Thursday, Sept. 27, 2018
8 a.m.-4 p.m.
Southeast Community College
8800 O St., Lincoln, NE
Early Bird Rate (by August 22): $99
Regular Rate (after August 22): $119
Education Rate: $79 (Must provide an .edu email address)
Clicking on the Register Now button will take you away from the Southeast Community College website and to a secure third-party site for registration.
In today’s world, we rely on technology and the Internet for a variety of transactions, communication and information – at home, in school and at the workplace. While we are familiar with the myriad of conveniences provided through Internet use, it
is difficult to stay abreast of all the changes and the potential risks presented by the Internet. We are all “virtual neighbors” in cyberspace, and what we do, or don’t do, can affect many others.
The Nebraska Cyber Security Conference will assist in raising our awareness of cyber security and help in protecting all of us in cyberspace. If we do our part individually, we can have a tremendous positive impact collectively on our state’s cyber
This will be valuable time learning from skilled industry experts. The day will be filled with a variety of breakout sessions that will encompass different areas of information security and technology.
State of Nebraska OCIO
Ron Woerner, CISSP, CISM, CEH, PCI QSA has more than 25 years of IT and security experience and is a noted consultant, speaker and writer in the security industry. As president and chief trusted advisor at RWX Security Solutions, he works as an IT security consultant, performing security audit and risk assessments for small, medium and large organizations. Ron has established security practices for multiple Nebraska and international organizations. He has been a featured speaker at the (ISC)2, ISACA and RSA conferences. Ron was the AFA CyberPatriot Mentor of the Year in 2014. Ron loves to talk to others who are passionate about security and privacy.
Surviving Security Groundhog Day“The more things change, the more they stay the same.” Is it just me, or are we stuck in 2010? Yesterday’s IT problems are still prevalent today. We are living in Security Groundhog Day. In this talk, Ron addresses why we repeatedly see the same security problems leading to bigger and bigger breaches. There is value in learning from history and working to not repeat it. Join Ron and learn some survival techniques to end (or at least reduce) the “Hamster Wheel of Pain” and escape Security Groundhog Day.
Beyond the System: Creating a Secure Enterprise
Presenter: Albert Decker, First Data Government SolutionsThis presentation discusses security from an Enterprise perspective. The intent is to create an understanding of controls that apply to enterprises rather than those at a system level. It makes the audience aware of how security and privacy should be pervasive concerns throughout the enterprise.
Experience Level: Beginner
Blockchains: A Critical Look
Presenter: Abhishek Parakh, University of Nebraska OmahaPrerequisite: General knowledge about BlockchainWe will take a critical look at the blockchain technology and question whether the current enthusiasm about it is justified. Does it have any valid use cases? What kind of security guarantees does it really provide?
Experience Level: Intermediate
Cyber Security Threats & Challenges
Presenter: JR Noble, University of NebraskaPrerequisite: General understanding of information technology and securityCyber attacks have brought a paradigm shift in how we secure and protect information. Today, NATO ranks attacks from phishing and malware among its greatest concerns. These attacks are attractive to hackers, who find them to be cheap, hard to track, and even harder to attribute. As budgets rise and fall, awareness of cyber threats and challenges has never been more critical. Theft of intellectual property, loss of research and attacks on the reputation of the organization are among the challenges managed by our team. Join the UNL Cyber Security team for a talk about today’s cyber threats and how they are impacting organizations around the world.
Experience Level: Beginner
GDPR: 4 Month Update
Presenter: Jacob Tewes, Esq., Kutak Rock LLPThe General Data Privacy Regulation went into effect on May 25. In this session, we will examine the ways it has (and hasn’t) been enforced, with an emphasis on extraterritorial application against U.S. companies. Attendees will leave with a better understanding of the regulation, the enforcement priorities we have been able to glean so far, and some actionable steps they can take to minimize their own risk.
Experience Level: Intermediate
The Privacy Awakening: Past, Present, Future, & Why You Should Care
Presenter: Christopher Cashmere, University of NebraskaThe realization that corporations, the government, and even our friends and families now have more visibility into our private lives than at any time in the past is causing a privacy awakening. While some of the loss of privacy is self-inflicted, much of real damage comes from big data, analytics, and the rate at which things are changing. Technological advances, along with our willingness to trade our privacy for security or convenience, has created a seemingly perfect storm where privacy is being eroded. Using stories, imagery and examples from past and present, this talk will build on the privacy awakening and focus on how our views on privacy are shaped by our history, culture, technology, and human nature. Attendees will come away with an awareness of where have we been, where we are, where all this may be going, why you should care, and more importantly, why as a society we should all care about privacy.
Experience Level: Beginner
Who Are the Bad Guys and Why Do They Want to Hack Your Organization?
Presenter: Jeff Geiger, CrowdStrike ServicesJeff Geiger is a native and self-avowed “permanent Nebraskan.” Jeff will describe a diverse set of threat actors, their tactics and their motives. As a developer and contributor to several open-source and commercial security projects, he’ll highlight how you can prepare your organization to counter both targeted and commodity threats, through understanding the people on the other side of the keyboard and preparing your network accordingly.
Experience Level: Beginner/Intermediate/Advanced
Christopher Cashmere, University of NebraskaChris has had roles in information technology for the past 23 years, with the last 17 years in information security. He spent sIx years as a data security administrator at a financial institution and then the past 11 years as a senior information security analyst at the University of Nebraska.
- The Privacy Awakening: Past, Present, Future, & Why You Should Care
Albert Decker, First Data Government SolutionsWith almost 40 years experience spanning a variety of technical, management and business areas, Decker has technical expertise in multiple operating systems, programming languages and development methodologies. His work has included a broad exposure to IT planning, development and operations as well as IT and business leadership roles. His consulting clients have included businesses of all sizes, from small to Fortune 500 in medical, financial and telecommunications, as well as multiple federal, state and local government agencies. The primary focus areas for his consulting practice are security, privacy, governance, and modernization and transformation of legacy IT systems and processes. He holds the following major certifications: CISSP, Certified Enterprise Architect, MCSE, MCSD, MCDBA, and Sun Certified Java Programmer.
- Beyond the System – Creating a Secure Enterprise
Jeff Geiger, CrowdStrike ServicesJeff Geiger is one of two core developers for RockNSM, an open-source Network Security Monitoring Linux distribution. He’s active in both the private and public sector security communities, and is a dedicated open-source security advocate. He’s currently the Sr. NSM Engineer for CrowdStrike, developing the Falcon Network platform. Jeff is a 20-year member of the Army National Guard, presently in Missouri, and formerly for 15 years in Nebraska.
- Who Are the Bad Guys and Why Do They Want to Hack Your Organization?
JR Noble, University of NebraskaJR Noble is a security analyst on the Information Security Team at the University of Nebraska. He has more than 10 years of experience building secure Web applications and researching emerging security threats. He holds a Bachelor of Fine Arts degree in New Media Design/Web Development from Kansas State University and a Master of Arts degree in Instructional Technology from the University of Nebraska-Lincoln. He held an appointment as an adjunct instructor at Southeast Community College where he taught Web development courses. JR is a graduate of the nMotion Pre-Launch startup accelerator program. In addition to his security career, JR serves as a project coach for the Jeffery S. Raikes School of Computer Science and Technology, where he mentors students working with university partners, including Hudl, CSG and the state of Nebraska. His work analyzing malware and cyber attacks have played a valuable role in increasing security awareness at the University of Nebraska.
- Cyber Security Threats & Challenges
Abhishek Parakh, University of Nebraska OmahaAbhishek Parakh is an associate professor at the College of Information Science and Technology at University of Nebraska Omaha. He received his Ph.D. in Computer Science from Oklahoma State University and M.S. in Electrical Engineering from Louisiana State University. He also is a member of Nebraska University Center for Information Assurance, a National Security Agency (NSA) designated Center for Academic Excellence (CAE) in Information Assurance Education for Cyber Defense (CAE-CD) and leads the new NSA CAE Cyber Operations program at UNO. His research interests include quantum cryptography, quantum information theory, cryptographic engineering, distributed systems security, and resource-constrained encryption systems, protocol development, and SCADA systems security. He has more than 50 publications in referred international conferences and journals and has been funded by the National Science Foundation, National Security Agency and NASA.
- Blockchains: A Critical Look
Jacob Tewes, Esq., Kutak Rock LLPJacob Tewes is an associate in Kutak Rock’s Corporate Department and is a member of the Intellectual Property & Information Technology and Privacy & Data Security Practice Groups. He earned his J.D. at the University of Nebraska, practiced law in Yankton, SD, and then earned an LL.M. in Space, Cyber and Telecommunications Law from the University of Nebraska before joining Kutak Rock. Tewes drafts and negotiates technologically complex transactions, advises companies on regulatory compliance issues, and keeps his clients up to date on cyber security and data privacy developments. His unique academic and professional background enables him to fulfill his clients’ short-term transactional needs while laying the groundwork for long-term success in dynamic and competitive business environments.
- GDPR: 4 Month Update
1501 N. 86th Street
Lincoln, NE 68505
Rate Breakdown:$94.99 Queen Studio
$119.99 One Bedroom King Suite
Arrangements can be made for baggage storage with the Staybridge Suites front desk staff.
Ben Boyd - Integration Partners - Identity-Cornerstone-of-Insec: PDF
Kevin Burchett - Dell - Security Strategies for Ransomware: PDF
Karla Carter - Bellevue University - Security Awareness Training, Influence, and Personality: PDF
Cindy Compert - IBM - Boost Your Cybersecurity Immunity: PDF
Shane Harsch - RSA - Business-Driven Security Lifecycle-A New Plan for Chaos: PDF
Gus Hurwitz - UNL College of Law - How Policy Makers Think About CyberSecurity: PDF
Jill Klein - Sirius - Internet of Things Overview: PDF
Justin Williams - OWASP - Living Off the Land: PDF
Chris HobbsState of Nebraska Office of the CIO
Lora IvesSoutheast Community College
800-828-0072, ext. 2714