• spotlight_keynotespeaker_sum18
     
    spotlight_ncscplatinumplussponsor
     
    13th Annal Cyber Security Conference
     
    13th Annal Cyber Security Conference
     
    spotlight_ncsclogolockup
     
     2018 Nebraska Cyber Security Conference
     
    spotlight_ncscgoldsponsors
     
     

Nebraska Cyber Security Conference

  • Thursday, Sept. 27, 2018
    8 a.m.-4 p.m.
    Southeast Community College
    8800 O St., Lincoln, NE


    Early Bird Rate (by August 22): $99
    Regular Rate (after August 22): $119
    Education Rate: $79 (Must provide an .edu email address)

    registernow_300_btn

    Clicking on the Register Now button will take you away from the Southeast Community College website and to a secure third-party site for registration.

    In today’s world, we rely on technology and the Internet for a variety of transactions, communication and information – at home, in school and at the workplace. While we are familiar with the myriad of conveniences provided through Internet use, it is difficult to stay abreast of all the changes and the potential risks presented by the Internet. We are all “virtual neighbors” in cyberspace, and what we do, or don’t do, can affect many others.

    The Nebraska Cyber Security Conference will assist in raising our awareness of cyber security and help in protecting all of us in cyberspace. If we do our part individually, we can have a tremendous positive impact collectively on our state’s cyber security.

    This will be valuable time learning from skilled industry experts. The day will be filled with a variety of breakout sessions that will encompass different areas of information security and technology.

    State of Nebraska OCIO

  • TimeEvent
    7:30 a.m.Check-in begins
    8 a.m.Opening Remarks
    9:15 a.m.Break / Visit Vendors
    9:30 a.m.Breakout Sessions 1
    10:30 a.m.Break / Visit Vendors
    10:45 a.m.Breakout Sessions 2
    NoonLunch (Provided) & Keynote
    1:45 p.m. Breakout Sessions 3
    2:45 p.m.Break / Visit Vendors
    3 p.m.Breakout Sessions 4

    Ron Woerner

    RonWoerner_200x200Ron Woerner, CISSP, CISM, CEH, PCI QSA has more than 25 years of IT and security experience and is a noted consultant, speaker and writer in the security industry. As president and chief trusted advisor at RWX Security Solutions, he works as an IT security consultant, performing security audit and risk assessments for small, medium and large organizations. Ron has established security practices for multiple Nebraska and international organizations. He has been a featured speaker at the (ISC)2, ISACA and RSA conferences. Ron was the AFA CyberPatriot Mentor of the Year in 2014. Ron loves to talk to others who are passionate about security and privacy.


    Surviving Security Groundhog Day
    “The more things change, the more they stay the same.” Is it just me, or are we stuck in 2010? Yesterday’s IT problems are still prevalent today. We are living in Security Groundhog Day. In this talk, Ron addresses why we repeatedly see the same security problems leading to bigger and bigger breaches. There is value in learning from history and working to not repeat it. Join Ron and learn some survival techniques to end (or at least reduce) the “Hamster Wheel of Pain” and escape Security Groundhog Day.

    Beyond the System: Creating a Secure Enterprise
    Presenter: Albert Decker, First Data Government Solutions

    This presentation discusses security from an Enterprise perspective. The intent is to create an understanding of controls that apply to enterprises rather than those at a system level. It makes the audience aware of how security and privacy should be pervasive concerns throughout the enterprise.
    Experience Level: Beginner


    Blockchains: A Critical Look
    Presenter: Abhishek Parakh, University of Nebraska Omaha

    Prerequisite: General knowledge about Blockchain
    We will take a critical look at the blockchain technology and question whether the current enthusiasm about it is justified. Does it have any valid use cases? What kind of security guarantees does it really provide?
    Experience Level: Intermediate


    Cyber Security Threats & Challenges
    Presenter: JR Noble, University of Nebraska

    Prerequisite: General understanding of information technology and security
    Cyber attacks have brought a paradigm shift in how we secure and protect information. Today, NATO ranks attacks from phishing and malware among its greatest concerns. These attacks are attractive to hackers, who find them to be cheap, hard to track, and even harder to attribute. As budgets rise and fall, awareness of cyber threats and challenges has never been more critical. Theft of intellectual property, loss of research and attacks on the reputation of the organization are among the challenges managed by our team. Join the UNL Cyber Security team for a talk about today’s cyber threats and how they are impacting organizations around the world.
    Experience Level: Beginner


    GDPR: 4 Month Update
    Presenter: Jacob Tewes, Esq., Kutak Rock LLP

    The General Data Privacy Regulation went into effect on May 25. In this session, we will examine the ways it has (and hasn’t) been enforced, with an emphasis on extraterritorial application against U.S. companies. Attendees will leave with a better understanding of the regulation, the enforcement priorities we have been able to glean so far, and some actionable steps they can take to minimize their own risk.
    Experience Level: Intermediate


    The Privacy Awakening: Past, Present, Future, & Why You Should Care
    Presenter: Christopher Cashmere, University of Nebraska

    The realization that corporations, the government, and even our friends and families now have more visibility into our private lives than at any time in the past is causing a privacy awakening. While some of the loss of privacy is self-inflicted, much of real damage comes from big data, analytics, and the rate at which things are changing. Technological advances, along with our willingness to trade our privacy for security or convenience, has created a seemingly perfect storm where privacy is being eroded. Using stories, imagery and examples from past and present, this talk will build on the privacy awakening and focus on how our views on privacy are shaped by our history, culture, technology, and human nature. Attendees will come away with an awareness of where have we been, where we are, where all this may be going, why you should care, and more importantly, why as a society we should all care about privacy.
    Experience Level: Beginner


    Who Are the Bad Guys and Why Do They Want to Hack Your Organization?
    Presenter: Jeff Geiger, CrowdStrike Services

    Jeff Geiger is a native and self-avowed “permanent Nebraskan.” Jeff will describe a diverse set of threat actors, their tactics and their motives. As a developer and contributor to several open-source and commercial security projects, he’ll highlight how you can prepare your organization to counter both targeted and commodity threats, through understanding the people on the other side of the keyboard and preparing your network accordingly.
    Experience Level: Beginner/Intermediate/Advanced

    ChristopherCashmere-UniversityofNebraskaChristopher Cashmere, University of Nebraska
    Chris has had roles in information technology for the past 23 years, with the last 17 years in information security. He spent sIx years as a data security administrator at a financial institution and then the past 11 years as a senior information security analyst at the University of Nebraska.
    - The Privacy Awakening: Past, Present, Future, & Why You Should Care


    AlbertDecker-FirstDataAlbert Decker, First Data Government Solutions
    With almost 40 years experience spanning a variety of technical, management and business areas, Decker has technical expertise in multiple operating systems, programming languages and development methodologies. His work has included a broad exposure to IT planning, development and operations as well as IT and business leadership roles. His consulting clients have included businesses of all sizes, from small to Fortune 500 in medical, financial and telecommunications, as well as multiple federal, state and local government agencies. The primary focus areas for his consulting practice are security, privacy, governance, and modernization and transformation of legacy IT systems and processes. He holds the following major certifications: CISSP, Certified Enterprise Architect, MCSE, MCSD, MCDBA, and Sun Certified Java Programmer.
    - Beyond the System – Creating a Secure Enterprise


    JeffGeiger-CrowdStrikeJeff Geiger, CrowdStrike Services
    Jeff Geiger is one of two core developers for RockNSM, an open-source Network Security Monitoring Linux distribution. He’s active in both the private and public sector security communities, and is a dedicated open-source security advocate. He’s currently the Sr. NSM Engineer for CrowdStrike, developing the Falcon Network platform. Jeff is a 20-year member of the Army National Guard, presently in Missouri, and formerly for 15 years in Nebraska.
    - Who Are the Bad Guys and Why Do They Want to Hack Your Organization?


    JRNoble-UniversityofNebraskaJR Noble, University of Nebraska
    JR Noble is a security analyst on the Information Security Team at the University of Nebraska. He has more than 10 years of experience building secure Web applications and researching emerging security threats. He holds a Bachelor of Fine Arts degree in New Media Design/Web Development from Kansas State University and a Master of Arts degree in Instructional Technology from the University of Nebraska-Lincoln. He held an appointment as an adjunct instructor at Southeast Community College where he taught Web development courses. JR is a graduate of the nMotion Pre-Launch startup accelerator program. In addition to his security career, JR serves as a project coach for the Jeffery S. Raikes School of Computer Science and Technology, where he mentors students working with university partners, including Hudl, CSG and the state of Nebraska. His work analyzing malware and cyber attacks have played a valuable role in increasing security awareness at the University of Nebraska.
    - Cyber Security Threats & Challenges


    AbhishekParakh-UNOAbhishek Parakh, University of Nebraska Omaha
    Abhishek Parakh is an associate professor at the College of Information Science and Technology at University of Nebraska Omaha. He received his Ph.D. in Computer Science from Oklahoma State University and M.S. in Electrical Engineering from Louisiana State University. He also is a member of Nebraska University Center for Information Assurance, a National Security Agency (NSA) designated Center for Academic Excellence (CAE) in Information Assurance Education for Cyber Defense (CAE-CD) and leads the new NSA CAE Cyber Operations program at UNO. His research interests include quantum cryptography, quantum information theory, cryptographic engineering, distributed systems security, and resource-constrained encryption systems, protocol development, and SCADA systems security. He has more than 50 publications in referred international conferences and journals and has been funded by the National Science Foundation, National Security Agency and NASA.
    - Blockchains: A Critical Look


    JacobTewes-KutakRockJacob Tewes, Esq., Kutak Rock LLP
    Jacob Tewes is an associate in Kutak Rock’s Corporate Department and is a member of the Intellectual Property & Information Technology and Privacy & Data Security Practice Groups. He earned his J.D. at the University of Nebraska, practiced law in Yankton, SD, and then earned an LL.M. in Space, Cyber and Telecommunications Law from the University of Nebraska before joining Kutak Rock. Tewes drafts and negotiates technologically complex transactions, advises companies on regulatory compliance issues, and keeps his clients up to date on cyber security and data privacy developments. His unique academic and professional background enables him to fulfill his clients’ short-term transactional needs while laying the groundwork for long-term success in dynamic and competitive business environments.
    - GDPR: 4 Month Update

    Platinum Plus

    ncscplatinumplus_okta

    Gold

    ncscgold_integrationpartners

    Staybridge Suites
    1501 N. 86th Street
    Lincoln, NE 68505
    Phone 402-484-6000
    Reservations

    Rate Breakdown:
    $94.99 Queen Studio
    $119.99 One Bedroom King Suite

    Reservations:

    • To receive this special limited availability rate, you must identify yourself as part of the Nebraska Cyber Security Conference group.
    • Reservations must be received before August 29.
       * Rates and rooms will then be subject to changes and availability after August 29.
       * The cancellation policy of 24 hours prior to arrival does apply. Any no-show reservations or late cancellations will be charged one night’s room and tax.
    • You will need to provide a credit card to hold the reservation.

    Check-in/Check-out Times:

    • Check-in time is 4 p.m. or later. Anyone arriving prior to 4 p.m. will be accommodated as soon as possible but should be advised that there may be a wait.
    • Checkout time is noon.

    Arrangements can be made for baggage storage with the Staybridge Suites front desk staff.

    Cancellation/Refund Policy
    Attendee is eligible for a refund, minus a 10% administrative fee, if cancellation is received no later than September 18, 2018. To cancel registration, contact Lora Ives at lives@southeast.edu or call 402-437-2714. If a registrant is unable to attend an event for any reason, they may substitute, by arrangement with the State Information Security Officer or Southeast Community College, someone else from the same agency.
    Coming Soon!

    Ben Boyd - Integration Partners - Identity-Cornerstone-of-Insec: PDF

    Kevin Burchett - Dell - Security Strategies for Ransomware: PDF

    Karla Carter - Bellevue University - Security Awareness Training, Influence, and Personality: PDF

    Cindy Compert - IBM - Boost Your Cybersecurity Immunity: PDF

    Shane Harsch - RSA - Business-Driven Security Lifecycle-A New Plan for Chaos: PDF

    Gus Hurwitz - UNL College of Law - How Policy Makers Think About CyberSecurity: PDF

    Jill Klein - Sirius - Internet of Things Overview: PDF

    Justin Williams - OWASP - Living Off the Land: PDF

  • State of Nebraska OCIO

       

    SCC Continuing Education


    Chris Hobbs
    State of Nebraska Office of the CIO
    402-471-3677
    chris.hobbs@nebraska.gov

    Lora Ives
    Southeast Community College
    402-437-2714
    800-828-0072, ext. 2714
    lives@southeast.edu