Tuesday, Oct. 20, 2020
8 a.m.-4 p.m.
LIVE Online through Zoom
Early Bird Rate (by Oct. 6): $99
Regular Rate (after Oct. 6): $119
Education Rate: $79
Clicking on the Register Now button will take you away from the Southeast Community College website and to a secure third-party site for registration.
If you have registered for this conference, you should have received an email with a link to register your name and email address to get access to the conference on Tuesday. The email went to the email address provided on the registration. If you need assistance, please contact firstname.lastname@example.org.
In today’s world, we rely on technology and the Internet for a variety of transactions, communication and information – at home, in school and at the workplace. While we are familiar with the myriad of conveniences provided through Internet use, it is difficult to stay abreast of all the changes and the potential risks presented by the Internet. We are all “virtual neighbors” in cyberspace, and what we do, or don’t do, can affect many others.
The Nebraska Cyber Security Conference will assist in raising our awareness of cyber security and help in protecting all of us in cyberspace. If we do our part individually, we can have a tremendous positive impact collectively on our state’s cyber security.
This will be valuable time learning from skilled industry experts. The day will be filled with a variety of breakout sessions that will encompass different areas of information security and technology.
Sign me up for notifications and updates!
State of Nebraska OCIO
Chris WlaschinVice President of Systems Security and Chief Information Security Officer (CISO)
Chris joined ES&S as the Vice President of Systems Security and Chief Information Security Officer in April 2018. In this role he is responsible for company-wide security efforts, including product, operational and infrastructure security.
Prior to joining ES&S, Chris was the Chief Information Security Officer for the Department of Health and Human Services in Washington D.C. where he oversaw cybersecurity efforts for the Department. He has held other senior cybersecurity leadership positions in both the public and private sector, including the Department of Defense, Department of Veterans Affairs, National Research Corporation, and the University of Nebraska.
Chris served with the United States Navy for more than 20 years in a variety of leadership positions. He earned his Master’s degree from Northern Illinois University and a Bachelor of Science in Technology Education from Southern Illinois University. He also holds a current CISSP (Certified Information Systems Security Professional) certification.
Chris is the past Chair of the Election Industry - Subsector Coordinating Council (EI-SCC) and a Federal Advisory Board Member for the Dell/EMC Corporation.
Election Security 2020Wlaschin will cover preparations for the 2020 national election and provide details about how this election will be the most secure election in our lifetimes. Chris Wlaschin is the CISO for Election Systems & Software, an Omaha based company which is the largest election technology provider in North America.
Keynote Presentation: Election Security 2020
Chris Wlaschin, Election Systems & SoftwareWlaschin will cover preparations for the 2020 national election and provide details about how this election will be the most secure election in our lifetimes. Chris Wlaschin is the CISO for Election Systems & Software, an Omaha based company which is the largest election technology provider in North America.
AI and Machine Learning Fundamentals
Jon O’Keefe, Logical Operations
In this presentation, students will learn all about Artificial Intelligence! We will cover the basics of Machine Learning, Deep Learning, the history of AI, and how businesses are currently using AI to grow.
Cyber Threat Overview
Jeremy Witmer, FBI
Discussion of current trends in cyber threats and cyber investigations as seen by the FBI, as well as defensive cyber information.
Making Security Awareness Habit Forming
Karla Carter, Bellevue University
Humans are both the strongest and weakest parts of the cyber security equation. Security awareness training is the way we patch the human, by modifying behavior. But how exactly should we go about patching the humans in order to get strong behaviors and have them consistently happen? How do we make strong behavior habits? How do we erase weak behavior habits?
National Cyber Security Awareness Month and DHS Cyber Security Services
Geoff Jenista, Department of Homeland Security/Cybersecurity and Infrastructure Security
NCSAM topics and DHS Security programs which coordinate cyber preparedness, risk mitigation and incident response.
Social Engineering: The Art of the Click
Stacy Eldridge, Silicon Prairie Cyber Services LLC
You’ve heard of phishing, but have you ever wondered how the email was crafted? During this presentation learn how cyber criminals create an irresistible offer that you can’t refuse to click on. Learn the Art of the Click.
Turn Data into Doing – Using Data for Security: Detect, Analyze and Respond - Acting Quickly and Confidently
Lee Imrey, Splunk
Karla Carter, Bellevue UniversityKarla Carter is an associate professor in the College of Science and Technology at Bellevue University, in Bellevue, NE. Drawing on more years than she should be admitting of information technology experience, she teaches cybersecurity, information technology ethics and history/civics courses. In addition to being Vice Chair for the Nebraska Chapter of the IEEE Computer Society and a member of the ACM Committee on Professional Ethics (COPE), she is curious, intense and irreverent, and still unsure of what she wants to be when she grows up.
- Making Security Awareness Habit Forming
Stacy Eldridge, Silicon Prairie Cyber Services LLCStacy Eldridge is the founder and data protection evangelist of Silicon Prairie Cyber Services LLC. Stacy's mission is to spread the word about the importance of cybersecurity for small businesses and entrepreneurs. She uses a three-phased approach to help clients protect their business, information and customers from cyberattacks with a focus on education. Eldridge's security career began in the FBI where she worked as a digital investigator for nearly a decade where she was part of the team that secured the first material support of terrorism conviction. Upon moving to the private sector, she led data loss prevention and cybersecurity programs for a Fortune 500 Top 25 company and critical infrastructure. Eldridge also teaches forensics and security classes for Oklahoma State University's Institute of Technology. Eldridge has the following certifications: GSEC, GCCC, GCFE, ACE, and CFCE and received her Masters of Science from Bellevue University in 2006.
- Social Engineering: The Art of the Click
Lee Imrey, SplunkLee Imrey is a former CISO who has worked in information security his entire career, addressing the full spectrum of technical, legal and business challenges. He has held numerous roles, and been responsible for securing PHI (personal health information) for 100M+ people, financial data for banking customers in 25 countries, and sensitive and classified data for the Federal government. He was the top security instructor for (ISC)2, and has developed and delivered security training for the US Department of Justice, US Treasury, US Secret Service, the Federal Law Enforcement Training Center (FLETC), banks, consulting companies, law firms and other organizations. While he has addressed privacy issues in many venues over the last twenty years, he has focused on election security over the last five, as the threats to our electoral process have become harder to ignore. He is always happy to explore challenges facing our counties, states, and democracy. During his career, he has earned certifications from (ISC)2, International Association of Privacy Professionals, ASIS International, ISACA, SANS, CNSS, Cisco and others, including CISSP, CPP, CIPP, CISA, and GIAC GCFW.
- Turn Data into Doing – Using Data for Security: Detect, Analyze and Respond - Acting Quickly and Confidently
Geoff Jenista, Department of Homeland Security/Cybersecurity and Infrastructure SecurityMr. Jenista serves as the Regional Cyber Security Advisor for Region VII (IA, KS, MO, and NE) for the Cybersecurity & Infrastructure Security Agency (CISA), Integrated Operations Division. Based in Kansas City, KS, he supports the Department of Homeland Security’s (DHS) mission of strengthening the security and resilience of the nation's critical infrastructure. His programs coordinate cyber preparedness, risk mitigation and incident response. He provides Cyber Security resource briefings, Cyber Security assessments and Incident Response planning to the nation’s 16 critical infrastructure sectors and state, local, tribal, and territorial government entities.
- National Cyber Security Awareness Month and DHS Cyber Security Services
Jon O’Keefe, Logical OperationsAs the technology education Jedi at Logical Operations, Jon is responsible for the design, development and delivery of LO’s emerging technology courseware portfolio. He has more than 20 years of experience in IT and education. He holds a Master’s in Education Theory and Policy with an emphasis on Curriculum Design. He also is a Master Modern Classroom Certified Trainer (MCCT) and Master Certified Virtual Educator (CVE) and has helped more than 3,000 trainers and K-12 educators prepare for the MCCT and CVE exams. He has a passion for storytelling and film and is always informed on the latest and greatest technologies. If you want to win at bar trivia, he’s your go to guy.
- AI and Machine Learning Fundamentals
Jeremy Witmer, FBIJeremy Witmer is a Special Agent with the FBI Cyber Task Force in Omaha, NE, responsible for investigating criminal and national security cyber and computer intrusion matters. Prior to the FBI, he was a systems engineer, working on government defensive cybersecurity programs for the Air Force, Navy and other federal departments. He holds Bachelor's and Master's degrees from the University of Colorado at Colorado Springs in Computer Science, and is an ISC2 Certified Information Systems Security Professional.
- Cyber Threat Overview
This year we will be going virtual and your sponsorship will help us bring cyber security education to our communities.
I want to be a sponsor.
"The speakers were able to relate the topics to things I work on daily and provided some great resources I wasn't already using."
"The breakouts this year were fantastic!"
"The value of the conference is great - local, affordable, and full of relevant content."
"Excellent conference, this is the second time I have attended."
"I liked the push and pull between the morning speaker and the lunch speaker. It was a nice experience to see info presented from both sides of the fence so to speak."
"Great to see so many in the state finally concerned with security."
"I greatly appreciated the ability to keep up on the latest trends in Cyber Security as well as the networking with peers."
"The variety of topics covered by presenters was astounding. You could get as technical or non-technical as you liked, and still received relevant security content."
"There were many new things to learn about."
"Another great conference."
Patrick WrightState of Nebraska Office of the CIO
Lora IvesSoutheast Community College
800-828-0072, ext. 2714