Tuesday, Oct. 31, 2023
Nebraska Innovation Campus Conference Center
2021 Transformation Drive, Lincoln, NE
8 a.m.-4 p.m.
Doors open at 7:30 a.m. for check-in
Register by Sept. 12 and SAVE!
After Sept. 12: |
Clicking on the Register Today button will take you away from the Southeast Community College website and to a secure third-party site for registration. |
In today’s world, we rely on technology and the Internet for a variety of transactions, communication and information – at home, in school and at the workplace. While we are familiar with the myriad of conveniences provided through Internet use, it is difficult to stay abreast of all the changes and the potential risks presented by the Internet. We are all “virtual neighbors” in cyberspace, and what we do, or don’t do, can affect many others.
The Nebraska Cyber Security Conference will assist in raising our awareness of cyber security and help in protecting all of us in cyberspace. If we do our part individually, we can have a tremendous positive impact collectively on our state’s cyber security.
This will be valuable time learning from skilled industry experts. The day will be filled with a variety of breakout sessions that will encompass different areas of information security and technology.
Time | Description |
---|---|
7:30 a.m. | Check-in |
8 a.m. | Opening Remarks |
8:45 a.m. | Break |
9 a.m. | First Session |
9:45 a.m. | Break |
10 a.m. | Second Session |
10:45 a.m. | Break |
11 a.m. | Third Session |
11:45 a.m. | Lunch |
1 p.m. | Keynote |
2 p.m. | Break |
2:15 p.m. | Fourth Session |
3 p.m. | Break |
3:15 p.m. | Fifth Session |
More information coming soon.
Michael A. Atkinson, Armis
Mike Atkinson is a veteran cybersecurity practitioner and speaker, currently serving
as the Principal Engineer for the Public Sector team at Armis. He lives in a far suburb
of Chicago and believes that when he dies, if he was bad, that he will end up at O'Hare
for his afterlife.
- Out of Sight, Out of Control: Asset Intelligence
Karla Carter, Bellevue University
Karla Carter is an Associate Professor of Cybersecurity in the College of Science
and Technology at Bellevue University, in Bellevue, NE. Armed with an MS in Cybersecurity,
Security+ and SANS Security Awareness Professional certifications, and drawing on
more years than she should admit to of information technology experience, she teaches
undergraduate and graduate courses in cybersecurity operations, social engineering
and human factors, security awareness, web security, technology ethics, and—in a plot
twist you didn't see coming—occasionally history and civics. Karla is a Member-At-Large
and Student Activities Committee Chair on the Nebraska Section IEEE executive committee,
as well as being involved with the IEEE Computer Society and ACM Committee on Professional
Ethics. She is curious, intense and irreverent and often sends coded messages through
her accessories.
- It's Okay to Walk Away
Jacob Charles, Bison Cloud Solutions
I've worked in the IT industry for more than eight years. I started my career as a
software engineer and quickly grew into leadership positions. I've had the great opportunity
to solve a variety of problems and grew a passion for security and infrastructure
automation. Last year I turned my passion into a product that everyone can benefit
from. I founded Bison Cloud Solutions in order to help others improve cloud security
and infrastructure automation.
- Cloud Security Awareness
Md Rashedul Hasan, University of Nebraska-Lincoln
Md Rashedul Hasan is a current student pursuing a Ph.D. in Computer Science at the
School of Computing at the University of Nebraska-Lincoln. He completed his Software
Engineering Bachelor's degree from Daffodil International University in the Fall of
2019. He also is an Information Security Researcher and OSINT expert. He has participated
in various training programs in Bangladesh, Singapore, Indonesia, Malaysia, and the
United States. Rashed is working as a graduate research assistant at the School of
Computing at UNL. His research involves Large Language model-based development of
efficient and resilient software systems.
- Impact of Open Source Intelligence of Offensive Security and Investigative Practices
Julie Paul, Check Point Software Technologies
For the past 28 years Julie has worked with security as a primary focus around the
world. She started her career in the USAF as a Communications Computer Operator. She
served at Kadena AB Okinawa Japan, Prince Sultan AB Saudi Arabia during Desert Shield
and was at Offutt AFB Nebraska. During her 11 ½ years of service she encountered some
interesting security issues such as the “Melissa” virus that took down the Air Combat
Command network. She was instrumental in developing a plan of attack and orchestrated
several security changes at Offutt AFB. Since leaving the Air Force, she has worked
in several extremely complex networks. At her last position as a Global Network Security
Architect she designed and created the network audit program. Julie has a Bachelor’s
degree in Networking and a Masters of Security Management degree from Bellevue University.
Currently she works at Check Point Software Technologies as the Security Engineering
Manager for the The Heartland area.
- The 90s Called and They Want Their Email Security Back!
Tim Pospisil
- Tatanka Panel Discussion
Dustin Thorne
- Tatanka Panel Discussion
Dana Turner
- Tatanka Panel Discussion
Ronald Woerner, Forrester Research
Ron Woerner, Senior Security and Risk Consultant at Forrester has more than 20 years
of IT and security experience as a noted consultant, keynote speaker, educator, blogger,
and podcaster. At Forrester, he focuses on building cybersecurity and Zero Trust programs
for large organizations and US Federal Agencies. Ron also teaches at Bellevue University,
an NSA Center of Academic Excellence. He is a member of the ISC2 North American Advisory
Committee, the RSA conference program committee, has numerous technology degrees,
and is passionate about building the next generation of cyber professionals.
- Zero Trust ≠ Zero Risk
Cloud Security Awareness
Jacob Charles, Bison Cloud Solutions
Prerequisite: Basic understanding of what the cloud is and the pay as you go pricing model.
Cloud security has unique challenges that need to be understood. This presentation provides an awareness of what security issues we are facing in the cloud, and provides a foundation on how to overcome these challenges.
Experience: Beginner, Intermediate
Cyber Tatanka Panel Discussion
Dana Turner, Dustin Thorne and Tim Pospisil
Moderator: Patrick Wright
Dana Turner, Dustin Thorne and Tim Pospisil will talk about outcomes and lessons learned from Cyber Tatanka.
Impact of Open Source Intelligence of Offensive Security and Investigative Practices
Md Rashedul Hasan, University of Nebraska-Lincoln
Prerequisite: Basic knowledge of information security
OSINT, or open source intelligence, is the practice of collecting information from published or otherwise publicly available sources. OSINT operations, whether practiced by IT security pros, malicious hackers or state-sanctioned intelligence operatives, use advanced techniques to search through the vast haystack of visible data to find the needles they're looking for to achieve their goals—and learn information that many don't realize is public. Open source in this context doesn't refer to the open source software movement, although many OSINT tools are open source; instead, it describes the public nature of the data being analyzed. See how OSINT is being utilized on cyber security practices on a regular basis and how counter intelligence are utilizing this to mine information for investigative purposes.
Experience: Beginner, Intermediate, Advanced
It's Okay to Walk Away
Karla Carter, Bellevue University
Prerequisites: An interest in the human factors of cybersecurity.
The ability to say "no" is an underemphasized yet critically important skill. This presentation delves into the psychological aspect of disagreeableness from the Five Factor Personality Model, linking it to key decision-making processes in cybersecurity. The talk identifies five principal areas where the power of "no" is most directly relevant: Social Engineering, Hardware and Software, Vendor Relationships, Product Development, and Data Collection. By focusing on real-world examples, this presentation will argue that being able to decline, defer, or walk away is not just a personal trait but a professional necessity. Note: Elephants not included. Honey Badgers sold separately.
Experience: Beginner, Intermediate, Advanced
Out of Sight, Out of Control: Asset Intelligence
Michael A. Atkinson, Armis
Prerequisites: An open mind and a willingness (among some of them, preferably) to ask questions and make this more of a discussion and less of a lecture.
We discuss the changed IT asset landscape and how asset intelligence is key to understanding what you have, where it is, and what vulnerabilities and other risks are associated with those assets. This is particularly important for those organizations in state government, local government and education as they never or nearly never know what kinds of unagentable devices are on their networks, much less where they are or what they're doing.
Experience: Beginner, Intermediate, Advanced
The 90s Called and They Want Their Email Security Back!
Julie Paul, Check Point Software Technologies
How to keep your business flowing and the importance of a modern API-based email security.
Experience: Beginner, Intermediate, Advanced
Zero Trust ≠ Zero Risk
Ronald Woerner, Forrester Research
Zero Trust is the buzzword of the 2020s. Vendors are selling it, the U.S. Federal Government requires it and organizations are implementing it. But what does it really mean (I mean really beyond the hype)? In this session, you’ll hear what Zero Trust really means in 2023 from a technical member of the organization that started it all. You’ll also learn why Zero Trust is needed to combat threats and how to accelerate your cybersecurity program. We’ll take a deep dive into the Zero Trust pillars (or components): Identity, Device, Workloads, Network, Data, Visibility and Analytics, and Orchestration and Automation. We’ll also talk about technologies that make Zero Trust possible and how to use them to accelerate your cybersecurity program such as Identity and Credential Access Management (ICAM), Policy Decision Points (PDP) and Policy Enforcement Points (PEP). Zero Trust ain’t going away so prepare yourself and your organization in this session.
Experience: Advanced
Sponsor Levels |
Clicking on the Sponsor Registration button will take you away from the Southeast Community College website and to a secure third-party site for registration. |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Platinum Sponsor $3,000 (Limit 7)
- Premier table placement in Main Hallway
- Table and two chairs
- Complimentary Tickets: 3 (additional tickets may be purchased at attendee rates)
![]() |
![]() |
![]() |
![]() |
Gold Sponsor $2,000 (Limit 7)
- Table placement in 1st floor South Hallway
- Table and two chairs
- Complimentary Tickets: 2 (additional tickets may be purchased at attendee rates)
Diamond Lunch Sponsor $10,000 (Limit 1)
- Table placement next to banquet hall in a high-traffic area next to auditorium
- Two table and four chairs
- Complimentary Tickets: 5 (additional tickets may be purchased at attendee rates)
Each sponsor will receive the following:
- Logo published on our conference website
- Logo printed in conference guide
- Room for one standup banner (not to exceed 3’ wide x 6’tall) by your table
- Access to Electrical - sponsors must bring their own extension cord. The conference center does not have any available to lend.
- WIFI access
Nebraska Innovation Campus (NIC) Conference Center
2021 Transformation Drive, Lincoln NE
Please review the Parking Information for all of the parking options around the Conference Center.
Business & Professional Development Schedule
|
Your Path to Personal & Professional Development |
---|