#
| Day | Track | Time | Event | Speaker |
00 | | | | ISF 2017 Schedule-at-a-Glance
| |
01 | Tue 04-11 | General | 8:00 AM | Tuesday Opening Remarks
| Stacey Napier & Nancy
Rainosek, DIR |
02 | Tue 04-11 | General | 8:30 AM | Tuesday Keynote
| William (Dix) Dallas |
03 | Tue 04-11 | Identify | 10:00 AM | A Realistic Approach to Risk
Assessments for State Agencies
| John Skaarup, DADS | Stan Hogan,
HHSC | Steven Pryor, HHSC |
04 | Tue 04-11 | Protect | 10:00 AM | Fighting Badness on the Internet through DMARC and
DNS - Free Solutions that Make a Huge Impact | Adnan Baykal, Global Cyber Alliance |
05 | Tue 04-11 | Detect
| 10:00 AM | Customizing Our Investigation
for Anomalies
| Melinda Dade, TEA |
06 | Tue 04-11 | Respond | 10:00 AM | Digital Forensics: Order From Chaos | Randy Stone, SecureWorks
|
07 | Tue 04-11 | Other | 10:00 AM | Living off the Land: How Your
Admin Tools Can Hurt You
| R Trent Greenwood, Carbon Black |
08 | Tue 04-11 | Identify | 11:00 AM | Realizing a Vision for GRC | Leigh Hausman, UT Dallas |
09 | Tue 04-11 | Protect | 11:00 AM | PKI Wishes and Surplus Budget
Dreams
| Aaron Blackstone, TxDPS
|
10 | Tue 04-11 | Detect
| 11:00 AM | Detect Attacks by Combining UBA, Deception, and EDR
| Eric Sun, Rapid7
|
11 | Tue 04-11 | Respond | 11:00 AM | Artificial Intelligence and
Automation in Security - Helping the Human | Hitesh Sheth, Vectra |
12 | Tue 04-11 | Other | 11:00 AM | Women in Cybersecurity: Challenges, Obstacles and
Opportunities
| Emily Darraj, Northrop Grumman |
13
| Tue 04-11 | General | 12:00 PM | Tuesday Lunch Keynote
| Mark Riddle, National Archives Records Administration |
14
| Tue 04-11 | Identify | 1:30 PM | Deploying the Critical Security Control Framework…Like a Boss! | Jon Tidwell, Collin County & Ian
Anderson, Oklahoma City |
15
| Tue 04-11 | Protect | 1:30 PM | No Littering, No Smoking, and No Passwords - the
next Societal Rule
| Bob Kalka, IBM |
16
| Tue 04-11 | Detect
| 1:30 PM
| Software Defined Secure Network | Zach Forsyth, Juniper |
17
| Tue 04-11 | Respond | 1:30 PM | Embedding Incident Response into the DNA of the
Business | Sean Mason, Cisco |
18
| Tue 04-11 | Other | 1:30 PM | Managing Your Security Program
with SPECTRIM
| David Maxwell, Columbia Advisory
Group
|
19
| Tue 04-11 | Identify | 3:00 PM | Comply to Connect and the Impact of a Growing IoT
Market | Bob Reny, Forescout |
20
| Tue 04-11 | Protect | 3:00 PM | The NOT Top 10: Public Sector
Cybersecurity Trends Continue to Challenge
| Bob Smock, Gartner
|
21
| Tue 04-11 | Detect
| 3:00 PM | Vulnerable at Vulnerability Management? Start Small
and Aim Big
| Joseph Alma, HHSC |
22
| Tue 04-11 | Respond | 3:00 PM | Take the Ransom out of
Ransomware
| Mark Jordan, Unitrends |
23
| Tue 04-11 | Other | 3:00 PM | So You Need to Hire a Security Analyst? | Michael Esparza, TAMU SOC |
24
| Tue 04-11 | Other | 4:00 PM | Mission Driven Security: A New
Approach to Secure Systems, Assets, Data and Capabilities | Dan Carayiannis, RSA |
25
| Tue 04-11 | Other | 4:00 PM | Threat Intelligence and Security Cyberspace | Thomas Aufiero, AT&T |
26
| Tue 04-11 | Other | 4:00 PM | A Day in the Life After You
Implement the Identify, Detect, Protect, Respond, and Recover Framework
| Ned Miller, Intel |
27
| Tue 04-11 | Other | 4:00 PM | Creating Your Information Security Incident
Response Program
| Dave Gray, CPA |
28
| Tue 04-11 | Other | 4:00 PM | Managing Risk and Improving
Security – Texas Cybersecurity Framework
| Stan Riemer & Jeremy Wolff,
NTT Data |
29
| Wed 04-12 | General | 8:00 AM | Wednesday Opening Remarks | Stacey Napier, DIR |
30
| Wed 04-12 | General | 8:30 AM | Wednesday Keynote | Niloofar Razi Howe– RSA |
31
| Wed 04-12 | Geek Day | 10:00 AM | Capture the Flag
| Texas A&M Cybersecurity Center
|
32
| Wed 04-12 | Geek Day | 10:00 AM | CyberRange | Kristy Leasman, Air National
Guard |
33
| Wed 04-12 | Geek Day | 10:00 AM | Tool Demonstration
| Kevin Cardwell, EC Council |
34
| Wed 04-12 | Identify | 10:00 AM | Identify Your Impacts
| John Green, TxDMV |
35
| Wed 04-12 | Detect
| 10:00 AM | Defend Against Ransomware: You Already Have the
Capability. Why are You Not Using It? | Michael Gough, Malware Archaeology |
36
| Wed 04-12 | Detect
| 10:00 AM | 2017 NSOC Annual Threat Report
Overview
| Jeremy Wilson, DIR |
37
| Wed 04-12 | Identify | 11:00 AM | How I Learned to Stop Worrying and Love the Audit
| Nate Howe, UT Dallas |
38
| Wed 04-12 | Detect
| 11:00 AM | Threat Hunting and Its Impact to
the NIST Cybersecurity Framework | Ricky Allen, Critical Start |
39
| Wed
04-12 | Detect
| 11:00
AM | Cyber Reconnaissance: An Advanced Cyber Threat
Analytics Using High Performance Computing | Mike Wyatt & Doug Powers, Deloitte &
Touche
|