2018 Information Security Forum

ISF is an educational conference bringing together security and IT professionals from public sector organizations across the state of Texas.  This premier conference focuses on security trends and upcoming technologies with an estimated attendance of approximately 500 people including up to 400 security and IT professionals. ​

See Details

Location & Hours

Start Time:
May 23 2018
8:00 AM
End Time:
May 24 2018
4:15 PM
Palmer Events Center 900 Barton Springs Rd Austin Texas 78704 Email: isf@dir.texas.gov

2018 Information Security Forum (Event Materials)

May 23-24, 2018 | Austin, TX | Palmer Events Center |  ISF Website.

Hosted by the Texas Department of Information Resources (DIR) and managed by the Office of the Chief Information Security Officer (OCISO).

Conference materials for which DIR has permission to share are linked.  This is primarily content created by third parties. If you have difficulty viewing a posted document, please contact the EIR Accessibility Coordinator. Note: DIR cannot guarantee the accessibility of external content. Please also see the legal disclaimer at bottom of page.



Day

Track

Time

Event

Speaker

ISF 2018 Schedule-at-a-Glance

Wed 5-23

General

8:30 AM

Opening Remarks

Stacy Napier

Wed 5-23

General

9:00 AM

Keynote – Fireside Chat

Representative Giovanni Capriglione & Todd Kimbriel

Wed 5-23

Engagement

10:30 AM

Leveraging Technology for TAC 202 Risk Assessment at UT Austin

Cam Beasley | UT-Austin

Andrew Scheifele | Salty Cloud

Wed 5-23

Tooling

10:30 AM

Experience Protecting the Data in Transit to Meet IRS Requirements

Nei Mueller | OAG-CS

Wed 5-23

Staffing

10:30 AM

The Cyber Talent Gap: Considerations and Strategies

Michael Wyatt | Deloitte

Wed 5-23

Response

10:30 AM

Overview of the IDR Managed Security Services Incident Response

DuWayne Aikins | AT&T

Wed 5-23

Outreach

10:30 AM

How to Operationalize an Effective Data Loss Prevention Program

Brett Kelsey | McAfee

Wed 5-23

General

11:30 AM

Keynote

Scott Klososky

Wed 5-23

Engagement

1:00 PM

Conveying Security Program Effectiveness

Joshua Kuntz | TxDMV

Wed 5-23

Tooling

1:00 PM

Emerging Techniques for Threat Detection in Encrypted Traffic

Aaron Rodriguez | Cisco

Wed 5-23

Staffing

1:00 PM

Talent Wars - Preparing Undergraduates for Information Security Careers

Nate Howe | UT-Dallas

Wed 5-23

Response

1:00 PM

Trends, Threats, and Evolving Security Controls

James Sayles | SHI

Wed 5-23

Outreach

1:00 PM

The Increasing Role of Privacy in Cybersecurity

Barbra Symonds | Grant Thornton

Wed 5-23

Engagement

2:00 PM

Planning and Execution of an Effective Security Awareness Program

Martha Smith | TFC

Wed 5-23

Tooling

2:00 PM

The Four Innovations Driving Cybersecurity Forward

Additional Documents

Bob Kalka | IBM Security

Wed 5-23

Staffing

2:00 PM

Reducing Attack Surface in Budget-Constrained Agencies

John Dickson | Denim Group

Wed 5-23

Response

2:00 PM

The Keys to Building a Strong Incident Response Plan

Brian Engle | CyberDefenses

Wed 5-23

Outreach

2:00 PM

Are you prepared? Learn How People Attack You and How to Set the Stage for Security

Steve Lutinski | Verizon

Wed 5-23

Engagement

3:30 PM

Risky Business: An Honest Look at Assessing Risk

John Skaarup | HHSC

Wed 5-23

Tooling

3:30 PM

Creating an Identity-Aware Infrastructure: IAM at the Center of Security & IT Operations

Darran Rolls | Sailpoint

Wed 5-23

Staffing

3:30 PM

IT Professional Challenges and Complexities with Physical Security Networks

Trey West | Knight Security Systems (Masonry)

Wed 5-23

Response

3:30 PM

Threat Landscape of 2018 and Beyond: Lessons from Honeynets, DNS Disruptions, and IoT

Arthur Gordon | Watchguard

Wed 5-23

Outreach

3:30 PM

NSOC Services, Managed Security Services and the Annual Threat Report Overview

Jeremy Wilson | DIR

Thur 5-24

General

9:00 AM

Keynote

Guy Lidbetter

Thur 5-24

Engagement

10:30 AM

Maturing a Security Program to Support the New Texas Higher Education Strategic Plan

John House | THECB

Thur 5-24

Tooling

10:30 AM

Endpoint Visibility - Know Your Network

Wyatt Quintero |

Critical Start

Thur 5-24

Staffing

10:30 AM

Strengthen Your SecOps Team by Leveraging Neurodiversity

Megan Roddie |

Recon InfoSec, LLC.

Thur 5-24

Response

10:30 AM

Smarter Security - From the Edge to the Inside

Ron Kent | Aruba

Thur 5-24

Outreach

10:30 AM

Cybersecurity Best Practices and Free Tools to Get You There

Kateri Gill | MS-ISAC

Thur 5-24

Engagement

11:30 AM

Cyber Exposure Considerations in the Public Sector

Steve Smith | Tenable

Thur 5-24

Tooling

11:30 AM

How to Pen Test an ATM

Daniel Crowley |IBM X-Force

Thur 5-24

Staffing

11:30 AM

Cybersecurity Staffing and Organization Strategy for the Digital Age

Bob Smock | Gartner

Thur 5-24

Response

11:30 AM

DMARC: Applying Life's "Golden Rule" To Curb Spam and Phishing

Peter Donton | TVC

Thur 5-24

Outreach

11:30 AM

Digital Communities & Public-Sector Cybersecurity

Robert Myles | RSA

Thur 5-24

General

12:30 AM

Keynote

Dan Carayiannis


DISCLAIMER

DIR neither endorses the content, products, services, or viewpoints expressed by the linked files, nor assumes any responsibility for the content of these presentations. DIR makes no effort to independently verify, and does not exert editorial control over, information on presentations provided by third parties.

Reference to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by DIR or the State of Texas, and shall not be used for advertising or product endorsement purposes.