Tuesday, Oct. 22, 2019
8 a.m.-4 p.m.
Southeast Community College
8800 O St., Lincoln, NE
Early Bird Rate (by September 20): $99
Regular Rate (after September 20): $119
Education Rate: $79
Clicking on the Register Now button will take you away from the Southeast Community College website and to a secure third-party site for registration.
In today’s world, we rely on technology and the Internet for a variety of transactions, communication and information – at home, in school and at the workplace. While we are familiar with the myriad of conveniences provided through Internet use, it is difficult to stay abreast of all the changes and the potential risks presented by the Internet. We are all “virtual neighbors” in cyberspace, and what we do, or don’t do, can affect many others.
The Nebraska Cyber Security Conference will assist in raising our awareness of cyber security and help in protecting all of us in cyberspace. If we do our part individually, we can have a tremendous positive impact collectively on our state’s cyber security.
This will be valuable time learning from skilled industry experts. The day will be filled with a variety of breakout sessions that will encompass different areas of information security and technology.
Sign me up for notifications and updates!
Call for Sponsors
State of Nebraska OCIO
Beyond Password Management: Seven Steps to an Effective Privilege Program
Presenter: Troy Brueckner, CyberArkDoes your current Privileged Access Management (PAM) program actually stop attackers from fulfilling their mission? We will explore the common elements revealed in a various well-known breaches … and how compromised credentials were a necessity to the overall “success” of each and every attack. More importantly, we will discuss the “must-do’s” and “should-do’s” every organization can take to reach an acceptable level of cyber-hygiene to protect against external attackers and malicious insiders in an “assume breach” model.
Experience Level: Beginner/Intermediate/Advanced
Cybersecurity Tips, Tools and Techniques - Updated for 2019
Presenter: Ron Woerner, RWX Security SolutionsEvery cybersecurity professional needs to keep a toolkit of programs, apps and resources for troubleshooting and securing systems. This rapid-fire presentation—an update from the hugely popular 2018 talk—showcases apps used in cybersecurity testing, investigations, administration, and just day-to-day work. You’ll experience advanced techniques using security tools such as Kali Linux, Windows SysInternals Suite, VMWare, Wireshark, NMAP, and many more.
Experience Level: Intermediate/Advanced
DHS Cyber Security Programs: Coordinate Cyber Preparedness, Risk Mitigation and Incident Response
Presenter: Geoffrey F. Jenista, Cybersecurity and Infrastructure Security AgencyThe DHS cyber security resources include assessments, active monitoring and vulnerability mitigation processes to the nation’s sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities.
Experience Level: Beginner/Intermediate/Advanced
The Internet of Things (IoT) and “Common Sense” Security Practices
Presenter: Art Provost, Foundation for Educational Services, Inc.Everyone is increasingly vulnerable to electronic attacks as digitized data proliferates across all sectors of the economy. Ensuring that employees handling data, whether it means more sensors, cameras, POS devices, or even daily email understands their role in protecting data and preventing breaches needs to be a priority in today’s world. During this presentation we will discuss easy steps you can take to limit your exposure in an increasingly online world. We also will discuss the things you can do to improve your own information security, some best practices for work, and the reasons why we have to do some of these crazy things like have UPPER case, lower case, numb3rs, and specia| characters in our passwords, then change them as soon as our fingers learn to type them (and then some even better methods that are easier to remember!).
Experience Level: Beginner/Intermediate
Presenter: Emily A. Markel, Office of the Chief Information Officer Data harvesting is BIG business for cybercriminals, and email is their direct link to you. How can you protect yourself and your organization? By learning to recognize suspicious emails, and increasing your vigilance against phishing attacks and the spread of malware. Confidential data in the wrong hands is devastating to businesses and our personal lives. Security systems have become ever more sophisticated, but none are 100% effective. We must each be the last line of defense against the continuously evolving threat of cybercrime. In this year’s Secure Email Presentation, Emily will highlight the Who, What, Where, When, and Why of safeguarding your organization’s information by keeping your email secure. We’ll cover examples of phishing and whaling attacks, discuss trust, appropriate information to send an email, and ways to keep sensitive data safe.
Experience Level: Beginner/Intermediate
Swimming with Sharks: Understanding and Countering Cyber Threats
Presenter: Chris Screiber, FireEyeJoin FireEye for an interactive discussion about cyber threats facing public sector organizations and how you, as a technology executive, can prioritize your limited resources to most effectively protect your digital assets.
Experience Level: Intermediate/Advanced
Troy Brueckner, CyberArkTroy Brueckner is a Certified Information Systems Security Professional (CISSP #409914) with an extensive record of assisting organizations improve network and data confidentiality, integrity and availability. Mr. Brueckner joined CyberArk Software, Inc. (NASDAQ:CYBR) in 2013 to assist in their mission to “Provide a new layer of security to protect the heart of the enterprise from advanced cyber threats.” Prior to CyberArk, he served as Vice President for Infogressive, Inc. and as Security Architect for Alexander Open Systems, Inc. (AOS). Mr. Brueckner graduated summa cum laude from Bellevue University with a Bachelor's degree in Business, as well as minors in Computer Information Systems, Organizational Communications and Communication Arts. He is a graduate of the FBI Citizens Academy and serves on the Board of Directors for InfraGard Nebraska, the Board of Trustees of the FBI Omaha CAAA and is past president of the (ISC)2 Omaha-Lincoln Chapter.
- Beyond Password Management: Seven Steps to an Effective Privilege Program
Geoffrey F. Jenista, Cybersecurity and Infrastructure Security AgencyGeoffrey F. Jenista, CISSP, MBA, MA Cyber Security Advisor, Region VII (MO, KS, IA, NE) Cybersecurity and Infrastructure Security Agency Cyber Security Division, serves as the Regional Cyber Security Advisor for the Cyber Security Division of the Cybersecurity and Infrastructure Security Agency. He supports the Department of Homeland Security's (DHS) mission of strengthening the security and resilience of the nation's critical infrastructure. His program coordinates cyber preparedness, risk mitigation, incident coordination, and cyber security policy promotion and situational awareness resources, including assessments, to the nation’s sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities.
- DHS Cyber Security Programs: Coordinate Cyber Preparedness, Risk Mitigation and Incident Response
Emily A. Markel, Office of the Chief Information OfficerEmily Markel is a Lincoln, NE native and a 2016 graduate with high distinction from Southeast Community College’s Computer Information Technology program. She currently works for the State of Nebraska as an I.T. Infrastructure Support Analyst Lead for the OCIO’s Exchange and Video team. At age 15, Emily began her career with a burgeoning software company that later became the largest software provider for medical and dental offices in the United States. She has since held a variety of technical, training and customer service positions, all focused on connecting with the end user and providing exceptional customer service. Emily fundamentally believes that no one is safe from email attacks. The pursuit of education, training and continued vigilance is the only way users can effectively combat the loss of valuable information.
- Secure Email
Art Provost, Foundation for Educational Services, Inc.Art Provost, CISSP, CISM, GIAC: GSEC, GPEN, GWAPT AVP of FES Security Services Art joined FES in 2011. He has been working in the Information Security arena for more than 25 years. He has held positions in operations, implementation, design and engineering, audit, and Information Security management in the U.S. Air Force, multiple Fortune 500 companies and Information Security consulting companies. He received his Certified Information Systems Security Professional from the International Information Systems Security Certification Consortium; Global Information Assurance Certifications, including Security Essentials, Penetration Tester, and Web Application Penetration Tester and Certified Information Security Manager from the Information Systems Audit and Control Association. FES Security Services conducts security and vulnerability assessments, develops policies, performs compliance audits, and provides Information Security related services to organizations across the country.
- The Internet of Things (IoT) and “Common Sense” Security Practices
Chris Schreiber, FireEyeChris Schreiber has nearly 20 years of IT and information security experience across the higher education/research, IT managed services and financial services industries, including more than eight years leading enterprise information security programs. Before joining FireEye, Chris was the CISO and HIPAA Security Officer at the University of Arizona where he was responsible for all aspects of information security for a large research institution with more than 15,000 employees and supporting more than 42,000 students. Chris held prior information security and IT leadership positions with SunGard Data Systems (now FIS), the University of Wisconsin and Central Michigan University. Chris has a Bachelor of Science in Business Administration from Central Michigan University, a Masters Certificate in Project Management from the University of Wisconsin – Madison and holds certifications, including Certified Information Security Manager (CISM) and Project Management Professional (PMP).
- Swimming with Sharks: Understanding and Countering Cyber Threats
Ron Woerner, RWX Security SolutionsRon Woerner, CISSP, CISM, has more than 25 years of IT and Security experience and is a noted consultant, speaker and writer in the security industry. As President and Chief Trusted Advisor at RWX Security Solutions, he works as an IT Security Consultant performing security audit and risk assessments for small, medium and large organizations. Ron established the Cybersecurity Studies program at Bellevue University, an NSA Center of Academic Excellence where he still teaches. He has been a featured speaker at the (ISC)2, ISACA and RSA conferences. His crowning achievement was being selected as the AFA CyberPatriot Mentor of the Year in 2014 for his work with High School Students. Ron loves to talk to others who are passionate about security and privacy.
- Cybersecurity Tips, Tools and Techniques - Updated for 2019
"The value of the conference is great - local, affordable, and full of relevant content."
"I had an opportunity to learn about subjects at the periphery of my particular job responsibilities."
"Excellent conference, this is the second time I have attended."
"Good variety of breakout offerings."
"I liked the push and pull between the morning speaker and the lunch speaker. It was a nice experience to see info presented from both sides of the fence so to speak."
"Great to see so many in the state finally concerned with security."
"Breakout sessions were varied, offering something for most everyone."
"I greatly appreciated the ability to keep up on the latest trends in Cyber Security as well as the networking with peers."
"The keynotes. The kilt dude was a good slap in the face to wake us up, and the FBI field agent delivered an outstanding presentation. The irony of the contrast between these two gentlemen was certainly not lost upon me."
"The morning Keynote was one of the best security presenters I have ever heard speak."
"The range of sessions offered were good. They were not all completely vendor product focused and offered good information in a lot of different areas (social engineering, data, legal)."
"The variety of topics covered by presenters was astounding. You could get as technical or non-technical as you liked, and still received relevant security content."
"There were many new things to learn about."
"Another great conference."
Chris HobbsState of Nebraska Office of the CIO
Lora IvesSoutheast Community College
800-828-0072, ext. 2714