SPEAKERS

Ben Dillon

Ben Dillon

Joe dillon

Joseph Dillon

VPNs: Who, What, Why, When, Where and How

Ben's LinkedIn Joe's LinkedIn

Explaining the technology and options behind modern VPN offerings, and showing how to build once programmatically in AWS with a provided deployment script.

Kyra Deters

Kyra Deters

Data Resilience: When the Internet isn't Forever

LinkedIn

The presentation will discuss long-term data resilience, both online and offline. It will go over how data storage mediums, standards compatibility, and server availability impact our ability to ensure information is available for decades to come.

Brett Cumming

Brett Cumming

Purpose Built Security : Aligning operations to meet business needs at every level

LinkedIn

An effective information security program is equally about which controls are implemented as much as it is about how well they’re operating. Using the backdrop of building a global information security program at a Fortune 500 company, we’ll talk about how we determine the right people, process, and technology needed to secure the business and how you can use the same methodology to decide on what’s “right” at any level of the program.

John Lamboy Jr

John Lamboy Jr

Cyber AI and Machine Learning

LinkedIn

With the growing need for cybersecurity for companies globally, this talk will take a dive into the how Machine Learning and AI could be used to help alleviate that load.

Dr Manson

Dr Manson

What Happens In Vegas Is Cyber!

LinkedIn

This panel provides a view of emerging cybersecurity tools, techniques and processes. Las Vegas is known for DefCon and BlackHat annual conferences. There is much more to learn about how cyber is applied in Las Vegas and in the broader community, and what students can do to learn about these emerging cyber trends. Our panel includes cybersecurity leaders in Southern Nevada. This talk includes an interactive Q&A portion. Come join us for this engaging conversation!

Victor Monga

Victor Monga

Network and Endpoint Security

LinkedIn

Cybersecurity had been seen as either network or endpoint security despite public or private cloud. As the cyber attacks are getting sophisticated, a new approach and mindset is also warranted! During this talk, we will share insights about network and endpoint security. The differences of two sides of the spectrum. How network security provides you the width and endpoint security the depth of detection, prevention and remediation of cyberattacks.

Fernando Trevino

Fernando Trevino

Log4j Deep Dive

LinkedIn

Right now businesses are rushing to patch the recently discovered Log4j software vulnerability. The malware has the potential to cripple business by exploiting a little know vulnerability that exists in Java Class files. Join me as I do a deep dive on Log4j by providing an overview of the exploit, what it's being used for, why it is difficult to detect and some ideas for improving detection.

K

K Singh

Alice Through the Write Blocker - The Essentials of Digital Forensics

LinkedIn

The Essentials of how to Image Evidence, track, and basic analysis in a theoretical ransomware group case. (Or Corporate Espionage. Or APT.)"

Damon Small

Damon Small

What Infosec in Oil & Gas can Teach us About Infosec in Healthcare

LinkedIn

One advantage of working for a consultancy is the constant exposure to a variety of organizations in a variety of industries. This has given the speaker, Damon J. Small, an appreciation for the importance of not only understanding the challenges faced by clients in protecting their information assets, but also understanding those challenges in the context of the business in which they exist. It is never enough to simply tell a client, ""I hacked all your things, now go fix it."" Rather, the successful consultant must also help the client understand the ramifications of each finding and how to prioritize mitigation efforts given that neither time nor money are infinite. To illustrate these points, the speaker will present several information security-related problems that have been successfully taken on by oil and gas clients. The speaker has learned that these problems are very similar to specific challenges faced by healthcare organizations, despite the fact that those industries are very unique to one another. The healthcare industry faces fiscal hurdles that energy companies generally do not, which makes it difficult for them to adapt as quickly. The speaker hopes that his analysis will help the audience learn from the experiences of other organizations in a way that will allow them to strategically align information security goals with current cyber threats more efficiently.

Dylan Wong

Dylan Wong

Decentralized Applications and Peer to Peer Communications

LinkedIn

With current Blockchain Technologies and developments in Web3, developers and users worldwide are innovating new ways to distribute compute power, access off-chain data in real time, and mechanisms in place to incentivize adoption of these new developments.

Matthew Schnittker

Matthew Schnittker

Shell Scripting - The 12 Unix Commands Everyone Should Know

LinkedIn

https://github.com/mschnitt/12_Unix_Commands