Houston, TX
MAY 21 - 22, 2018

Agenda Day 1

8:00 am - 8:45 am Registration and Coffee

8:45 am - 9:00 am Chairperson’s Welcoming Remarks

9:00 am - 9:45 am Cyberattacks & Emerging Threats: Ransomware, Other Threats from the Cutting Edge and Lessons Learned from Recent Breaches

James Morrison - Cyber Task Force, Federal Bureau of Investigation
  • Identifying the objectives needed to complete the cyber intrusion
  • Understanding the inherent advantages a defender has if the attack is properly identified
  • Identifying the end target of the intrusion in a timely manner
img

James Morrison

Cyber Task Force
Federal Bureau of Investigation

9:45 am - 10:30 am Cognitive SOC to Transform Security Measures

Carma Austin - Executive Security Advisor, Cognitive AI Program Lead, IBM
AI has become the buzzword of the century, but what do we mean when we say AI?  Does AI really have the ability to transform our operations into an automated, integrated and predictive function that addresses our resources restraints and builds intelligence into the infrastructure?
img

Carma Austin

Executive Security Advisor, Cognitive AI Program Lead
IBM

10:30 am - 11:15 am Morning Refreshment Break

11:15 am - 12:15 pm Identifying and Evaluating Privacy Risks and Making Smart Privacy Engineering Decisions

Julie Snyder - Lead Security & Privacy Engineer, MITRE
  • Understanding the distinctions and overlaps between privacy and security
  • Helping to understand the privacy risks and ramifications of new technology implementations
  • Designing information systems to protect privacy, now and in the future
img

Julie Snyder

Lead Security & Privacy Engineer
MITRE

11:15 am - 12:15 pm Developing and Implementing Effective User Awareness Training Programs

Lorenzo Castro - CISSP, Senior Security Specialist , Enterprise Products Partners, LP
  • Adapting vulnerability assessment of current programs and their successes
  • Educating staff and employees on system updates to prepare for proper detection of system changes
  • Implementing company wide changes to uphold safety management among staff
img

Lorenzo Castro

CISSP, Senior Security Specialist
Enterprise Products Partners, LP

12:15 pm - 1:15 pm Networking Luncheon

All the morning hustle and bustle has probably made for a much- needed lunch break! Join us for a delicious lunch and make new friends at your table.

1:15 pm - 2:15 pm Facilitating IT Management Techniques for Uniform Incident Response

Levone Campbell - Cyber Security Lead/ Incident Coordinator, Aramco Services
  • Implementing proper management techniques for IT Security
  • Reacting to threat detection and incident response
  • Investigating accurate channels for incident response measures
img

Levone Campbell

Cyber Security Lead/ Incident Coordinator
Aramco Services

1:15 pm - 2:15 pm An Industrial Immune System: Using Machine Learning for Next Generation ICS Security

Jeff Cornelius PhD - EVP, Industrial Control and Critical Infrastructure Solutions, Darktrace
  • How new machine learning and mathematics are automating advanced threat detection
  • Why 100% network visibility allows you to preempt emerging situations, in real time, across both IT and OT environments
  • How smart prioritization and visualization of threats allows for better resource allocation and lower risk
  • Real-world examples of detected OT threats, from non-malicious insiders to sophisticated cyber-attackers
img

Jeff Cornelius PhD

EVP, Industrial Control and Critical Infrastructure Solutions
Darktrace

2:15 pm - 3:00 pm Budgetary and Infrastructure Changes to Revamp Security Efficiency: What is the Investment Needed?

·         Increasing budgets in basic needs- data rooms and tech equipment
·         Investing in the renewal of system facilities and removing vulnerable software
·         Updating training for new equipment and employee capabilities.
·         Updating operational systems to meet current needs to limit hacking
·         Integrating IT components into the OT systems to limit risk of production failures
·         Treating the OT system hacks as a safety issue rather than security issue
img

Lauren Goodwin

Upstream | GPO & UEC | Digital Security and Risk Officer
BP

img

Levone Campbell

Cyber Security Lead/ Incident Coordinator
Aramco Services

img

Jim Blaschke

Vice President, NA
CyberX

4:00 pm - 4:45 pm IT/OT Systems: Making Them Work Together

Lauren Goodwin - Upstream | GPO & UEC | Digital Security and Risk Officer , BP
  • Financial confines of replacing antique systems in OT
  • Implementation of systems to bridge conversion between operations and information systems
  • Advancing training techniques for employees directly involved
img

Lauren Goodwin

Upstream | GPO & UEC | Digital Security and Risk Officer
BP

4:45 pm - 5:00 pm Chairperson Closing Remarks/ Break

5:00 pm - 6:00 pm End of Day 1- Cocktail Reception

OPERATION: HACKER ATTACK
Meet with hackers who will give you a real time showing of their hacking capabilities and what makes it so easy to enter systems.