2020 Nashville
Information Security Forum

#IANSNashville #IANSEvents

May 5, 2020
Hilton Nashville Downtown, Nashville, TN

The IANS 2020 Nashville Information Security Forum delivers an immersive curriculum with 30+ sessions led by esteemed IANS Faculty, global information security thought leaders and solution providers. Attend the one-day Forum to gain actionable technical solutions and leadership insights focused on current and emerging challenges facing enterprise security leaders. Network with peers to benchmark your information security practices and engage with IANS Faculty during interactive sessions.

Let your colleagues know you're coming!
Register

Day 1

7:30 AM - 8:30 AM

Registration & Continental Breakfast

Come check in to receive your program and CPEs while enjoying a complimentary continental breakfast.
8:30 AM - 8:45 AM

IANS Welcome & State of the Industry

Come join us as we welcome you to the Forum.
8:45 AM - 9:15 AM

Keynote

More information coming soon.
9:15 AM - 9:30 AM

Tabletop Break

IANS Tabletops gives you an opportunity to connect with information security leaders in a relaxed environment. Come stretch your legs and network with your peers and solution providers over snacks and coffee.
9:30 AM - 9:45 AM

Technology Spotlight Sessions Group 1

Join the Technology Spotlight session where Sponsors will present their innovative technology. Each session will last 35 minutes and are both technical and educational in nature. This is your opportunity to stay current on emerging technologies and see what is going on in the space.
9:50 AM - 10:05 AM

Technology Spotlight Sessions Group 2

Join the Technology Spotlight session where Sponsors will present their innovative technology. Each session will last 35 minutes and are both technical and educational in nature. This is your opportunity to stay current on emerging technologies and see what is going on in the space.
10:10 AM - 10:25 AM

Technology Spotlight Sessions Group 3

Join the Technology Spotlight session where Sponsors will present their innovative technology. Each session will last 35 minutes and are both technical and educational in nature. This is your opportunity to stay current on emerging technologies and see what is going on in the space.
george-gerchow

George Gerchow

IANS Faculty

George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.

10:35 AM - 11:35 AM Security Operations

Cutting-Edge Security Operations in the Cloud

with George Gerchow

Security teams know they need to scale their security operations program in the cloud, but how? This session takes attendees through the nuts and bolts of creating a cloud-based, cutting-edge security operations center (SOC), including:

  • Approaches to automation
  • How to foster more well-rounded team members who can handle tasks outside their daily focus
  • Differences between security operations as part of IT, and information security groups that focus on governance and oversight
  • Understanding when security operations are best insourced or outsourced
  • Examples of how successful organizations deploy their information security resources around the globe
jake-williams

Jake Williams

IANS Faculty

Jake is the Founder, President, and Principal Analyst of Rendition Infosec, an information security consultancy. He also sits on the Vulnerability Review Board at Peerlyst, a startup social networking platform exclusively for security professionals. Jake is a prolific speaker and instructor on a variety of information security topics such as reverse engineering malware, memory forensics, threat intelligence, and advanced exploit development.

Security Architecture

Zero Trust Principles: Making Them Work for You

with Jake Williams

Security teams know they need to scale their security operations program in the cloud, but how? This session takes attendees through the nuts and bolts of creating a cloud-based, cutting-edge security operations center (SOC), including:

  • Approaches to automation
  • How to foster more well-rounded team members who can handle tasks outside their daily focus
  • Differences between security operations as part of IT, and information security groups that focus on governance and oversight
  • Understanding when security operations are best insourced or outsourced
  • Examples of how successful organizations deploy their information security resources around the globe
bill-dean

Bill Dean

IANS Faculty

Bill is a Shareholder at LBMC Information Security,where he is responsible for security assessments, incident response, digital forensics, electronic discovery and overall litigation support. He also serves as an expert witness in federal courts and numerous state courts and has conducted digital forensic investigations and electronic discovery services to support litigation efforts. He is also an active member of the International Society for Forensic Computer Examiners and Board Member in East Tennessee’s InfraGard Chapter.

Threats & Vulnerabilities

Threat Hunting Techniques for 2020

with Bill Dean

Attackers keep evolving their tactics, making it increasingly difficult for traditional forensic techniques to keep up. It’s time to get proactive – and that’s where threat hunting comes into play. This session explores:

  • Host and network-based techniques for identifying advanced attackers and threats to customer networks
  • How to position hunt teams to directly increase the overall maturity and return on investment (ROI) of their monitoring and detection capabilities
  • Detecting abnormal patterns of behavior
  • Tips to better incorporate threat hunting into purple teaming
11:40 AM - 12:40 PM

Lunch & Keynote Address

More information coming soon.
12:50 PM - 1:05 PM

Technology Spotlight Sessions Group 2

Join the Technology Spotlight session where Sponsors will present their innovative technology. Each session will last 35 minutes and are both technical and educational in nature. This is your opportunity to stay current on emerging technologies and see what is going on in the space.
1:10 PM - 1:25 PM

Technology Spotlight Sessions Group 3

Join the Technology Spotlight session where Sponsors will present their innovative technology. Each session will last 35 minutes and are both technical and educational in nature. This is your opportunity to stay current on emerging technologies and see what is going on in the space.
1:30 PM - 1:45 PM

Technology Spotlight Sessions Group 1

Join the Technology Spotlight session where Sponsors will present their innovative technology. Each session will last 35 minutes and are both technical and educational in nature. This is your opportunity to stay current on emerging technologies and see what is going on in the space.
1:45 PM - 2:00 PM

Tabletop Break

IANS Tabletops gives you an opportunity to connect with information security leaders in a relaxed environment. Come stretch your legs and network with your peers and solution providers over snacks and coffee.
george-gerchow

George Gerchow

IANS Faculty

George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.

2:00 PM - 2:45 PM GRC

Building an Advanced Privacy Program

with George Gerchow

Privacy regulation is a moving target, and teams must build an updated, modern privacy program from the ground up. This session explores:

  • Key areas to mature within your privacy function
  • Changes needed in people, process and technology
  • Which responsibilities fall under security vs. privacy
jake-williams

Jake Williams

IANS Faculty

Jake is the Founder, President, and Principal Analyst of Rendition Infosec, an information security consultancy. He also sits on the Vulnerability Review Board at Peerlyst, a startup social networking platform exclusively for security professionals. Jake is a prolific speaker and instructor on a variety of information security topics such as reverse engineering malware, memory forensics, threat intelligence, and advanced exploit development.

Security Operations

Reduce Malware False Positives and Hold Vendors More Accountable

with Jake Williams

Endpoint tools are notorious for drowning security teams in false positives. Teams must be able to both better tune the tools and hold vendors more accountable for deficiencies in their products. This session explores:

  • Questions to ask to keep endpoint security vendors’ feet to the fire
  • How to more quickly recognize false positives
  • How to ensure the same false positives don’t crop up over and over
bill-dean

Bill Dean

IANS Faculty

Bill is a Shareholder at LBMC Information Security,where he is responsible for security assessments, incident response, digital forensics, electronic discovery and overall litigation support. He also serves as an expert witness in federal courts and numerous state courts and has conducted digital forensic investigations and electronic discovery services to support litigation efforts. He is also an active member of the International Society for Forensic Computer Examiners and Board Member in East Tennessee’s InfraGard Chapter.

Threats & Vulnerabilities

Building and Optimizing a Threat Intel Program

with Bill Dean

Less mature security teams need step-by-step guidance to take their threat intelligence tactics to a more advanced level. This session explores:

  • Getting more out of open source threat intelligence sources such as LinkedIn, Twitter and news feeds
  • How to think critically and develop analytical judgments you can then communicate to leaders who have to make decisions
  • Data quality vs. quantity
  • Native language analysis
  • Getting access to source data and knowing how to use it
2:55 PM - 3:10 PM

Technology Spotlight Sessions Group 3

Join the Technology Spotlight session where Sponsors will present their innovative technology. Each session will last 35 minutes and are both technical and educational in nature. This is your opportunity to stay current on emerging technologies and see what is going on in the space.
3:15 PM - 3:30 PM

Technology Spotlight Sessions Group 1

Join the Technology Spotlight session where Sponsors will present their innovative technology. Each session will last 35 minutes and are both technical and educational in nature. This is your opportunity to stay current on emerging technologies and see what is going on in the space.
3:35 PM - 3:50 PM

Technology Spotlight Sessions Group 2

Join the Technology Spotlight session where Sponsors will present their innovative technology. Each session will last 35 minutes and are both technical and educational in nature. This is your opportunity to stay current on emerging technologies and see what is going on in the space.
george-gerchow

George Gerchow

IANS Faculty

George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.

4:00 PM - 5:00 PM Security Architecture

Successful DevSecOps: Understanding the Business Cases

with George Gerchow

Companies still struggle to get developers and security on the same page. It’s time to learn from those who’ve notched DevSecOps successes. This session explores:

  • Case studies of DevSecOps done right
  • How to measure your maturity for DevSecOps (Phase 1 to Phase 5)
  • Putting the “Shift Left” DevSecOps workflow in place
  • How DevSecOps creates secure cloud deployments
  • How to use DevSecOps to improve internet-of-things (IoT) security at the development stage
bill-dean

Bill Dean

IANS Faculty

Bill is a Shareholder at LBMC Information Security,where he is responsible for security assessments, incident response, digital forensics, electronic discovery and overall litigation support. He also serves as an expert witness in federal courts and numerous state courts and has conducted digital forensic investigations and electronic discovery services to support litigation efforts. He is also an active member of the International Society for Forensic Computer Examiners and Board Member in East Tennessee’s InfraGard Chapter.

Security Operations

Incident Response: Fixing What’s Wrong with Crisis Management

with Bill Dean

Security teams are getting better at the technical side of incident response, but crisis management is still a pain point. This session details how to quickly and efficiently manage a crisis when the crush is on. This session explores:

  • Tips to help first responders take charge, including the art of speaking in short sentences and keeping a journal
  • Case study: What we can learn from the SEAL team approach
  • How integrating OODA (observe, orient, decide and act) Loop principals across the culture results in a faster, more effective crisis response
  • How agreed-on values and beliefs guide decision-making when pressure is extreme
  • How leaders’ character, substance and style impact those around them
jake-williams

Jake Williams

IANS Faculty

Jake is the Founder, President, and Principal Analyst of Rendition Infosec, an information security consultancy. He also sits on the Vulnerability Review Board at Peerlyst, a startup social networking platform exclusively for security professionals. Jake is a prolific speaker and instructor on a variety of information security topics such as reverse engineering malware, memory forensics, threat intelligence, and advanced exploit development.

Threats & Vulnerabilities

Insider Threats: Rooting Them Out

with Jake Williams

Companies are usually unaware when a malicious insider is up to no good in their networks until it’s too late. This session explores:

  • Early red flags to look for
  • Security controls to detect and prevent insider threat activity
  • Top insider threat monitoring solutions, and their strengths and weaknesses
  • Detection tool essentials
  • How to better coordinate investigations with human resources and legal
5:00 PM - 6:00 PM

Networking Reception

Come network with your peers!

2020 Nashville Speakers

bill-dean

Bill Dean

IANS Faculty

Bill is a Shareholder at LBMC Information Security,where he is responsible for security assessments, incident response, digital forensics, electronic discovery and overall litigation support. He also serves as an expert witness in federal courts and numerous state courts and has conducted digital forensic investigations and electronic discovery services to support litigation efforts. He is also an active member of the International Society for Forensic Computer Examiners and Board Member in East Tennessee’s InfraGard Chapter.

Presentations
  • Threat Hunting Techniques for 2020Day 110:35 AM - 11:35 AM
  • Building and Optimizing a Threat Intel ProgramDay 12:00 PM - 2:45 PM
  • Incident Response: Fixing What’s Wrong with Crisis ManagementDay 14:00 PM - 5:00 PM
george-gerchow

George Gerchow

IANS Faculty

George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.

Presentations
  • Cutting-Edge Security Operations in the CloudDay 110:35 AM - 11:35 AM
  • Building an Advanced Privacy ProgramDay 12:00 PM - 2:45 PM
  • Successful DevSecOps: Understanding the Business CasesDay 14:00 PM - 5:00 PM
jake-williams

Jake Williams

IANS Faculty

Jake is the Founder, President, and Principal Analyst of Rendition Infosec, an information security consultancy. He also sits on the Vulnerability Review Board at Peerlyst, a startup social networking platform exclusively for security professionals. Jake is a prolific speaker and instructor on a variety of information security topics such as reverse engineering malware, memory forensics, threat intelligence, and advanced exploit development.

Presentations
  • Zero Trust Principles: Making Them Work for YouDay 110:35 AM - 11:35 AM
  • Reduce Malware False Positives and Hold Vendors More AccountableDay 12:00 PM - 2:45 PM
  • Insider Threats: Rooting Them OutDay 14:05 PM - 5:05 PM

Hilton Nashville Downtown

121 4th Ave S, Nashville, TN 37201

General Information

Cancellations

IANS requests that cancellations please be submitted two weeks prior to a Forum. Reserved seats are limited.

Hotel Cancellations

If you have booked a hotel room with IANS during the registration process or you have reached out to an IANS team member regarding booking a room, please note our venues have a cancellation policy of 48 hours. If you do not cancel your reservation through your online registration or in writing to IANS, you will be charged for the night(s) in which you have failed to cancel.

Terms and Conditions

This Forum is produced by IANS, which reserves the right, in its sole discretion, to limit or deny access to the Forum to any entity or individual. Attendance to the Forum is complimentary and open to active information security professionals from private and public-sector corporations and organizations.

Individuals from information security solution providers (software, hardware, and consulting companies) are not eligible to attend unless affiliated with a sponsoring organization.

IANS reserves the right to share attendee contact information with event sponsors and other attendees. IANS will provide on-site opt-out forms that enable you to remove your contact information from being shared as described herein. No contact information will be shared prior to the event.

Photography, Audio & Video Recording

IANS Forums are held in a public venue; therefore, IANS does not prohibit participants, sponsors, or other companies from photographing or taking videos. IANS reserves the right to use images taken at IANS Forums with your photograph and/or likeness in marketing materials.

IANS Code of Conduct

IANS is committed to providing a harassment-free conference experience for all attendees, sponsors, speakers and staff regardless of gender, sexual orientation, disability, physical appearance, national origin, ethnicity, political affliction or religion.

IANS expects all participants to behave in a professional manner. IANS will not condone any form of sexual language and imagery, verbal threats or demands, offensive comments, intimidation, stalking, sustained disruption of session or events, inappropriate physical contract, and unwelcomed sexual attention.

If any form of written, social media, verbal, or physical harassment is reported, participant will be asked to stop and expected to comply immediately. Offender will be subject to expulsion from the conference.

If you are being harassed or notice someone being harassed, please contact the event staff. In the event of an emergency situation, please contact local authorities immediately.

We expect participants to follow these rules at all event venues and event-related social activities.

Registration Questions

What is the registration fee?

The Forum is complimentary and open to active Information Security Professionals from private and public sector corporations and organizations.

What's the registration deadline?
You can register for and IANS event up to the day of the event.
What time does the Forum begin and end?

The Forum officially begins on Day 1 at 7:30am and ends on Day 2 at 4:40pm.

Can I earn continuing education credits for attending the forum?

Attendees may earn up to 16 credits through our partnership with (ISC)2. Attendees must check in at registration each morning to receive their 8 credits for Day 1 and Day 2. Attendees will receive a Certificate of Completion one week after the forum concludes for any other certification needs. If you have provided IANS with your CISSP # during the registration process then we will automatically submit to (ISC)2.

Onsite Questions

Will there be opportunities to network with peers and sponsors?

There will be chances to network with your peers during the lunches, breaks and the networking reception at the end of day one.

Where do I pick up my badge and registration material?

Your badge and registration materials will be available to pick-up at the registration desk. Registration starts at 7:30am.

Does IANS provide a Mobile App?

The IANS Information Security Forum App will be available 1 week prior to the event. To download the Mobile App go to the App Store or Google Play Store on your device and search IANS.

What is the best way to stay updated before and during the Forum?

For all updates please download the IANS Mobile App or follow us on Twitter.

What can I expect when I attend an IANS event?

When attending an IANS Information Security Forum, you will have the opportunity to take part in technical and strategic Roundtable sessions that discuss the latest issues and trends found in the market. These Roundtable discussions are led by IANS Faculty who are also long-time information security practitioners. You will also have the chance to network with industry peers and learn about the newest technologies and services during any one of our Technology Spotlight sessions.

How can I promote my involvement with the event?

Please share your thoughts and excitement using our event hashtags found at the top of this page.

Is there free Wi-Fi onsite?

Free Wi-Fi will be provided throughout the Forum in conference areas.

Are the presentations available for viewing after the Forum?

All roundtable sessions will be available after the Forum. Many presentations are uploaded to the Mobile App prior to the Forum.

How can I submit my feedback on the Forum?

We encourage you to fill out our general survey located in the middle of your program. Please drop off your survey at the registration desk before you leave.

Housing & Travel Questions

What hotel accommodations are available during the Forum?

IANS provides a room block for forum events. There will be a limited number of rooms available at the discounted rate.

How can I book a hotel room?

All hotel requests must be made through the registration site.

How can I cancel my hotel reservation?

Most of our hotel venues have a 72 hour cancellation policy. You must cancel by contacting one of the IANS team members or through the online registration. If you fail to do so you will be charged for the night(s) in which you have failed to cancel.

Will I receive a hotel confirmation number?

You will receive a hotel confirmation number 2 weeks prior to the Forum.

Is parking provided?

IANS does not cover any parking.

Attendee Contact

ians@iansresearch.com

Who Should Attend?

IANS Forum content is designed for information security practitioners across all industries. Attendees include CISOs, VPs and Managing Directors of Information Security, Information Security Architects, and Information Security Engineers.

Interested in Forum Sponsorship? Learn More.

Check out IANS other upcoming events