Top Banner
Cyber Security for Decision Makers A Non-Technical Presentation Hosted by Cyber Security Institute
14

Cyber Security for Decision Makers A Non-Technical Presentation

Feb 23, 2016

Download

Documents

Cyber Security for Decision Makers A Non-Technical Presentation. Hosted by Cyber Security Institute. Sponsored by. Partners & Collaborators. Cyber Security Institute Missions Education & Training Certifications Degrees (majors, minors, undergraduate, graduate) Curricular development - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber Security for Decision Makers A Non-Technical Presentation

Cyber Security for Decision

Makers

A Non-Technical PresentationHosted by

Cyber Security Institute

Page 2: Cyber Security for Decision Makers A Non-Technical Presentation

Sponsored by

Page 3: Cyber Security for Decision Makers A Non-Technical Presentation

Partners & Collaborators

Page 4: Cyber Security for Decision Makers A Non-Technical Presentation

Cyber Security Institute

Missions Education & Training

CertificationsDegrees (majors, minors, undergraduate, graduate)Curricular development

Research & DevelopmentAdvanced cyber security researchTesting and development laboratory

Outreach & ServicesCyber security seminarsInvited speakersSummer camps

Page 5: Cyber Security for Decision Makers A Non-Technical Presentation

Cyber Security Institutehttp://www.uhcl.edu/

CyberSecurityInstitute

Contact: Dr. Andrew [email protected] (281) 283-3835

Page 6: Cyber Security for Decision Makers A Non-Technical Presentation
Page 7: Cyber Security for Decision Makers A Non-Technical Presentation
Page 8: Cyber Security for Decision Makers A Non-Technical Presentation

The Trouble with Cyber Security Is… Starting with the basics of Cyber Security …

Ross A. Leo — BSc, CHPSE, CISSP, CISM, ABCP, CHS-III

Mr. Leo has over 30 years of experience in IT systems, architecture, and management as well as technical security and management. He has worked more than 20 years at NASA in Mission IT Systems Support, and has served as the Program Director for Security and Assurance (CSOC), Chief Security Architect at JSC Mission Control Center (CSOC), and Chief Information Security Officer (CISO) for the Shuttle & Station Programs (CSOC). In addition, he served as a trainer and consultant in security and compliance for 14 years, certifying 4200 people in the field. He also designed, implemented, and managed complete EMR system with data center for 116 sites and 350K patient records as the Director of IT and CISO at UTMB-Galveston for four years.

Page 9: Cyber Security for Decision Makers A Non-Technical Presentation

Cloud Computing Dangers and PitfallsWhat is cloud computing? What are the problems of implementing cloud computing without adequate knowledge of this new environment?

Ernesto Rojas—Forensic & Security Services, Inc., President

Mr. Rojas is the founder and president of Forensic & Security Services Inc. and has over 30 years of experience in information security and investigations of digital systems. He is a member of the American Academy of Forensic Sciences—the Cloud Computing Working Group at the National Institute of Standards and Technology and the Scientific Working Group on Digital Evidence. He has made presentations and provided testimony in hundreds of cases over the past 15 years. He was designated a Subject Matter Expert by ISC and has received numerous awards and recognition for his continuing research in the area of computer security and forensics.

Page 10: Cyber Security for Decision Makers A Non-Technical Presentation

Malware, What is it, Where is it and How Did it Find Me? The different flavors of Malware and why you care!

Rob Davis—Leidos, Senior Project Manager

Mr. Davis is a senior project manager at Leidos — a 7 billion dollar company focused on national security, health, and engineering. He has spent his career working in the critical infrastructure space of both the commercial and federal markets. He is currently a business developer in the commercial cyber security division which provides managed security services, risk management and compliance, and incident response services to the commercial markets. He will talk about malware and its evolution over the years and answer some common questions such as “What is malware?” “Where does it come from?” “Does it affect me?” and “How do I protect myself?”

Page 11: Cyber Security for Decision Makers A Non-Technical Presentation

Eight Strategies to Reduce Your Risk Strategies you can take back to your organization to reduce your company's risk in the event of a data breach.

Sheryl Falk—Winston & Strawn, LLP, Attorney

Ms. Falk has spent the last decade focusing on digital evidence and emerging technology issues. In addition to her extensive commercial litigation experience, Ms. Falk is certified in computer forensics and has in-depth technical knowledge and experience with data security and privacy matters. This background provides her clients with the skills required to handle technology challenges, including data loss prevention, data breach response, and privacy counseling. In addition to being a requested speaker on the legal issues surrounding today’s digital technology, Ms. Falk’s insight on computer forensics, data breach investigations, international data transfer, and digital evidence has been shared with peers and industry leaders through numerous published articles. Ms. Falk is a member of Winston’s Privacy Group and eDiscovery Leadership Team.

Page 12: Cyber Security for Decision Makers A Non-Technical Presentation

America's Biggest Threat: Economic Espionage The impact of today's Economic Espionage threat on U.S. companies and the U.S. Economy

Casey Fleming—BlackOps Partners, CEO

Mr. Fleming is regarded as a leading expert in trade secret and competitive advantage protection and the mitigation of economic espionage. He is chairman and CEO of BlackOps Partners, the leading global intelligence, security and enterprise risk management firm. Mr. Fleming also serves as Chairman of the Economic Espionage SIG for InfraGard.

Page 13: Cyber Security for Decision Makers A Non-Technical Presentation

A New Battleground The Modern Army and Cyber Security

Major Steve Schippers —Intelligence Directorate, 75th Training Command, Threat Plans OfficerMajor Schippers commissioned as a Second Lieutenant in the Signal Corps through Officer Candidate School in Fort Benning, Georgia in 2001. His military education includes Signal Officer Basic Course, Advanced Tactical Network, Military Intelligence Captains Career Course, and the Joint Network Attack Course. Major Schippers served as the Assistant Operations Officer for the 16th Signal Battalion controlling the signal infrastructure in the Western Province of Iraq during Operation Iraqi Freedom 2003-2004. He then served as the Chief Information Officer for the 3/4 Aviation Battalion. During a small break from Active Duty military, Steve developed systems and network architectures for the U.S. Army working for Program Manager Tactical Operations Center and later tested future Army software releases for interoperability and security vulnerabilities in Fort Hood, Texas.

Page 14: Cyber Security for Decision Makers A Non-Technical Presentation

FBI Houston, we have a problem How to engage the FBI when an intrusion is detected and how to prevent

Angela Haun—FBI, Special Agent

Special Agent Angela Haun entered on duty with the Federal Bureau of Investigation in March 1998. Agent Haun has served in the Chicago Division, the Office of Congressional Affairs and the Cyber Division at FBI Headquarters, and the Houston Division. Agent Haun has received numerous awards for her work at the FBI, including the Director’s Award for Outstanding Criminal Investigation. In September 2013, Agent Haun received the award for “InfraGard Coordinator of the Year” from the InfraGard National Members Alliance.