DIR Information Security Forum (ISF) 2019

ISF is an educational conference bringing together security and IT professionals from public sector organizations across the state of Texas. This premier conference focuses on security trends and upcoming technologies with an estimated attendance of approximately 500 people including up to 400 security and IT professionals.

See Details

Location & Hours

Start Time:
Apr 23 2019
8:00 AM
End Time:
Apr 24 2019
5:00 PM
Palmer Events Center 900 Barton Springs Rd Austin Texas 78704 Email: isf@dir.texas.gov

2019 Information Security Forum 

April 23-24, 2019 | Austin, TX | Palmer Events Center | ISF Website 

Hosted by the Texas Department of Information Resources (DIR) and managed by the Office of the Chief Information Security Officer (OCISO).

Conference materials for which DIR has permission to share are linked.  This is primarily content created by third parties. If you have difficulty viewing a posted document, please contact the EIR Accessibility Coordinator. Note: DIR cannot guarantee the accessibility of external content. Please also see the legal disclaimer at bottom of page.

Information Security Forum 2019 Speaker Presentations

 

Day

Track

Time

Event

Speaker

01

Tues. 4-23

KEYNOTE

9:00

A Different Type of State Emergency: Cyber!

Deborah Blyth, CISO, State of Colorado

02

Tues. 4-23

Risk Management

10:30

Automate Your Vulnerability Management, so You Can Focus on Remediation!

Stephen Smith | Tenable

03

Tues. 4-23

Technology

10:30

Multifactor Authentication (MFA) Stopped the Hackers in Their Tracks

Dave Gray | CPA

04

Tues. 4-23

Governance

10:30

Using Your Agency's Microsoft Secure Score to Measure and Communicate Progress to the C-Level

Ed Higgins | Catapult Systems

05

Tues. 4-23

Analytics

10:30

Anatomy of an Attack

Jeremy Landry | Cisco Cloud Security

06

Tues. 4-23

Architecture

10:30

Moving from an Infrastructure to an Application Security Focus

Scottie Ray | VMware, Inc

07

Tues. 4-23

KEYNOTE

11:30

Hiring and Retaining Staff in Cybersecurity: Lessons Learned

Laura Lee | Circadence

08

Tues. 4-23

Risk Management

1:00

Breach!  Are you covered? (Cyber Insurance)

Mario Chavez | TDI

09

Tues. 4-23

Technology

1:00

The Threat of Rogue IoT Devices

Catherine Norcom | IBM

10

Tues. 4-23

Governance

1:00

From Federation to Centralization - Creating a Consolidated Information Security Program Across a University System (And Living to Tell About It!)

Mary Dickerson | UHSYS

11

Tues. 4-23

Analytics

1:00

Let Security Automation and Analytics Work for You

Luke Worrall | Juniper Networks

12

Tues. 4-23

Architecture

1:00

Managing Digital Risk

 

Tim Shea | RSA

13

Tues. 4-23

Risk Management

2:00

How a Risk Focus Results in Better Assessments and Stronger Security Programs

 

Brian Engle | CyberDefenses

14

Tues. 4-23

Technology

2:00

Cloud Security Solutions for Public Institutions: The Role of Technology in Cybersecurity & Safety

David Waugh | ManagedMethods, Inc.

15

Tues. 4-23

Governance

2:00

CISO Guide: How to Win Board Members and Influence Business Strategy

Michael Musick | Secureworks

16

Tues. 4-23

Analytics

2:00

The Rise of the Humans

 

Tony Hubbard | KPMG

17

Tues. 4-23

Architecture

2:00

Covering Your aaS (as a Service)

Derrick Ellis | McAfee

18

Tues. 4-23

Risk Management

3:30

Introducing the RiskRecon Internet Surface Report

 

John Chisum | Risk Recon

19

Tues. 4-23

Technology

3:30

Hunting for Flaws in your Crockpot: Overview of an IoT Pen Test 

Jonathan Stines | Rapid7

20

Tues. 4-23

Governance

3:30

Defending Layer 8

Brendan Dalpe | Critical Start

21

Tues. 4-23

Analytics

3:30

Catching BAD GUYS with Math - A Look at Machine-Learning (AI) and Big-Data in Cybersecurity

Eric Taylor and Tatianna Flores | Atos

22

Tues. 4-23

Architecture

3:30

Texas Consumer Digital Identity – It’s Already Here

 

Bharane Balasubramanian | Deloitte

23

Wed. 4-24

KEYNOTE

9:00

Is the Security Industry Even Solving our Problems? If not, What Can WE Do About That?

Allan Alford | Mitel

24

Wed. 4-24

Risk Management

10:30

Insider Threats – The #1 Security Risk

James O’Dell | AT&T

25

Wed. 4-24

Technology

10:30

Leveraging Technology for Third Party Vendor Risk Assessments at UT Austin

Cam Beasley | UT Austin

Drew Sheifele | Salty Cloud

26

Wed. 4-24

Governance

10:30

How Do You 'Do' Security in State Government?

John Skaarup | HHSC

27

Wed. 4-24

Analytics

10:30

Link Security Metrics to Business Impact for Increased Budget and Cyber Resiliency

Vinay Gandhi | Coalfire

28

Wed. 4-24

Architecture

10:30

Zero Trust Access: Five Steps to Securing the Extended Enterprise

Wendy Nather | Duo Security

29

Wed. 4-24

KEYNOTE

11:30

Killing them Softly with His Song

Aamir Lakhani | FortiGard Labs at Fortinet


DISCLAIMER

DIR neither endorses the content, products, services, or viewpoints expressed by the linked files, nor assumes any responsibility for the content of these presentations. DIR makes no effort to independently verify, and does not exert editorial control over, information on presentations provided by third parties.

Reference to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by DIR or the State of Texas, and shall not be used for advertising or product endorsement purposes.