#IANSHouston #IANSEvents
September 11, 2019
Marriott Marquis Houston,
1777 Walker St,
Houston,
TX
The IANS 2019 Houston Information Security Forum delivers an immersive curriculum with 15+ sessions led by esteemed IANS Faculty, global information security thought leaders and solution providers. Attend the one-day Forum to gain actionable technical solutions and leadership insights focused on current and emerging challenges facing enterprise security leaders. Network with peers to benchmark your information security practices and engage with IANS Faculty during interactive sessions.
Stephen is the COO of Summit Technology Laboratory (STL), a deep tech projection mapping start-up based out of Irvine CA. Stephen serves on the boards of Education Loan Finance (ELFi), a not-for-profit student loan financial holding company, Support Systems Associates INC (SSAI) a medium size defense contractor and the Jack and Jill Late Stage Cancer Foundation (JAJF), a national charity. Stephen served 32 years in the United States Air Force Special Operations community retiring as a Major General. He is a combat pilot with multiple deployments in Bosnia, Somalia, Haiti, Afghanistan and Iraq with leadership tours at the squadron, group, wing and Task Force level.
After an extensive career in military leadership positions, Major General Stephen Clark knows there's a compelling distinction between a quality manager and a high-performing leader. At their extremes, people are compelled to follow managers because they have to, while they willingly follow leaders because they want to.
As such, highly effective leaders understand that true leadership is a human endeavor and requires understanding the aspirations, motivations and abilities of individuals and the development of an empathetic relationship. At the core of servant leadership is the belief that if we take care of our people, they will take care of the business. Key to building relationships is the ability to clearly communicate the vision, values and limitations that we expect our businesses to operate within through actions, words and behavior. Making the transition from manager to leader is a journey of experience, learning, failure and introspection…along with a heavy dose of courage and humility.
Teri Radichel is the CEO of 2nd Sight Lab, a cloud security company that offers cloud security training, penetration tests, and cloud security assessments to organizations worldwide. She is the author of the book Cybersecurity for Executives in the Age of Cloud, an AWS Hero and meetup organizer, a member of the IANS Faculty and Infragard, and received the SANS 2017 Difference Makers Award for security innovation. Teri holds numerous cloud security certifications, including the GSE, which many regard as one of the most challenging certifications to obtain in cybersecurity. She was a member of the original Capital One cloud team and has worked as Cloud Architect, Director of SAAS Engineering, and now CEO, helping companies secure their clouds. Teri has spoken at numerous conferences worldwide including AWS re:Invent, re:Inforce, RSA, OWASP AppSec Day, and Serverless Days, to name a few.
Fortune 1000 organizations have a complex legacy of platforms, software and networks, and there’s no single playbook to move it all to a new platform because each piece of infrastructure is so different. But there are ways to achieve success. This session will show you how by addressing:
Ken is the President and Principal Consultant of KRvW Associates, LLC, an independent information security consulting company, and a Visiting Scientist at Carnegie Mellon University. He has held executive and senior technologist positions at Tekmark, Para-Protect, Science Applications International Corporation (SAIC), the U.S. Department of Defense, Carnegie Mellon University, and Lehigh University. Ken is a frequent speaker at technical conferences, and has presented papers and training for CSI, ISF, USENIX, FIRST, CERT, among others.
Companies still struggle to get developers and security on the same page. They need case studies to show them where and how DevSecOps successes have happened. To that end, this session explores:
Bill is a Shareholder at LBMC Information Security,where he is responsible for security assessments, incident response, digital forensics, electronic discovery and overall litigation support. He also serves as an expert witness in federal courts and numerous state courts and has conducted digital forensic investigations and electronic discovery services to support litigation efforts. He is also an active member of the International Society for Forensic Computer Examiners and Board Member in East Tennessee’s InfraGard Chapter.
Network security and monitoring remains essential in light of increasing volumes of data and an ever-expanding threat landscape, but comprehensive network visibility is hard, and organizations need better guidance. This session aims to provide that by looking at:
Riley is Technical Product Marketing Manager at Code42 where he enjoys educating Security and IT teams through engaging technical content and presentation. Previously, Riley served in both customer support and customer education roles at Code42. In his spare time, he enjoys photography, travel and relaxing at the lake in northern Wisconsin with his pug Mimi.
Teri Radichel is the CEO of 2nd Sight Lab, a cloud security company that offers cloud security training, penetration tests, and cloud security assessments to organizations worldwide. She is the author of the book Cybersecurity for Executives in the Age of Cloud, an AWS Hero and meetup organizer, a member of the IANS Faculty and Infragard, and received the SANS 2017 Difference Makers Award for security innovation. Teri holds numerous cloud security certifications, including the GSE, which many regard as one of the most challenging certifications to obtain in cybersecurity. She was a member of the original Capital One cloud team and has worked as Cloud Architect, Director of SAAS Engineering, and now CEO, helping companies secure their clouds. Teri has spoken at numerous conferences worldwide including AWS re:Invent, re:Inforce, RSA, OWASP AppSec Day, and Serverless Days, to name a few.
Cryptojacking malware and crypto mining are eating AWS resources, tying up CPU capacity and costing money. This session will help you fight back by exploring:
Teri Radichel is the CEO of 2nd Sight Lab, a cloud security company that offers cloud security training, penetration tests, and cloud security assessments to organizations worldwide. She is the author of the book Cybersecurity for Executives in the Age of Cloud, an AWS Hero and meetup organizer, a member of the IANS Faculty and Infragard, and received the SANS 2017 Difference Makers Award for security innovation. Teri holds numerous cloud security certifications, including the GSE, which many regard as one of the most challenging certifications to obtain in cybersecurity. She was a member of the original Capital One cloud team and has worked as Cloud Architect, Director of SAAS Engineering, and now CEO, helping companies secure their clouds. Teri has spoken at numerous conferences worldwide including AWS re:Invent, re:Inforce, RSA, OWASP AppSec Day, and Serverless Days, to name a few.
Security Operations Centers remain rooted in the same tech, procedures and mindsets that existed before the cloud. They need to adapt to life in the cloud, and this session will explore how to get there. Issues addressed include:
Ken is the President and Principal Consultant of KRvW Associates, LLC, an independent information security consulting company, and a Visiting Scientist at Carnegie Mellon University. He has held executive and senior technologist positions at Tekmark, Para-Protect, Science Applications International Corporation (SAIC), the U.S. Department of Defense, Carnegie Mellon University, and Lehigh University. Ken is a frequent speaker at technical conferences, and has presented papers and training for CSI, ISF, USENIX, FIRST, CERT, among others.
Companies are usually unaware that a malicious insider is up to no good in their networks until it’s too late. They need help knowing how to identify early red flags. To that end, this session will explore:
Bill is a Shareholder at LBMC Information Security,where he is responsible for security assessments, incident response, digital forensics, electronic discovery and overall litigation support. He also serves as an expert witness in federal courts and numerous state courts and has conducted digital forensic investigations and electronic discovery services to support litigation efforts. He is also an active member of the International Society for Forensic Computer Examiners and Board Member in East Tennessee’s InfraGard Chapter.
Your Red Team does one thing, your Blue Team does the other, and they don’t talk. Companies struggle to get them on the same page and achieve the true value of these exercises. What to do? This session will explore:
Bill is a Shareholder at LBMC Information Security,where he is responsible for security assessments, incident response, digital forensics, electronic discovery and overall litigation support. He also serves as an expert witness in federal courts and numerous state courts and has conducted digital forensic investigations and electronic discovery services to support litigation efforts. He is also an active member of the International Society for Forensic Computer Examiners and Board Member in East Tennessee’s InfraGard Chapter.
Attackers keep evolving their tactics, making it increasingly difficult for traditional forensic techniques to keep up. It’s time to get proactive – and that’s where threat hunting comes into play. This session explores the latest techniques in that area, and how to:
Ken is the President and Principal Consultant of KRvW Associates, LLC, an independent information security consulting company, and a Visiting Scientist at Carnegie Mellon University. He has held executive and senior technologist positions at Tekmark, Para-Protect, Science Applications International Corporation (SAIC), the U.S. Department of Defense, Carnegie Mellon University, and Lehigh University. Ken is a frequent speaker at technical conferences, and has presented papers and training for CSI, ISF, USENIX, FIRST, CERT, among others.
Companies struggle to find a successful recipe for their security culture and need a concrete example of what another company has done to get it right. This session will offer:
Riley is Technical Product Marketing Manager at Code42 where he enjoys educating Security and IT teams through engaging technical content and presentation. Previously, Riley served in both customer support and customer education roles at Code42. In his spare time, he enjoys photography, travel and relaxing at the lake in northern Wisconsin with his pug Mimi.
Stephen is the COO of Summit Technology Laboratory (STL), a deep tech projection mapping start-up based out of Irvine CA. Stephen serves on the boards of Education Loan Finance (ELFi), a not-for-profit student loan financial holding company, Support Systems Associates INC (SSAI) a medium size defense contractor and the Jack and Jill Late Stage Cancer Foundation (JAJF), a national charity. Stephen served 32 years in the United States Air Force Special Operations community retiring as a Major General. He is a combat pilot with multiple deployments in Bosnia, Somalia, Haiti, Afghanistan and Iraq with leadership tours at the squadron, group, wing and Task Force level.
Bill is a Shareholder at LBMC Information Security,where he is responsible for security assessments, incident response, digital forensics, electronic discovery and overall litigation support. He also serves as an expert witness in federal courts and numerous state courts and has conducted digital forensic investigations and electronic discovery services to support litigation efforts. He is also an active member of the International Society for Forensic Computer Examiners and Board Member in East Tennessee’s InfraGard Chapter.
Teri Radichel is the CEO of 2nd Sight Lab, a cloud security company that offers cloud security training, penetration tests, and cloud security assessments to organizations worldwide. She is the author of the book Cybersecurity for Executives in the Age of Cloud, an AWS Hero and meetup organizer, a member of the IANS Faculty and Infragard, and received the SANS 2017 Difference Makers Award for security innovation. Teri holds numerous cloud security certifications, including the GSE, which many regard as one of the most challenging certifications to obtain in cybersecurity. She was a member of the original Capital One cloud team and has worked as Cloud Architect, Director of SAAS Engineering, and now CEO, helping companies secure their clouds. Teri has spoken at numerous conferences worldwide including AWS re:Invent, re:Inforce, RSA, OWASP AppSec Day, and Serverless Days, to name a few.
Ken is the President and Principal Consultant of KRvW Associates, LLC, an independent information security consulting company, and a Visiting Scientist at Carnegie Mellon University. He has held executive and senior technologist positions at Tekmark, Para-Protect, Science Applications International Corporation (SAIC), the U.S. Department of Defense, Carnegie Mellon University, and Lehigh University. Ken is a frequent speaker at technical conferences, and has presented papers and training for CSI, ISF, USENIX, FIRST, CERT, among others.
Code42 is the leader in data loss protection, visibility and recovery solutions. Native to the cloud, the Code42 Next-Gen Data Loss Protection solution rapidly detects insider threats, satisfies regulatory compliance requirements and speeds incident response — all without lengthy deployments, complex policy management or blocks on user collaboration. Security, IT and compliance professionals can protect endpoint and cloud data from loss, leak and theft while maintaining an open and collaborative culture for employees.
Founded in 2001, more than 50,000 organizations worldwide, including the most recognized brands in business and education, rely on Code42 to safeguard their ideas. The company is headquartered in Minneapolis, Minnesota, and backed by Accel Partners, JMI Equity, NEA and Split Rock Partners. For more information, visit code42.com, read Code42’s blog or follow the company on Twitter.
Contrast Security enables applications to automatically detect and fix vulnerabilities, identify attacks, and defend themselves. Contrast employs security instrumentation to strengthen applications before they deploy, protect in production and provide visibility throughout the application lifecycle. More information can be found at www.contrastsecurity.com or by following Contrast on Twitter at @ContrastSec.
Tenable®, Inc. is the Cyber Exposure company. Over 24,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 25 percent of the Global 2000 and large government agencies.
Room Rate:
$225per night plus tax
Attendees may earn up to 16 credits through our partnership with (ISC)2. Attendees must check in at registration each morning to receive their 8 credits for Day 1 and Day 2. Attendees will receive a Certificate of Completion one week after the forum concludes for any other certification needs. If you have provided IANS with your CISSP # during the registration process then we will automatically submit to (ISC)2.
The Forum is complimentary and open to active Information Security Professionals from private and public sector corporations and organizations.
The Forum officially begins on Day 1 at 7:30am and ends on Day 2 at 4:40pm.
All roundtable sessions will be available after the Forum.
Please share your thoughts and excitement using our event hashtags found at the top of this page.
We encourage you to fill out our general survey located in the middle of your program. Please drop off your survey at the registration desk before you leave.
Free Wi-Fi will be provided throughout the Forum in conference areas.
When attending an IANS Information Security Forum, you will have the opportunity to take part in technical and strategic Roundtable sessions that discuss the latest issues and trends found in the market. These Roundtable discussions are led by IANS Faculty who are also long-time information security practitioners. You will also have the chance to network with industry peers and learn about the newest technologies and services during any one of our Technology Spotlight sessions.
For all updates please follow us on Twitter.
Your badge and registration materials will be available to pick-up at the registration desk. Registration starts at 7:30am.
There will be chances to network with your peers during the lunches, breaks and the networking reception at the end of day one.
IANS requests that cancellations please be submitted two weeks prior to a Forum. Reserved seats are limited.
If you have booked a hotel room with IANS during the registration process or you have reached out to an IANS team member regarding booking a room, please note our venues have a cancellation policy of 48 hours. If you do not cancel your reservation through your online registration or in writing to IANS, you will be charged for the night(s) in which you have failed to cancel.
This Forum is produced by IANS, which reserves the right, in its sole discretion, to limit or deny access to the Forum to any entity or individual. Attendance to the Forum is complimentary and open to active information security professionals from private and public-sector corporations and organizations.
Individuals from information security solution providers (software, hardware, and consulting companies) are not eligible to attend unless affiliated with a sponsoring organization.
IANS reserves the right to share attendee contact information with event sponsors and other attendees. IANS will provide on-site opt-out forms that enable you to remove your contact information from being shared as described herein. No contact information will be shared prior to the event.
Photography, Audio & Video Recording
IANS Forums are held in a public venue; therefore, IANS does not prohibit participants, sponsors, or other companies from photographing or taking videos. IANS reserves the right to use images taken at IANS Forums with your photograph and/or likeness in marketing materials.
IANS Code of Conduct
IANS is committed to providing a harassment-free conference experience for all attendees, sponsors, speakers and staff regardless of gender, sexual orientation, disability, physical appearance, national origin, ethnicity, political affliction or religion.
IANS expects all participants to behave in a professional manner. IANS will not condone any form of sexual language and imagery, verbal threats or demands, offensive comments, intimidation, stalking, sustained disruption of session or events, inappropriate physical contract, and unwelcomed sexual attention.
If any form of written, social media, verbal, or physical harassment is reported, participant will be asked to stop and expected to comply immediately. Offender will be subject to expulsion from the conference.
If you are being harassed or notice someone being harassed, please contact the event staff. In the event of an emergency situation, please contact local authorities immediately.
We expect participants to follow these rules at all event venues and event-related social activities.
All hotel requests must be made through the registration site.
Most of our hotel venues have a 72 hour cancellation policy. You must cancel by contacting one of the IANS team members or through the online registration. If you fail to do so you will be charged for the night(s) in which you have failed to cancel.
IANS does not cover any parking.
IANS provides a room block for forum events. There will be a limited number of rooms available at the discounted rate.
You will receive a hotel confirmation number 2 weeks prior to the Forum.