Skip to Main Content

Cybersecurity Symposium 2017

Please select the optional registration items below for the Education Breakout Sessions depending on your area of interest &/or job function.

  • >> Choose one session for each block of time <<
  • 10:00am - 1 hour Sessions
  • 11:00am - 1 hour Sessions
  • 12:30pm - Lunch Selection
  • 2:00pm - 1 Hour Sessions
  • 3:00pm - 1 Hour Sessions

The Opening Session, General Sessions, Awards Ceremony, Closing Session and the evening reception do not need to be selected during the registration process.  They will be included in your agenda. 




  • Closed  Closed
  • Optional  Optional
  • Thursday, September 21, 2017
    8:00 AM  -  5:00 PM
    Registration and Check In  (2nd Floor Foyer)
    8:00 AM  -  5:30 PM
    CSS2017 Solution Center  (2nd Floor Foyer)
    Explore the CSS2017 Solution Center throughout the day.
    8:30 AM  -  8:45 AM
    8:30am - Event Kick Off and Welcome  (San Jose Ballroom)


    Russ Hicks, President, Public Sector Partners, Inc.

    Sherilyn Hammond, Director of Events and Logistics, Public Sector Partners, Inc

    8:45 AM  -  9:00 AM
    8:30am - Opening Remarks  (San Jose Ballroom)

    Opening Remarks:

    Executive Sponsors for the 2017 Cybersecurity Symposium:
    Raj Patel, Chief Information Security Officer, City of Palo Alto
    Jackson Muhirwe, PhD, Chief Information Security Officer, City and County of San Francisco

    9:00 AM  -  9:45 AM
    9am - Opening Keynote Presentation: The Future Belongs to Cities – How Ready Are We?  (San Jose Ballroom)
    Keynote Speaker:
    Jonathan Reichental, Ph.D, Chief Information Officer, City of Palo Alto


    It’s 2017 and our planet is undergoing rapid urbanization. Today there are over 3.5 billion people living in cities, and by 2050 three billion more will join them. The city challenges of population growth, inadequate infrastructure, generating new economic opportunities, climate change, security and safety, and more are daunting and require the creation of bold and innovative urban development strategies. Without immediate and major shifts in our current trajectory, a good quality of life for city dwellers and the preservation of the environment are not sustainable. This talk will introduce the audience to a growing consensus that is beginning to emerge to tackle a seemingly intractable list of urban issues including cybersecurity.

    10:00 AM  -  10:45 AM
    10am - Session 1: Rock Drops and Dragons' Teeth - Instrumenting for the Breach  (Guadalupe)

    Speaker:  Justin Edgar, Solutions Architect, FireEye


    Description:  In this session, we will briefly examine the breach preparedness strategy currently deployed South of the Korean De-Militarized Zone (DMZ). We will use this metaphor to examine current best practices for network breach preparation across sector-relevant threat vectors and threat actors. Attendees will leave this session with practical ideas for instrumenting their networks to collect data relevant to scoping and remediating a breach.


    Intended Audience:  Network Operators, Security Analysts, Security Managers, Security and Information Executives.

    10:00 AM  -  10:45 AM
    10am - Session 2: Securing Smart Cities Shouldn’t Make You Wanna Cry  (Willow Glen 2)
    Tony Gillespie, US Public Sector Strategist, ForeScout Technologies
    Rob Lloyd, CIO, City of San Jose


    Description:  The vision of smart cities is bright—automating critical public services, improving community interactions and achieving untold levels of efficiency in a connected, technology-driven society. But along with all this boundless potential comes risk. Attacks like the Mirai botnet and WannaCry are a wakeup call about the looming risk of IoT ransomware.

    This session explores the cybersecurity challenges all smart cities will face with IoT and industry best practices for controlling it. Learn how to develop effective strategies and policies to address the potential damage we can expect from future attacks on billions of vulnerable IoT devices.


    Intended Audience:  IT professionals including CIOs CISOs, ISOs, IT Directors and Managers- Accross Security, Compliance, Asset Management, Network Operations.

    10:00 AM  -  10:45 AM
    10am - Session 3: Deploying cloud security against evolving techniques and tactics  (Salon VI)

    Speaker:  Jeff Stout, Akamai Technologies


    Description:  In today's hyper connected world there are more vulnerabilities on more devices then ever before. The attackers' capability to launch sophisticated cyber attacks as well as overwhelming DDoS (distributed denial of service) attacks has been commoditized as criminal organizations make automated tools more readily available. In this session will explore some of the latest attack techniques and tactics and how attackers are bypassing traditional security controls. As well as the next generation of defensive techniques which are successfully being used by State and Federal agencies to secure their critical data and their production environments.


    Intended Audience:  CIO's, CISO's, Information Security Managers and Administrators.

    10:00 AM  -  10:45 AM
    10am -Session 4: Risk Mgmt- If There is a Conversation You've Been Avoiding - That's the One to Have  (Willow Glen 1)

    Speaker:  Malcolm Harkin, Chief Security and Trust Officer, Cylance


    Description:  The biggest vulnerability we face today and in the future, is the misperception of risk. A perfect storm of risk has been brewing for decades and has hit with full force the past few years. It has moved from a backroom issue to the boardroom and many have not been prepared. This discussion will be about cyber risk leadership and the external and internal battlefields we face. We will explore what it takes to be a hero or heroine to navigate these battlefields and survive.

    We will discuss ways to communicate risks so that Executives will comprehend cyber risks not from the doom and gloom to scare people in to purchases but in the context of the enterprise risk and the top 10 universal business risks. Additionally, we will explore what everyone needs to look for in security solutions to ensure they meet the “hero or heroine” status that is required to achieve your business goals.


    Intended Audience:  The primary audience is CIOs and other IT leaders, CISOs and other information security leaders, IT auditors, and other leaders of corporate governance and risk functions. The secondary audience is CEOs, board members, privacy professionals, and less senior-level information security and risk professionals

    10:00 AM  -  10:45 AM
    10am - Session 5: How to Leverage Virtualization to Secure Critical Applications  (Willow Glen 3)

    Speaker:  Chris Corde, Sr. Director of Product Management, VMware, Networking & Security Business Unit


    Description:  In any modern data center, application workloads are provisioned, moved and decommissioned at will. At the same time, what we need for every single system that is deployed, is to secure all traffic without compromise to performance, user experience, or introducing unmanageable complexity. Traditional security has been perimeter-centric, hardware-centric, and inflexible, plus there has been a belief that simply piling on more security products somehow equated to better security. During our session, we will review why we need to evolve the standard approach to securing data centers. We will talk about how security can be applied transparently, and independently from the network itself, and how virtualization paves the way for implementing a new security model where we can leverage the unique properties of cloud and virtualization to secure our critical applications.


    Intended Audience:  Executive, Managers, Supervisors, CISO, Security Professionals, IT Architects, IT Professionals.

    10:00 AM  -  10:45 AM
    10am - Session 6: SCADA: Techniques to Avoid Being Socially Engineered  (San Carlos)

    Speaker:  Kunal Agarwal, GM, Internet of Things, Symantec


    Description:  Join your peers in learning about ways to avoid being socially engineered. This session will walk you through 3 spear phishing techniques that attackers use to gather key information on you, how the execution happens and what you can do to avoid being socially engineered. Learn the creative ways used; from innocent discussions to physical tactics that allow attackers to easily gather personal information and use this as a weapon against you.


    Intended Audience:  SCADA/ICS analysts, engineers

    10:00 AM  -  10:45 AM
    10am - Session 7: SANS Session - Incident Response: 7 phases of IR - have a plan.  (Salon V)

    Speaker:  Brian Ventura, Information Security Architect / SANS Instructor, City of Portland / SANS


    Description:  One of the most important phases of an Incident Response is having a plan. Let’s work through the scenario when something strange is happening on our network. What do we do? If we have established a plan of time, we will move to resolution much faster.

    Brian Ventura, Information Security Architect and SANS instructor will discuss the phases of Incident Response in detail. Brian brings a wealth of experience in information security and will provide examples of how plans and solutions.


    Intended Audience:  Information Security Officers, Information Security practitioners, Information Technology practitioners

    11:00 AM  -  11:45 AM
    11am - Session 08: DDoS Mitigation  (Willow Glen 2)
    Leon Li, Executive Director, Security Engineering, Operations and Access Management, Comcast Corporation
    Ron Speno, Director, CA Governement and Education, Comcast Business


    Description:  Join us as we explore iDDoS Mitigation. We will discuss best practices for proactive detection, alert notifications, and mitigation of attack traffic from both Distributed Denial of Service (DDoS) Attacks and synchronized volumetric attacks on network infrastructures (e.g., UDP Flood, etc.) from distributed sources (e.g., Bots), and Application-Layer attacks. Including relatively low volume application-layer with stealthy attack vectors (e.g., DNS Flood and malformed HTTP etc.) that exploit vulnerabilities, scale and functionality of applications.

    Additionally, the following areas presented:
    1. Protection Models (premise based, ISP based, Cloud based, and Hybrid)
    2. Tools and Technology used for mitigation (Arbor Networks)
    3. Impact to Network (possible panel spot for state customer)


    Intended Audience:  CISO's, CIO's and Network Managers

    11:00 AM  -  11:45 AM
    11am - Session 09: Manage Your Users & Applications Across a Hybrid and Cloud Environment  (Guadalupe)
    Speaker:  Subbu Iyer, Sr. Director, Product Management for Identity Access Management & Security, Oracle
    Panel Moderator: Thom Locke, Vice President Security, Bias Corporation
    Additional Panel Members:
    Manuel Fernandes, TSM - Security Solutions, Oracle


    Description:  As the perimeter fades, a new perimeter is identified in the form of the user. Securing the information, applications and services that organizations share today requires an Identity-centric model. These users cross network and brick and mortar boundaries and must be backed by the advanced solutions that can centralize and analyze to identify the new generation of threats.

    The session topic is Managing your Users & Applications Across a Hybrid and Cloud Environment with discussion of the following:
    • IDSOC
    • Information Security - Data Security
    • Risk Management
    • Analytics
    • Case Study on Office 365, BOX etc.


    Intended Audience:  Chief Security Officer (CSO), Security Operations Center (SOC), Manager LoB / Application Owners

    11:00 AM  -  11:45 AM
    11am - Session 10: Building the Blueprint for Information Security  (Salon VI)

    Speaker:  Shaun Land, Shaun Land, Consulting CTO/CISO, Dyntek


    Description:  Join us for a discussion on how to simplify the risk management process through defined and prioritized security controls and policy and procedure templates that align with industry standards such as NIST and COBIT 5. We will review creating security safeguards, incident response plans, and communication plans to enable organizations to avoid, detect and counteract security risks.

    We will dive into a simplified blueprint to assess your current state, plan and architect for a future state, remediate and deploy new security controls to strengthen your security process.


    Intended Audience:  CIO, CISO, Director or Managers of Tech, Network admin, security admin

    11:00 AM  -  11:45 AM
    11am - Session 11: Keeping the Enterprise Always On with IT Resilience  (Willow Glen 3)

    Speaker:  Don Rush, Systems Engineer, Zerto


    Description:  Your organization is always running and cannot afford downtime during a disaster or the traditional time it takes to recover from a security event. Backup solutions don’t solve these problems as they are not true Disaster Recovery for the business. What types of disasters will impact the business?

    Learn about Disaster Recovery scenarios, and the questions to ask and answer when planning your Disaster Recovery solution to drive true IT resilience. Learn which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.


    Intended Audience:  This session is aimed at both technical and management personal who are responsible for maintaining application uptime.

    11:00 AM  -  11:45 AM
    11am - Session 12: Rinse & Repeat - Good Security Hygiene  (Willow Glen 1)

    Speaker:  Jason Truppi, Director, Tanium


    Description:  News headlines continue to repeat that the cyberthreat landscape is constantly changing. But is it really? The main sources of major breaches continue to remain phishing emails, drive-by downloads and web-application vulnerabilities. And the root cause for these breaches remains a lack of basic security hygiene. In this presentation, Jason Truppi will draw on his experience in the field in order to provide examples of why security hygiene continues to remain a challenge and how organizations can keep systems clean, safe and secure.


    Intended Audience:  CISO's, Security Directors, Security Analysts, Incident Response Analysts, EDR Analysts

    11:00 AM  -  11:45 AM
    11am - Session 13: SCADA: Applying an Attack Lifecyle Model in Your ICS/OT Security Strategy  (San Carlos)

    Speaker:  Del Rodillas, Solution Lead for ICS/SCADA, Palo Alto Networks


    Description:  Cyberthreats to Industrial Control Systems have become very sophisticated making the goal of protecting these ICS and SCADA systems very daunting. The cyberattack lifecycle model is a very effective way to break down the challenge of detecting and preventing modern-day attacks to OT into manageable chunks.

    In this session, attendees will learn:
    ● How modern day ICS attacks such as the one to the Ukraine electric grid map into the cyberattack life cycle model
    ● The capabilities needed to address different phases of the attack to increase the odds of successful threat detection and prevention
    ● How to foster an environment of collaboration between OT and IT organizations to ensure coordinated coverage across the entire enterprise
    Examples will be drawn from real-world utility use cases to highlight key concepts.


    Intended Audience:  This presentation targets OT and IT security personnel responsible for developing, deploying, and maintaining cybersecurity systems for industrial control systems.

    11:00 AM  -  11:45 AM
    11am - Session 14: SANS - NIST CyberSecurity Framework usage, overview and 5-year plan  (Salon V)

    Speaker:  Brian Ventura, Information Security Architect / SANS Instructor, City of Portland / SANS


    Description:  Brian Ventura, Information Security Architect and SANS instructor will discuss NIST published the Cybersecurity Framework (CSF). What is this, why do I care and how can I use it to manage my security? In this talk I will present a Creative Commons framework management tool created and used at the City of Portland. The tool is provided at no cost for your organization. Additionally, we will cover the basics of the CSF, how we adapt the framework to the City's service catalog, track maturity, and manage a 5-year budget and plan


    Intended Audience:  Information Security Officers, Information Security practitioners, Information Technology practitioners

    12:30 PM  -  1:45 PM
    12:30pm - Lunch Keynote: What Are Successful Strategies for Protecting Local Government Information  (San Jose Ballroom)
    Raj Patel, CISO for the City of Palo Alto will moderate an Executive Panel of Cyber Experts from Local Government and Private Sector.


    Panel Members:
    • Frank Grimmelmann, President, Arizona Cyberthreat Response Alliance
    • Rob Lloyd, CIO, City of San José
    • Dave Halla, Senior Advisor, Johns Hopkins University, Applied Physics Laboratory


    Session Description: As our Nation’s first “preventers and responders,” State, local, and tribal governments are critical to our efforts to prevent future cyber-attacks and to respond when attacks occur. Those agencies must have access to the information that enables them to protect communities.


    New research from Johns Hopkins University looks at cybersecurity approaches that are making a difference nationally. This includes different approaches to multi-sector alliances, intelligence sharing, and operational effectiveness through shared cybersecurity services. Dave Halla, Senior Advisor for Johns Hopkins University Applied Physics Laboratory, will share their findings of the ecosystem for protecting state and local government from cybersecurity threats. Experts from government, utilities, and academia will discuss related questions that face all of us: How can organizations operationalize cybersecurity intelligence for defense? How do we develop the cybersecurity warriors that will protect our communities and infrastructure? And how can the cybersecurity community break down traditional barriers to integrate our intelligence sources—police, fire, utilities, transportation, Federal, and even emerging Internet-of-Things data— to become truly proactive?

    2:00 PM  -  2:45 PM
    2pm - Session 15: Who, What, Where, When and Why's around CLOUD SECURITY!  (Salon V)

    Speaker:  Vaishali Patel, Zscaler


    Description:  Our focus session will be in regards to Cloud Security:

    1. Everything from basics (what to look for in cloud security vendors, what compliance status have they received ISO, SOC2, FedRamp, CJIS, etc) to

    2. Why move to cloud security vs traditional hardware (as org's move to O365/SAAS/IAAS, etc and internet traffic continues to increase) 

    3. Finally as security threats become far more advanced what benefits can cloud security provide in increasing over security posture and decreasing risk. Session will include gov county and city CIOs/CISOs who have already begun their transition into the cloud for security and lessons learned.


    Intended Audience:  CIO, CISO, Security and line of business

     Optional  Closed 
    2:00 PM  -  2:45 PM
    2pm - Session 16: The Key to Prioritized Risk Reduction and Cyber-Excellence  (Salon VI)

    Speaker:  Ted Gary, Sr. Product Marketing Manager, Tenable


    Description:  Government agencies, regardless of size, IT resources and budget, are faced with complying with California Assembly Bill 670 which mandates periodic cybersecurity risk assessments on state networks. Adhering to the CIS Controls, formerly known as the SANS Top 20, is a great path for agencies to reach AB 670 Compliance and build a foundation for other compliance requirements.

    In this session, we will discuss how to get started with the Center for Internet Security's Foundational Cyber Hygiene controls - the highest pay-off controls which are core to all security frameworks, including the NIST Cybersecurity Framework and NIST 800-171.

    Learning Objectives:
    • Why organizations are adopting security frameworks
    • Foundational controls to automate first
    • What automation must accomplish
    • How to build on the foundational controls
    • Using CIS Controls to build financial justification to meet Cyber-Security Goals


    Intended Audience:  Security Decision Makers (CISOs, VPs) and Security Practitioners

    2:00 PM  -  2:45 PM
    2pm - Session 17: Threat-Centric Vulnerability Remediation and Predictions for Cyber Security  (Willow Glen 2)

    Speaker:  Eric Anderson CTO,Security Operations, BMC


    Description:  This session will focus trends, insights and lessons learned from Gartner’s cybersecurity summit. Once a year, Garner brings together cyber security professionals, vendors and CISO’s to discuss industry trends, new threats, tactics and strategies for defending against cyber-attacks. After reviewing decades of data, some very insightful trends have emerged that will make protecting your sensitive data much easier than you though. We will discuss Gartner’s predictions for the next few years, as well as leaning how to protect your infrastructure from 99% of attacks, with only 10% of the effort.


    Intended Audience:  Executive, Managers, Supervisors, CISO, Security Professionals, IT Architects, IT Professionals.

    2:00 PM  -  2:45 PM
    2pm - #18: Find Map, Locate Treasure, Avoid Pirates- A Holistic Approach to Info Risk & Protection  (Guadalupe)

    Speaker:  Cindy Compert, CTO Data Privacy, IBM Security Division


    Description:  Ultimately the target of bad actors is your valuable data. Are you doing enough to protect the data that is critical to your organization and customers? The best practices for Information Risk and Protection are like playing “Treasure Hunt.” Imagine yourself in a tropical paradise. You need to find and guard a cache of valuable buried treasure. This session will first share the security trends and challenges that IBM sees in its 17,500 customers followed by a review of a best practice methodology and approach for identifying, classifying and holistically protecting your organizations critical data wherever it resides. Learn how you can find and guard your own “crown jewels” and keep pirates away.


    Intended Audience:  Risk & Compliance organizations, Data Privacy Officers, CyberSecurity Leadership, Organizational Data Stewards, CIO's, CTO's, IT Management, Database Management

    2:00 PM  -  2:45 PM
    2pm - Session 19: Allied Intelligence Sharing for Proactive Cybersecurity  (Willow Glen 3)
    Moderator: Rob Lloyd, CIO, City of San José
    Panel Members:
    • Frank Grimmelmann, President, Arizona Cyberthreat Response Alliance
    • Raj Patel, CISO, City of Palo Alto
    • Dave Halla, Senior Advisor, Johns Hopkins University, Applied Physics Laboratory


    Session Description: Cyber-attacks on the nation's critical infrastructure and sensitive data sources continue to increase in frequency and impacts. The risks and effects of these attacks spans sectors and there is a common interest in raising the baseline of cybersecurity through capabilities, sharing attack data, and in joint response. As clear as the benefits are, few models exist that show successful cybersecurity collaboration across Federal, State/Local government, Private Sector, Academia, Utilities, and Non-Profit partners. This session will dive into a review by Johns Hopkins University and highlight a leading model originating in Arizona. The alliance, ACTRA, functions as a separate member organization that empowers all-sector partners to shift from reactive cybersecurity to a higher level of protection and response. The session will include introductory content on the structure of ACTRA and other leading models, followed by a lightning panel discussion with industry experts


    Intended Audience: Leaders and stakeholders responsible for cybersecurity programs who are pursuing means to add core cyber capabilities, attack intelligence, and for joint response through a multi-sector alliance.

    2:00 PM  -  2:45 PM
    2pm - Session 20: SCADA: Incident Response  (San Carlos)

    Speaker: Matt Sherman, Lead Investigator. Symantec


    Description:  Incident Response is an ever growing part of our jobs that requires extensive planning and skilled execution. This workshop will provide you with the tools needed to assess your ability to respond and provide guidance on what should be included in a incident response plan. A compromise does not need to equal disaster. Preparation is Key. Learn how to act with speed and precision.


    Intended Audience:  SCADA/ICS analysts, engineers,Security Officers, CIOs, CISOs, and anyone interested in best practices for incident response.

    3:00 PM  -  3:45 PM
    3pm - Session 22: Multi-Vector DDoS Attacks: What they are, how they work and how to mitigate them  (Willow Glen 3)

    Speaker: Jose Gomez, Senior Sales Engineer, Imperva


    Description: DDoS attacks are increasing at an astronomical rate every year; in 2017 Q2 alone we had reports of attacks on 86 countries.

    Minimize damage to your agency by learning more about what an attack consists of and what you can do to manage them. We will discuss best practices for mitigating everything from basic attacks to some of the more complex DDoS attacks out there. We will outline lessons learned and how you can protect your agency and its most valuable asset, its data!


    Intended Audience: CIOs, CISOs and Security Practicioners

    3:00 PM  -  3:45 PM
    3pm - Session 23: CA Public Records Laws- Mitigating Social and Mobile Compliance Risks  (Salon V)
    Panel Moderator:
    Mike Pagani Sr. Director of Product Marketing and Chief Evangelist Smarsh
    Additional Panel Members: 
    Jackson Muhrwe, PhD, Interim City Chief Information Security Officer, City/County of San Francisco
    Shawn Savadkohi, Information Security Officer, San Mateo County Health System
    Bonnie Page,General Counsel, Smarsh


    Description:  Evolving California Public Records Legislation is forcing local government organizations into a tenuous position of expanding the use of social and mobile communications for the many benefits they provide, while maintaining proper retention and oversight to mitigate compliance risks.Though social and mobile communications technologies and platforms are providing unprecedented gains in productivity, reach, visibility and engagement, mitigating the risks driven by the sheer volume of the communications and the widening diversity of channels, coupled with new generation employees, the Public they serve, and the need to maintain responsive transparency remains an unresolved challenge for many organizations.

    This session explores, in detail, social and mobile communications usage trends and drivers, as well as the specific risks, challenges and pitfalls to avoid. Lastly, we will examine specialized technology and best practices to deploy as an efficient and effective solution.


    Intended Audience:  Executives, Managers, Supervisors, Architects, Technical staff, Mobile Support Staff, Clerks and Legal Staff-individuals that support mobile or social communciations, or is tasked with searching for, retrieving, reviewing or producing data to satisfy Public Records Requests.

     Optional  Closed 
    3:00 PM  -  3:45 PM
    3pm - Session 24: Securing the end point - the most targeted access point!  (Salon VI)

    Speaker:  TBD, Entisys360


    Description:  This session with be a conceptual discussion identifying the numerous risks that end point devices such as PCs, laptops, tablets, and smart phones present to the security of your enterprise and its data. End point devices are the single most vulnerable and targeted devices that account for the majority of Cyber attacks, data breaches, and ransomware attacks. Utilizing Privilege Management, Application Whitelist / Blacklist / Greylist and Content Isolation, more than 85% of these risk can be easily and successfully mitigated.


    Intended Audience:  IT Security specialists (CSO, VP of Security), IT administrators, Risk mitigation specialists

    3:00 PM  -  3:45 PM
    3pm - Session 25: Leverage DNS and IP Data to Prevent Data Exfiltration, Ransomware, etc.  (Guadalupe)

    Speaker:  Prakash Nagpal, VP Product Marketing, Infoblox


    Description:  Today’s evolving network environment is no less epic than the industrial revolution. There is so much change going on–billions of active Internet users and connected devices, adoption of cloud and SDN, and new trends like IoT. These changes increase exposure to cyber threats and attacks, even with all the many different security products from many vendors. While security is a defense in depth play, the various security products end up working in silos and create operational headaches. There is so much overflow of data that you can’t easily get to the valuable information.

    Learn how to:

    • Leverage DNS, DHCP and IP Inventory data to help prioritize threat response

    • Gain visibility into your diverse networks of physical, virtual and cloud components

    • Use DNS, a ubiquitous component in every network, to fill security gaps and provide the first line of defense against ransomware, data exfiltration and other threats


    Intended Audience:  Local government team members responsible for all or part of their organization’s infrastructure as a networking, security, or IT team member

    3:00 PM  -  3:45 PM
    3pm - Session 27: SCADA: Cybersecurity resources available for a great cost.  (San Carlos)
    Moderator: Mike Seamons, Control and Electrical Systems Manager, Sacramento Regional County Sanitation District
    Panel members for critical infrastructure support:
    Brian Calkin, Vice President of Operations, Center for Internet Security (CIS)
    Brian Banning, President, InfraGuard
    Leslie Ross, Regional Account Manager, Symantec


    Description:  Is your entity a state, local, territorial or tribal? Is your entity a critical infrastructure? You have resources available at no cost to help you with your cybersecurity efforts. Know where to go to get a vulnerability assessment for your entity at no cost. Find out where you can have a file or URL analyzed for malicious code at no cost. Get threat notifications, and security advisories delivered to your email. Be included in vulnerability management program and so much more. Come and hear the offerings that other entities have found beneficial.


    Intended Audience:  CIOs, CISOs, any one working on ICS/SCADA systems and IT systems security.

    4:00 PM  -  4:30 PM
    4pm - CSS2017 Closing Remarks  (San Jose Ballroom)

    Join us for the Closing Remarks, followed by the 2017 Cybersecurity Symposium Event Reception throughout the 2nd Floor Foyer, Solution Center.

    4:30 PM  -  5:30 PM
    4:30pm - 2017 Cybersecurity Symposium Reception  (2nd Floor Foyer)
    Join us for a reception following the Closing Remarks.