2017 Information Security Forum

Presentation materials for the 2017 Information Security Forum (ISF) posted in the detail section.

ISF is an educational conference bringing together security and IT professionals from public sector organizations across the state of Texas.  This premier conference focuses on security trends and upcoming technologies with an estimated attendance of approximately 500 people including up to 400 security and IT professionals. 

See Details

Location & Hours

Start Time:
Apr 11 2017
8:00 AM
End Time:
Apr 12 2017
12:30 PM
Palmer Events Center 900 Barton Springs Rd 78704 Email: isf@dir.texas.gov

2017 Information Security Forum (Event Materials)

April 11-12, 2017 | Austin, TX | Palmer Events Center |  ISF Website.

Hosted by the Texas Department of Information Resources (DIR) and managed by the Office of the Chief Information Security Officer (OCISO).

Conference materials for which DIR has permission to share are linked.  This is primarily content created by third parties. If you have difficulty viewing a posted document, please contact the EIR Accessibility Coordinator. Note: DIR cannot guarantee the accessibility of external content. Please also see the legal disclaimer at bottom of page.

00ISF 2017 Schedule-at-a-Glance
01Tue 04-11General8:00 AMTuesday Opening Remarks
Stacey Napier & Nancy Rainosek, DIR
02Tue 04-11General8:30 AMTuesday Keynote
William (Dix) Dallas
03Tue 04-11Identify10:00 AMA Realistic Approach to Risk Assessments for State Agencies 
John Skaarup, DADS | Stan Hogan, HHSC | Steven Pryor, HHSC
04Tue 04-11Protect10:00 AMFighting Badness on the Internet through DMARC and DNS - Free Solutions that Make a Huge ImpactAdnan Baykal, Global Cyber Alliance 
05Tue 04-11Detect
10:00 AMCustomizing Our Investigation for Anomalies
Melinda Dade, TEA
06Tue 04-11Respond10:00 AMDigital Forensics: Order From Chaos Randy Stone, SecureWorks 
07Tue 04-11Other10:00 AMLiving off the Land: How Your Admin Tools Can Hurt You
R Trent Greenwood, Carbon Black
08Tue 04-11Identify11:00 AMRealizing a Vision for GRCLeigh Hausman, UT Dallas 
09Tue 04-11Protect11:00 AMPKI Wishes and Surplus Budget Dreams
Aaron Blackstone, TxDPS 
10Tue 04-11Detect
11:00 AMDetect Attacks by Combining UBA, Deception, and EDR
Eric Sun, Rapid7 
11Tue 04-11Respond11:00 AMArtificial Intelligence and Automation in Security - Helping the HumanHitesh Sheth, Vectra 
12Tue 04-11Other11:00 AMWomen in Cybersecurity: Challenges, Obstacles and Opportunities
Emily Darraj, Northrop Grumman 
Tue 04-11​General ​12:00 PM​Tuesday Lunch Keynote
Mark Riddle, National Archives Records Administration​
Tue 04-11Identify1:30 PMDeploying the Critical Security Control Framework…Like a Boss!Jon Tidwell, Collin County & Ian Anderson, Oklahoma City
Tue 04-11Protect1:30 PMNo Littering, No Smoking, and No Passwords - the next Societal Rule
Bob Kalka, IBM
Tue 04-11Detect
1:30 PM
Software Defined Secure NetworkZach Forsyth, Juniper
Tue 04-11Respond1:30 PMEmbedding Incident Response into the DNA of the BusinessSean Mason, Cisco 
Tue 04-11Other1:30 PMManaging Your Security Program with SPECTRIM
David Maxwell, Columbia Advisory Group 
Tue 04-11Identify3:00 PMComply to Connect and the Impact of a Growing IoT MarketBob Reny, Forescout 
Tue 04-11Protect3:00 PMThe NOT Top 10: Public Sector Cybersecurity Trends Continue to Challenge
Bob Smock, Gartner 
Tue 04-11Detect
3:00 PMVulnerable at Vulnerability Management? Start Small and Aim Big
Joseph Alma, HHSC 
Tue 04-11Respond3:00 PMTake the Ransom out of Ransomware
Mark Jordan, Unitrends 
Tue 04-11Other3:00 PMSo You Need to Hire a Security Analyst?Michael Esparza, TAMU SOC 
Tue 04-11Other4:00 PMMission Driven Security: A New Approach to Secure Systems, Assets, Data and CapabilitiesDan Carayiannis, RSA 
Tue 04-11Other4:00 PMThreat Intelligence and Security CyberspaceThomas Aufiero, AT&T 
Tue 04-11Other4:00 PMA Day in the Life After You Implement the Identify, Detect, Protect, Respond, and Recover Framework
Ned Miller, Intel 
Tue 04-11Other4:00 PMCreating Your Information Security Incident Response Program
Dave Gray, CPA 
Tue 04-11Other4:00 PMManaging Risk and Improving Security – Texas Cybersecurity Framework
Stan Riemer & Jeremy Wolff, NTT Data 
Wed 04-12General8:00 AMWednesday Opening RemarksStacey Napier, DIR
Wed 04-12General8:30 AMWednesday KeynoteNiloofar Razi Howe– RSA 
Wed 04-12Geek Day10:00 AMCapture the Flag
Texas A&M Cybersecurity Center
Wed 04-12Geek Day10:00 AMCyberRangeKristy Leasman, Air National Guard 
Wed 04-12Geek Day10:00 AMTool Demonstration
Kevin Cardwell, EC Council 
Wed 04-12Identify10:00 AMIdentify Your Impacts
John Green, TxDMV 
Wed 04-12Detect
10:00 AMDefend Against Ransomware: You Already Have the Capability. Why are You Not Using It?Michael Gough, Malware Archaeology 
Wed 04-12Detect
10:00 AM2017 NSOC Annual Threat Report Overview
Jeremy Wilson, DIR 
Wed 04-12Identify11:00 AMHow I Learned to Stop Worrying and Love the Audit
Nate Howe, UT Dallas 
Wed 04-12Detect
11:00 AMThreat Hunting and Its Impact to the NIST Cybersecurity FrameworkRicky Allen, Critical Start 
Wed 04-12Detect
11:00 AMCyber Reconnaissance: An Advanced Cyber Threat Analytics Using High Performance Computing
Mike Wyatt & Doug Powers, Deloitte & Touche 


DIR neither endorses the content, products, services, or viewpoints expressed by the linked files, nor assumes any responsibility for the content of these presentations. DIR makes no effort to independently verify, and does not exert editorial control over, information on presentations provided by third parties.

Reference to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by DIR or the State of Texas, and shall not be used for advertising or product endorsement purposes.