2017 Information Security Forum

Presentation materials for the 2017 Information Security Forum (ISF) posted in the detail section.

ISF is an educational conference bringing together security and IT professionals from public sector organizations across the state of Texas.  This premier conference focuses on security trends and upcoming technologies with an estimated attendance of approximately 500 people including up to 400 security and IT professionals. 

See Details

Location & Hours

Start Time:
Apr 11 2017
8:00 AM
End Time:
Apr 12 2017
12:30 PM
Palmer Events Center 900 Barton Springs Rd 78704 Phone: Email: isf@dir.texas.gov

2017 Information Security Forum (Event Materials)

April 11-12, 2017 | Austin, TX | Palmer Events Center |  ISF Website.

Hosted by the Texas Department of Information Resources (DIR) and managed by the Office of the Chief Information Security Officer (OCISO).

Conference materials for which DIR has permission to share are linked.  This is primarily content created by third parties. If you have difficulty viewing a posted document, please contact the EIR Accessibility Coordinator. Note: DIR cannot guarantee the accessibility of external content. Please also see the legal disclaimer at bottom of page.

UNDER CONSTRUCTION - MATERIALS ARE BEING GATHERED AND POSTED.

#
DayTrackTimeEventSpeaker
00ISF 2017 Schedule-at-a-Glance
01Tue 04-11General8:00 AMTuesday Opening Remarks
Stacey Napier & Nancy Rainosek, DIR
02Tue 04-11General8:30 AMTuesday Keynote
William (Dix) Dallas
03Tue 04-11Identify10:00 AMA Realistic Approach to Risk Assessments for State Agencies John Skaarup, DADS | Stan Hogan, HHSC | Steven Pryor, HHSC
04Tue 04-11Protect10:00 AMFighting Badness on the Internet through DMARC and DNS - Free Solutions that Make a Huge ImpactAdnan Baykal, Global Cyber Alliance 
05Tue 04-11Detect
10:00 AMCustomizing Our Investigation for Anomalies
Melinda Dade, TEA
06Tue 04-11Respond10:00 AMDigital Forensics: Order From Chaos Randy Stone, SecureWorks 
07Tue 04-11Other10:00 AMLiving off the Land: How Your Admin Tools Can Hurt YouR Trent Greenwood, Carbon Black
08Tue 04-11Identify11:00 AMRealizing a Vision for GRCLeigh Hausman, UT Dallas 
09Tue 04-11Protect11:00 AMPKI Wishes and Surplus Budget DreamsAaron Blackstone, TxDPS 
10Tue 04-11Detect
11:00 AMDetect Attacks by Combining UBA, Deception, and EDREric Sun, Rapid7 
11Tue 04-11Respond11:00 AMArtificial Intelligence and Automation in Security - Helping the HumanHitesh Sheth, Vectra 
12Tue 04-11Other11:00 AMWomen in Cybersecurity: Challenges, Obstacles and Opportunities
Emily Darraj, Northrop Grumman 
​13
Tue 04-11​General ​12:00 PM​Tuesday Lunch Keynote
Mark Riddle, National Archives Records Administration​
14
Tue 04-11Identify1:30 PMDeploying the Critical Security Control Framework…Like a Boss!Jon Tidwell, Collin County & Ian Anderson, Oklahoma City
15
Tue 04-11Protect1:30 PMNo Littering, No Smoking, and No Passwords - the next Societal Rule
Bob Kalka, IBM
16
Tue 04-11Detect
1:30 PMSoftware Defined Secure NetworkZach Forsyth, Juniper
17
Tue 04-11Respond1:30 PMEmbedding Incident Response into the DNA of the BusinessSean Mason, Cisco 
18
Tue 04-11Other1:30 PMManaging Your Security Program with SPECTRIM
David Maxwell, Columbia Advisory Group 
19
Tue 04-11Identify3:00 PMComply to Connect and the Impact of a Growing IoT MarketBob Reny, Forescout 
20
Tue 04-11Protect3:00 PMThe NOT Top 10: Public Sector Cybersecurity Trends Continue to ChallengeBob Smock, Gartner 
21
Tue 04-11Detect
3:00 PMVulnerable at Vulnerability Management? Start Small and Aim BigJoseph Alma, HHSC 
22
Tue 04-11Respond3:00 PMTake the Ransom out of Ransomware
Mark Jordan, Unitrends 
23
Tue 04-11Other3:00 PMSo You Need to Hire a Security Analyst?Michael Esparza, TAMU SOC 
24
Tue 04-11Other4:00 PMMission Driven Security: A New Approach to Secure Systems, Assets, Data and CapabilitiesDan Carayiannis, RSA 
25
Tue 04-11Other4:00 PMThreat Intelligence and Security CyberspaceThomas Aufiero, AT&T 
26
Tue 04-11Other4:00 PMA Day in the Life After You Implement the Identify, Detect, Protect, Respond, and Recover FrameworkNed Miller, Intel 
27
Tue 04-11Other4:00 PMCreating Your Information Security Incident Response ProgramDave Gray, CPA 
28
Tue 04-11Other4:00 PMManaging Risk and Improving Security – Texas Cybersecurity FrameworkStan Riemer & Jeremy Wolff, NTT Data 
29
Wed 04-12General8:00 AMWednesday Opening RemarksStacey Napier, DIR
30
Wed 04-12General8:30 AMWednesday KeynoteNiloofar Razi Howe– RSA 
31
Wed 04-12Geek Day10:00 AMCapture the Flag
Texas A&M Cybersecurity Center
32
Wed 04-12Geek Day10:00 AMCyberRangeKristy Leasman, Air National Guard 
33
Wed 04-12Geek Day10:00 AMTool DemonstrationKevin Cardwell, EC Council 
34
Wed 04-12Identify10:00 AMIdentify Your ImpactsJohn Green, TxDMV 
35
Wed 04-12Detect
10:00 AMDefend Against Ransomware: You Already Have the Capability. Why are You Not Using It?Michael Gough, Malware Archaeology 
36
Wed 04-12Detect
10:00 AM2017 NSOC Annual Threat Report OverviewJeremy Wilson, DIR 
37
Wed 04-12Identify11:00 AMHow I Learned to Stop Worrying and Love the Audit
Nate Howe, UT Dallas 
38
Wed 04-12Detect
11:00 AMThreat Hunting and Its Impact to the NIST Cybersecurity FrameworkRicky Allen, Critical Start 
39
Wed 04-12Detect
11:00 AMCyber Reconnaissance: An Advanced Cyber Threat Analytics Using High Performance Computing
Mike Wyatt & Doug Powers, Deloitte & Touche 


DISCLAIMER

DIR neither endorses the content, products, services, or viewpoints expressed by the linked files, nor assumes any responsibility for the content of these presentations. DIR makes no effort to independently verify, and does not exert editorial control over, information on presentations provided by third parties.

Reference to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by DIR or the State of Texas, and shall not be used for advertising or product endorsement purposes.