Skip to Main Content

11th Annual IT Security Awareness Fair

Agenda

  Go
  • Tuesday, October 2, 2012
  •  
    8:30 AM  -  9:00 AM
    Introduction and Opening Remarks
    Introduction of the 11th Annual IT Security Awareness Fair by State ISO Keith Tresh, and Opening Remarks by Secretary Carlos Ramos
    9:00 AM  -  9:50 AM
    Keynote: Advanced Threats: The New World Order - Act As Though You've Already Been Hacked
    Speaker: Dave Martin, RSA
    The events of the past 18 months have shown that determined adversaries can always find exploits through people and in complex IT environments. It’s no longer realistic to keep adversaries out. Organizations should plan and act as though they have already been breached. In this session, the speaker will provide a brief history of Advanced Threats, and what organizations are faced with today: The threat landscape has changed dramatically, malware has become more sophisticated, and techniques have advanced beyond traditional security’s domain expertise. Best practices for organizations and employees will round out the session to help combat today’s sophisticated threats.
     Optional 
    9:00 AM  -  9:50 AM
    Breakout Session 1: Capitals in the Clouds
    Speaker: Marianne Chick and Patrick McGuire, Office of Information Security
    This presentation by the Office of Information Security (OIS) will focus primarily on information security as it relates to cloud services applied to government. The discussion will begin with a brief introduction to the many types of cloud services including public, private and hybrids. Then we will chat about some key issues and concerns a government agency should consider while assessing cloud services including regulatory compliance, associated risks, and potential consequences. Finally, the OIS will provide an overview of which State policies an organization should evaluate when moving to cloud services, and which policies support cloud deployment. Our “mission” is to provide the most entertaining and engaging session “possible!”
     Optional 
    9:00 AM  -  9:50 AM
    Breakout Session 2: Security Transformation in the Public Sector - Security Transformation Success S
    Speaker: John Kronick, Accenture
    Security Transformation in the Public Sector - Security Transformation Success Story
    Despite spending significant sums of money on security, many organizations still fail security audits. In many cases, security is managed on an incident-to-incident, department-by-department, and day-by-day basis. However, senior leaders are quickly realizing that information security is not just a technology concern – it is a critical component of a high performing organization.
    Ultimately, the key challenges that IT executives face are how to manage security to meet today’s heightened need for protection of data while also maintaining control and compliance, and, how to prepare for a tomorrow in which security is aligned with the needs of an organization and a culture of security awareness and security proactivity is fostered.
    In the end, it’s every CIO’s, CTO’s and CISO’s dream to find the perfect solution that not only meets costs and user demands, but also adheres to regulatory compliance regimes.
    Along those lines, our discussion will present a current success story from an organization that overcame some of the aforementioned challenges and will highlight innovative solutions that the organization employed to deliver a high performance solution.
     Optional 
    9:00 AM  -  9:50 AM
    Breakout Session 3: Important e-Discovery Considerations
    Speaker: Monica Anderson, Supervising Deputy Attorney General, CA Attorney General's Office
    This session will provide an introduction to the Federal Rules of Civil Procedure (FRCP) governing e-discovery. On December 1, 2006 the FRCP were revised to address numerous e-discovery issues. Rules 16,26,33,34,37 and 45 require attorneys to pay specific attention to electronic discovery issues. E-Discovery practices and strategies need to be reviewed and aligned with the rules to ensure compliance. The session will highlight the implications for organizations and their Chief Information Officers and Chief Information Security Officers, lessons learned from early implementation of the revised rules, and available resources to support compliance.
     Optional 
    9:00 AM  -  9:50 AM
    Breakout Session 4: How to Secure Virtualized Environments
    Speaker: Dennis Bray, CTO, Enterprise Networking Solutions, Inc (ENS-Inc)
    Virtualization guru Dennis Bray will conduct an in-depth technical briefing on how to secure virtualized environments. New and innovative ideas coming out of agency business units are forcing IT shops to stay ahead of the security curve while still managing day-to-day business expectations. This briefing will cover technical requirements for security and how to effectively gather, consider, and implement security solutions. Whether we need to plan for multi-tenancy or remote access, we need to do so programmatically. This technical briefing will guide you on how to get there.
     Optional 
    10:00 AM  -  10:50 AM
    General Session: Threats Briefing
    Speaker: Jim Walter, McAfee
    The techniques employed by malicious actors continue to evolve. Today everyone is a potential target and end user awareness can be one of the most powerful protection measures an organization has to defend itself. We will provide insight into the latest threat trends over the past 6 months such as Hacktivism, Mobile Data Attacks and major data breaches. Then we will cover the new types of threats McAfee Labs’ researchers are expecting to see in the future. The audience will leave the session better prepared to help their organizations prepare for and defend against the next wave of threats.McAfee Labs, one of the largest security research teams in existence, continually observes and analyzes the activities of bad actors across the Internet. This session’s presenter, David Marcus, is the Director of the Advanced Research and Threat Intelligence group within McAfee Labs organization.
     Optional 
    10:00 AM  -  10:50 AM
    Breakout Session 5: Strategic Planning for Cloud Deployment
    Speaker: Seán Paul McGurk, Verizon
    This session will focus on the planning required for successful Cloud deployment. The session starts with understanding the various models of Cloud Computing by defining the attributes of each. Next, we examine how to architect a traditional data center solution utilizing the Cloud. This section will include tips on designing out single points of failure. Lastly, the session will take an in-depth look at development of a migration strategy and the considerations that need to be addressed. These include: When and what to move to the cloud, cloud evaluations of utility and warrantee, determining suitable applications, evaluating your cloud tools requirements for management, how is security integrated (or not) into the cloud, what data protection and sharing agreements will you need, which resources should be multi-tenant versus dedicated, what are the development considerations for Apps that will migrate to the cloud, and how will you handle role based access and chargeback.

     Optional 
    10:00 AM  -  10:50 AM
    Breakout Session 6: Breaking the Lifecycle of the Modern Threat
    Speaker: Chris King, Palo Alto Networks
    Network attacks are becoming both more sophisticated and more common, with all types of enterprises and all types of information being targeted by attackers. In this presentation we will shine light on the lifecycle of a modern network attack to understand how the threat landscape has changed and what is required from us as security professionals to protect our networks and users today. Attendees of this session will learn how to: Identify Key Characteristics of Modern Malware; Recognize malware infections; and Implement effective application and network controls.
     Optional 
    10:00 AM  -  10:50 AM
    Breakout Session 7: FBI - CyberSquad
    Speaker:  Michael Calhoon, Special Agent - FBI
    Intellectual Property Theft - A Case Study
    Advanced Persistent Threat (APT), intellectual property and cyber espionage attacks are on the rise. According to an October 2011 report to Congress on Foreign Economic Collection and Industrial Espionage issued by the Office of the National Counterintelligence Executive, “Foreign economic collection and industrial espionage against the United States represent significant and growing threats to the nation’s prosperity and security. Cyberspace—where most business activity and development of new ideas now takes place—amplifies these threats by making it possible for malicious actors, whether they are corrupted insiders or foreign intelligence services (FIS), to quickly steal and transfer massive quantities of data while remaining anonymous and hard to detect.” This session will help organizations better understand APT attacks, including how the detection, response, eradication and recovery methods differ, and more importantly why they should be concerned and engaged in implementing mitigation and early detection strategies.
     Optional 
    10:00 AM  -  10:50 AM
    Breakout Session 8: Using a Risk Assessment Tool to Establish a Security Capability Maturity Mode
    Speaker: Marianne Chick and Patrick McGuire, Office of Information Security

    Mission Possible: You Want Me to do What by When???

    This presentation will provide a brief introduction to the Capability Maturity Model (CMM) framework and illustrate how a baseline CMM can be established with the use of a risk assessment tool. The Office of Information Security (OIS) will demonstrate the Assessment Tool for State Agencies (available on the OIS website) to familiarize participants with, and to demystify, the risk assessment process. This presentation will be delivered by simplifying the task to demonstrate that THIS “mission” IS “possible!”

     Optional 
    11:00 AM  -  11:50 AM
    Breakout Session 9: Cloud Computing Security
    Speaker: Spiros Angelopoulos, Oracle
    The trend toward consolidation, be it through private or public cloud, further increases the need to understand transitional challenges on IT departments, CIOs and CTOs. Public Sector Agencies face a particular challenge as they try to modernize their environments and increase efficiency in order to maintain or expand their citizen-facing as well as internal operations. Please join Oracle to learn how you can mitigate some of the associated risks by using security controls with a solid foundation of Identity and Access Management (IAM) and Data Security strategies.
     Optional 
    11:00 AM  -  11:50 AM
    Breakout Session 10: If you were to be HACKED tomorrow, would you know exactly WHAT TO DO?
    Speaker: Peter Tran, RSA
    Traditional security is not working as evidenced by the 2012 Verizon Data Breach study, which indicates that 99% of breaches led to compromise within days or less, yet 85% of breaches took weeks to discover. Instead of focusing all security efforts on preventing breaches from occurring, it makes sense to develop a strategy and a process for post-breach activities. In this session, Peter Tran will educate the audience (from Board members to a Security Analyst) on how to prepare an organization focusing on the critical components and best practices of any security operation program for post-breach activities.
     Optional 
    11:00 AM  -  11:50 AM
    Breakout Session 11: The Five Habits of Highly Effective eDiscovery for Government Organizations
    Speaker: Allison Walton, Symantec
    The government faces unique challenges with regard to managing electronically stored information (ESI) including: litigation, record keeping requirements, FOIA requests, large volume of data, limited resources and a paper-centric environment.  This session offers practical solutions about how to implement a comprehensive and easy to deploy archiving and eDiscovery solution within your organization that will improve efficiency and defensibility while decreasing cost.  Because data is growing, budgets are tightening, and data infrastructures are becoming increasingly complex, many organizations are realizing they need to take control of these processes in-house.  Learn about the top 5 things you can do to: improve your access to large volumes of data needed for litigation or FOIA requests from an archive,  increase defensibility through an automated legal hold process, increase efficiency in the collection and review phases of eDiscovery, and meet production deadlines on time. Key elements of eDiscovery technology like: email threading, de-duplication of data, and early case assessment are key to the success of any government organization in the 21st Century. 

     Optional 
    11:00 AM  -  11:50 AM
    Breakout Session 12: Do's and Don'ts of Breach Notification
    Speakers: Joanne McNabb, Director of Privacy Education & Policy, California Department of Justice - Office of the Attorney General, and Michele Robinson - Deputy Director at the CA Office of Information Security
    This session will provide an overview of Civil Code Section 1798.29 requirements (the breach notification section of the California Information Practices Act), and highlight some of the best and less desirable practices observed in breach notifications.
     Optional 
    12:00 PM  -  1:30 PM
    Break for Lunch
    Enjoy your lunch during this break
    1:30 PM  -  2:20 PM
    General Session: Security Panel - Lessons Learned
    Panel Participants: Government CIO's and CISO's -
    Moderator - Michele Robinson, Deputy Director, CA Tech Agency, Office of Information Security
    Becky Stilling, Chief Information Officer/Deputy Director, Department of Child Support Services
    Jeana Pieralde, Chief Security Officer and Business Services Manager, City and County of San Francisco
    Terry Allen, Information Systems Manager, City of Oakland

    Lessons Learned - It Happened to Us, It Can Happen to You
    This moderated session will engage a diverse panel of government CIOs and CISOs in the sharing of lessons learned from a myriad of incidents occurring within their jurisdictions. All organizations are subject to the types of incidents which will be discussed. Don’t miss this opportunity to hear first-hand what your peers have experienced, how they responded and recovered from the situation, and the invaluable lessons learned. Our many thanks to these heroic individuals for agreeing to speak openly with us about the situations they’ve encountered in order to benefit our communities of interest.
     Optional 
    1:30 PM  -  2:20 PM
    Breakout Session 13: Not All Clouds are Created Equal - 5 Steps to Success
    Speaker: JD Sherry, TrendMicro
    Cloud Computing benefits apply to organizations of all sizes – but poor security can jeopardize these cost-savings benefits. Join JD Sherry/Trend Micro’s Director of Products and Technology for Public Sector as he shares the Top 5 considerations when journeying to the cloud. Mr. Sherry will also cover areas such as Types of Cloud Computing, Multi-Tenancy considerations, Pilot Phase successes, and security Best Practices based on his hands-on role within Trend Micro and other System Integrator firms. Emphasis will be on real-world examples and key learnings from Enterprise and Government.
     Optional 
    1:30 PM  -  2:20 PM
    Breakout Session 14: Assessing Strategy, Cost and Vulnerability
    Speaker: Jaymes Davis, Entisys
    The emergence of virtualization and the consumerization of IT as primary drivers of technology innovation and growth is a major industry shift. Technology managers who draw upon holistic IT security strategy are better prepared accommodate this shift, and to delineate and mitigate related risks that can potentially undermine an agency’s core business objectives. They can also better assist executive management with sound decisions relative to security and risk management budgets. This session will discuss strategy for the “new infrastructure” and application security, strategy for emerging trends in workforce mobility and endpoint security, and approaches to assess security costs and relative business vulnerabilities.
     Optional 
    1:30 PM  -  2:20 PM
    Breakout Session 15: What is Your Litigation Readiness Strategy?
    Speaker: Frank Tabch, CommVault
    Taking back control of an e-Discovery requestsYou just been hit with a e-Discovery request, now what? In today’s information overloaded society, we are all aware of the detrimental impact that responding to e-Discovery and governance requests can levy on organizations. As cost and complexity continue to rise at staggering rates, improving efficiencies and gaining control over corporate fate becomes even more critical.While traditional information management is based on a top down, application-driven approach to "silo-ing" data in a reactive model, a new trend in the industry employs a far more flexible "bottom up" approach. The result is a unique information governance solution that is cost managed, proactive, repeatable and defensible.Join CommVault and a panel of your peers for break out session to gain insight and learn new ways to tackle the business challenges of e-DiscoveryAgenda• A brief overview of E-discovery & Compliance• The evolving expectations for a reasonable and defensible E-discovery process• Challenges and pitfalls of collecting and dealing with E-discovery requests• New trends – Innovative and advanced technology for legal hold preservation, collection, and early data assessment• The big picture – creating an Information Governance for your organization.
     Optional 
    1:30 PM  -  2:20 PM
    Breakout Session 16: Managing the Risk in Your Enterprise Application Folder
    Speaker: Mark Curphey, McAfee
    Despite great intentions all companies manage a portfolio of applications that resembles the United Nations. Applications are created in-house and by outsourced vendors, use current and legacy technology, have been bought off the shelf and customized in every which way possible. With “one of everything” it’s tough to determine where to invest limited security resources. Should you perform code reviews of Application X? Should you do a penetration test of Application Y? Does Application X, release 2.0 mean you should conduct a new assessment or just look at incremental changes?
     Optional 
    2:30 PM  -  3:20 PM
    Closing Keynote: Risk Management - Managing the Problem
    Speaker: NIST Fellow Dr. Ron Ross
    Cyber attacks on information systems today are often aggressive, disciplined, well-organized, and in a growing number of documented cases, very sophisticated. Successful attacks on public and private sector information systems can result in serious or grave damage to the national and economic security interests of the United States. Given the significant and growing danger of these threats, it is imperative that leaders at all levels of an organization understand their responsibilities for achieving adequate information security and for managing information system-related security risks. NIST in partnership with the Department of Defense (DoD), the Office of the Director of National Intelligence (ODNI), and the Committee on National Security Systems (CNSS), has developed a common information security framework for the federal government, contractors, and organizations in the private sector choosing to use the framework on a voluntary basis. The intent of the common framework is to improve information security and to strengthen risk management processes. The six-step Risk Management Framework (RMF), the central construct of the common framework, emphasizes: (i) building information security capabilities into federal information systems through the application of state-of-the-practice security controls; (ii) maintaining awareness of the security state of information systems on an ongoing basis though enhanced monitoring processes; and (iii) providing essential information to senior leaders to facilitate decisions regarding the acceptance of risk to organizational operations and assets, individuals, other organizations, and the Nation arising from the operation and use of information systems. The RMF changes the traditional focus of cybersecurity as a static, procedural activity to a more dynamic approach that provides the capability to more effectively manage information system-related security risks in highly diverse environments of complex and sophisticated cyber threats, ever-increasing system vulnerabilities, and rapidly changing missions.
    3:20 PM  -  4:00 PM
    Closing Remarks by CA State ISO Keith Tresh
    4:00 PM  -  5:00 PM
    Meet and Greet Reception
    Held in the Solution Center
Top