2017 Fall Government Regional Summit - Agenda
Share |

Is it possible for IT to have Peace of Mind? 

produced by

Thursday, October 5, 2017

9:30 am Registration, Networking and Refreshments
10:20 am


Erin Provazek, TAGITM Education Committee Chair

10:30 am

Security Culture

J Wolfgang Goerlich, CBI -  VP, Strategic Security Programs

People performing contentiously and consistently is a lofty goal. Information Risk Management gives us the process to follow. Controls frameworks gives us the standards to set and meet. Yet it is the people who ultimately decide our security posture. In this presentation, we will introduce culture frameworks. Culture frameworks provide a means to accelerate building a cyber security program. For programs that are maturing, culture provides a means to communicate and drive behaviors. To illustrate this point, case studies will be shared that illustrate the challenges and successes of applying culture management. Let’s get street smart about cyber security.

11:30 am

Networking Lunch - Take A Dell's Eye view of the Current Cyberthreat Landscape 

Ben Smith, RSA - Field Chief Technology Office 

Join Dell Technologies for a review of the current cyberthreat landscape relating to government and public sector-focused attack vectors. We’ll cover some of the key challenges – technical and otherwise – many local & state public sector entities are experiencing, and we’ll extrapolate possible lessons learned based on some recent high-profile attacks against government sector targets. We will also outline the many cybersecurity offerings within the Dell Technologies portfolio (from RSA, SecureWorks, and other brands) and will talk about potential focus areas in the future for those solutions offerings.

Sponsored by:  Dell EMC logo

1:00 pm

The Stepping Stones of Implementing Security for State & Local Governements

Michael Beeson, City of McKinney -  Security Engineer
Jon Tidwell, Collin County Government- IT Security Officer

Implementing security involves many moving parts. Every system, piece of network infrastructure, and application has to be rated and considered, standards must been investigated and adopted, policies and procedures written and tested. Not to mention disaster recovery and incident response planning. This complexity prevents many state and local governments from even knowing where to start.  Jon Tidwell, CISO of Collin County, and Michael Beeson, Security Engineer of the City of McKinney are here to help by answering your security questions. 

2:00 pm Afternoon Break & Exhibits
2:15 pm

Tales from the Pen Test: What We Learned When We Let the Hackers Run Wild on our Network

Jon Tidwell, Collin County Government- IT Security Officer

In FY2016 Collin County went on an information security adventure.  Like any organization that has made significant investments in security tools, they wanted to know how well the investments were working.  This session will cover the lifecycle of the journey of submitting a technology audit RFP, selecting the vendor and staying awake all night based on their findings.  Jon Tidwell will, in a very comical way, cover elements of the technical findings of Collin County's internal and external penetration tests, that include the testers escalating to domain admin rights in about 12 hours (which really is not that bad), scraping user ID's from our online presence, attacking our network via network printers and more.  More importantly than the findings however, Jon will share Collin County's remediation strategies to the TAGITM body in an effort for the entire state to be more prepared to defend against potential cyber-attacks.

3:30 pm Adjourn