Content | Navigation |

Cyber Security Conference Agenda

2019 Conference - Thursday, March 14, 2019

7:30 — 8:15 a.m.

Conference Registration, Continental Breakfast and Sponsor Exhibit

8:15 — 8:30 a.m.Conference Welcome and Opening Remarks
8:30 — 9:25 a.m.Morning Keynote
9:30 — 10:20 a.m.Concurrent Sessions
10:20 — 10:50 a.m.Coffee with Sponsors
10:50 — 11:45 a.m.Concurrent Sessions
11:45 — 12:45 p.m.Lunch
12:45 — 1:35 p.m.Afternoon Keynote
1:40 — 2:30 p.m.Concurrent Sessions
2:30 — 3:00 p.m.Coffee with Sponsors
3:00 — 3:50 p.m.Concurrent Sessions
4:00 — 4:30 p.m.Closing
7:30 — 8:15 a.m.

Great Plains Ballroom,
NDSU Memorial Union

Registration,
Continental Breakfast,
and Sponsor Exhibit


The registration desk will be open from 7:30 — 8:15 a.m. Continental breakfast will be served, and conference sponsors will be available to visit with attendees.

8:15 — 8:30 a.m.

Great Plains Ballroom,
NDSU Memorial Union

Conference Welcome
and Opening Remarks


Hear opening remarks from the conference advisors and NDSU leadership as they welcome attendees to the conference and introduce the morning keynote.

8:30 — 9:15 a.m.

Great Plains Ballroom,
NDSU Memorial Union

Morning Keynote


David Kennedy
Founder TrustedSec
Binary Defense www.trustedsec.com

David Kennedy is founder of TrustedSec and Binary Defense Systems. Both organizations focus on the betterment of the security industry from both an offense and defense perspective. David also serves on the board of directors for the ISC2 organization. David was previously CSO for a Diebold Incorporated where he ran the entire INFOSEC program. He is a co-author of the book "Metasploit: The Penetration Testers Guide", the creator of the Social-Engineer Toolkit (SET), Artillery, and several popular open source tools. David has been interviewed by several news organizations including CNN, Fox News, MSNBC, CNBC, Katie Couric, and BBC World News. He is also the co-host of the social-engineer podcast and on several additional podcasts. David has testified in front of Congress on two occasions on the security around government websites. He is one of the founding authors of the Penetration Testing Execution Standard (PTES); a framework designed to fix the penetration testing industry. David is the co-founder of DerbyCon, a large-scale conference in Louisville, Kentucky. Prior to the private sector, David worked for the United States Marine Corps and deployed to Iraq twice for intelligence related missions.

9:30 — 10:20 a.m.

Concurrent Sessions

 

Century Theatre,
NDSU Memorial Union

Track 1

Technology, Operations and Procedures
Best practices for implementing critical security controls in your IT infrastructure.

Toby Barber
Designing Network Security Solutions to Support Defense, Detection, Advanced Investigation and Forensics

Arikara Room,
NDSU Memorial Union
Track 2

Governance, Policy and Compliance
Strategies for implementing campus technology policies to address changing legal and ethical environments.

Greg Wettstein
Blockchain: Pounding the Square Peg of Technology into the Round Hole of Reality

Hidatsa Room,
NDSU Memorial Union
Track 3

Education, Awareness and Training
Methods for providing IT security training and ideas for honing your skills as an information security officer or analyst.

Jeremy Straub
Cybersecurity Program at NDSU

Prairie Rose Room,
NDSU Memorial Union
Track 4

Sponsor
Innovative solutions from conference sponsors to incorporate security best practices into your IT security strategic plan.

Sean Reagan - Network Center, Inc.
Threat Hunting for the Rest of Us – Using Cisco Threat Response to Find and Stop the Bad Stuff

10:20 — 10:50 a.m.

Great Plains Ballroom,
NDSU Memorial Union

Coffee with Sponsors


Grab a cup of coffee. Visit sponsor displays and network with other attendees.

10:50 — 11:45 a.m.

Concurrent Sessions

 

Century Theatre,
NDSU Memorial Union

Track 1

Technology, Operations and Procedures

Tim Jensen
Inherent Risks of Microsoft Technologies

Arikara Room,
NDSU Memorial Union
Track 2

Governance, Policy and Compliance

Kateri Gill
Best Cybersecurity Practices while Traveling

Hidatsa Room,
NDSU Memorial Union
Track 3

Education, Awareness and Training

Ryan Knutson and Brent VanAartsen
Cyber Security in Higher Ed:​ Tales from Two ​Public SD Universities

Prairie Rose Room,
NDSU Memorial Union
Track 4

Sponsor

William Galvin - Giga-Green Technologies
Case Study: Phished and Cryptolocked - How to Get Back to Work

11:45 — 12:45 p.m.

Great Plains Ballroom,
NDSU Memorial Union

Lunch



12:45 — 1:35 p.m.

Great Plains Ballroom,
NDSU Memorial Union

Afternoon Keynote


Weston Hecker
Principal Application Security Engineer
NCR Corporation - www.ncr.com

Weston Hecker has been pen-testing for 13 years and has 15 years of experience doing security research and programming. He is currently working for NCR. Weston has recently spoken at Defcon 22, 23, 24 and 25 Blackhat 2016 Enterprise Connect 2016, ISC2-Security Congress, SC-Congress Toronto, BSIDESBoston, HOPE 11 and at over 50 other speaking engagements from telecom regional events to Universities on security subject matter. Weston works with a major university's research project with Department of Homeland Security on 911 emergency systems and attack mitigation. He attended school in Minneapolis Minnesota and studied Computer Science and Geophysics. Weston found several vulnerabilities in very popular software and firmware, including Microsoft, Qualcomm, Samsung, HTC, Verizon.

1:40 — 2:30 p.m.

Concurrent Sessions

 

Century Theatre,
NDSU Memorial Union

Track 1

Technology, Operations and Procedures

Craig Bowman
The Future of CyberSecurity

Arikara Room,
NDSU Memorial Union
Track 2

Governance, Policy and Compliance

Megan Stoner
Achieving Cybersecurity Through Project Management

Hidatsa Room,
NDSU Memorial Union
Track 3

Education, Awareness and Training

Major Terry Traylor
DakotaStrike

Prairie Rose Room,
NDSU Memorial Union
Track 4

Sponsor

Allen Lepke - High Point Networks
Social Engineering - A nontechnical approach on what to look for and how to safeguard against an attack.

2:30 — 3:00 p.m.

Great Plains Ballroom,
NDSU Memorial Union

Coffee with Sponsors


Grab a cup of coffee. Visit sponsor displays and network with other attendees.

3:00 — 3:50 p.m.

Concurrent Sessions

 

Century Theatre,
NDSU Memorial Union

Track 1

Technology, Operations and Procedures

Zachary Fink
Analyzing Malicious Documents

Arikara Room,
NDSU Memorial Union
Track 2

Governance, Policy and Compliance

Brad Nigh
Up Your Security Game, Starting with the Foundation

Hidatsa Room,
NDSU Memorial Union
Track 3

Education, Awareness and Training

Jill Baird and Paul Jensen - EduTech
Internet Safety

Prairie Rose Room,
NDSU Memorial Union
Track 4

Sponsor

Rick Griencewick - Hewlett-Packard
Securing the Modern Workplace

4:00 — 4:30 p.m.

Great Plains Ballroom,
NDSU Memorial Union

Closing


Stick around for closing remarks and drawings for door prizes from the conference sponsors.

Marc Wallman
Vice President for Information Technology, North Dakota State University


Student Focused. Land Grant. Research University.

Follow NDSU
  • Facebook
  • Twitter
  • RSS
  • Google Maps

North Dakota State University
Phone: +1 (701) 231-7961 / Fax: (701) 270-1231
Campus address: Quentin Burdick Building 206
Physical/delivery address: 1320 Albrecht Blvd, Fargo, ND 58102
Mailing address: NDSU Dept. 4500 / PO Box 6050 / Fargo, ND 58108-6050
Page manager: Office of the Vice President for Information Technology

Last Updated: Wednesday, March 06, 2019 11:56:19 AM
Privacy Statement