiencies and build trust in the market? * Jason Lipschultz, BDO Management Track Technical Track Session 2 Maturing Your Data Security Program * Angela Fitzpatrick & Keith Henkell, Meditology Services DNS Filtering: The Missing Security Control * John Bambenek, ThreatSTOP Lunch Session 3 This isn't the Pen Test You're Looking For: Understanding the Appropriate Assessment to Reduce Risk * Douglas Logan, Cyber Ninjas Beginning DFIR: Fun with Forensics * Lisa Wallace, MicroSolved Session 4 The Danger Within: Another Look at Insider Threats * Jeremy Wittkop, InteliSecure Exploring the Mobile Ecosystem: How to Prepare for a Mobile Application Assessment * Brandyn Fisher, The Mako Group Session 5 Cybersecurity Third Party Risk Management. It’s like Spiderman vs the Sinister Six * Jason Torres, Rush University Medical Center * Anders Norremo, ThirdPartyTrust Evolution of Magecart: The Dawn of Web-Skimming * Steve Ginty, RiskIQ Session 6 Inside Out Security: Building Castles not Warehouses * Alyssa Miller, CDW Short links: Security blown to bits * Matt Findlay , FRSecure

Transcript of Agenda - Institute of Internal Auditors › chicago › About › Documents › IIA...Title...

Page 1: Agenda - Institute of Internal Auditors › chicago › About › Documents › IIA...Title Microsoft PowerPoint - 6th Annual Hacking & Cybersecurity Conference IIA-ISACA Chicago -

Day 1

Keynote Law Enforcement Key Note

Session 1 Security. Risks. Compliance. How can third party assurance help your business drive efficiencies and build trust in the market? * Jason Lipschultz, BDO

Management Track Technical Track

Session 2 Maturing Your Data Security Program * Angela Fitzpatrick & Keith Henkell, Meditology Services

DNS Filtering: The Missing Security Control* John Bambenek, ThreatSTOP

Lunch

Session 3This isn't the Pen Test You're Looking For: Understanding the Appropriate Assessment to Reduce Risk* Douglas Logan, Cyber Ninjas

Beginning DFIR: Fun with Forensics* Lisa Wallace, MicroSolved

Session 4 The Danger Within: Another Look at Insider Threats* Jeremy Wittkop, InteliSecure

Exploring the Mobile Ecosystem: How to Prepare for a Mobile Application Assessment* Brandyn Fisher, The Mako Group

Session 5Cybersecurity Third Party Risk Management. It’s like Spiderman vs the Sinister Six* Jason Torres, Rush University Medical Center* Anders Norremo, ThirdPartyTrust

Evolution of Magecart: The Dawn of Web-Skimming* Steve Ginty, RiskIQ

Session 6 Inside Out Security: Building Castles not Warehouses* Alyssa Miller, CDW

Short links: Security blown to bits* Matt Findlay , FRSecure

Page 2: Agenda - Institute of Internal Auditors › chicago › About › Documents › IIA...Title Microsoft PowerPoint - 6th Annual Hacking & Cybersecurity Conference IIA-ISACA Chicago -

Day 2

Keynote CISO Panel – What do CISO’s worry about

Session 1 Developing a Unified Security Framework – Insider Risk and Data Protection* Homayun Yaqub, Forcepoint

Management Track Technical Track

Session 2 The Clouds Are Out To Get Me* John Strand, Blackhills Infosec

Hunting as necessity for survival* Fayyaz Rajpari, Optiv

Lunch

Session 3Not a Matter of If: Preparing Your Team and Your Organization for Disaster Recovery and Business Continuity* Robert Kirley, iDiscovery Solutions

Threat Detection Simulation with Infocyte* Paul Hinds, PwC

Session 4Building an Effective Vulnerability Management Program to Improve Cybersecurity and Decrease Cyber Risk* Kenneth Zoline, Baker Tilly Virchow Krause LLP

Metric Driven DevelopmentCharles Herring, WitFoo

Session 5 The State of the Endpoint* Kevin Thompson, Absolute

The Much Anticipated ISO 27701 and What You Need To KnowDebbie Zaller, Schellman

Session 6The Impacts of a Compromise Assessment on Mergers & Acquisitions* Ray Strubinger, VerSprite

A Panicked Response* Eric Jeffrey, IBM