2018 Winter Government Regional Summit - Speakers
Share |

Is it possible for IT to have Peace of Mind?

produced by

Tales from the Pen Test: What We Learned When We Let the Hackers Run Wild on our Network

Session Abstract

In FY2016 Collin County went on an information security adventure. Like any organization that has made significant investments in security tools, they wanted to know how well the investments were working. This session will cover the lifecycle of the journey of submitting a technology audit RFP, selecting the vendor and staying awake all night based on their findings. Jon Tidwell will, in a very comical way, cover elements of the technical findings of Collin County's internal and external penetration tests, that include the testers escalating to domain admin rights in about 12 hours (which really is not that bad), scraping user ID's from our online presence, attacking our network via network printers and more. More importantly than the findings however, Jon will share Collin County's remediation strategies to the TAGITM body in an effort for the entire state to be more prepared to defend against potential cyber-attacks.

Jon Tidwell, IT Security Officer - Collin County Government

When not running amok at TAGITM events, or his local Toastmasters club, Jon plays the role of IT Security Officer at Collin County. Jon has spent over 15 years in the financial consulting trenches, focusing on perimeter security and PCI environments. He holds multiple information security certifications, and enjoys speaking about what he continues to learn in the field. One of these days, he hopes to have successfully built a flux capacitor

Threat Intelligence and Layered Security in the WannaCry Era

Session Abstract

The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.

Ted Gruenloh, Presenter - COO, Sentinel IPS

Ted has worked with web and network security technologies for more than 15 years. He began his career in technology as a full-stack engineer in web development and design. As Chief Operating Officer, Ted guides the overall development of Sentinel IPS, the CINS Active Threat Intelligence System, and all other supporting technologies. You may also find him presenting at a trade show or information security conference, spreading the word about shared threat intelligence.

The Weakest Link in Cybersecurity

Session Abstract

The human element is the weakest link in any organizations’ cybersecurity efforts. Whether it be malicious or accidental, the actions of the employees cause IT departments to drive corporate policy, create procedures, and consider budgetary impacts. This presentation will discuss the human influence on cybersecurity preparedness, response, and recovery activities. Driving factors, such as social engineering, will be presented, as well as mitigation actions including training and exercises.

John Romero, Program Director - Texas A&M Engineering Extension Service (TEEX),

John M. Romero holds a B.S. in Computer Science from Texas A&M University and is a veteran of the U.S. Air Force as an Electronic Warfare System Specialist and Disaster Preparedness Instructor. He is currently a Program Director for the Texas A&M Engineering Extension Service (TEEX), leading web application development where he has over 22 years in software development and teaches community cybersecurity for the National Emergency Response and Rescue Training Center (NERRTC).

John is also a SMART Manufacturing Practice Lead for the Texas Manufacturing Assistance Center (TMAC) working with the Clean Energy Smart Manufacturing Innovation Institute (CESMII) of the Texas A&M Energy Institute. If not on the road teaching cybersecurity, he can be found helping small to medium-sized manufacturers understand the importance of integrating and utilizing smart manufacturing on their factory floors.

Internet of Things

Session Abstract

IoT: A look at the increasingly digital landscape we live in where anything can send information to internet and what we all need to know about the benefits and risks of all that data. This talk will be a plain-spoken, straight forward approach to the topics of IoT, Big Data, and Personal Privacy.

Andy Bennett, Director of Governance for the Office of the Chief Information Security Officer - the State of Texas

Andy Bennett currently serves the State of Texas as the Director of Governance for the Office of the Chief Information Security Officer. He has a diverse IT background covering 20+ years of experience in roles across the enterprise and in a variety of sectors including government, banking, higher education, applied research, oil and gas, law enforcement, Fortune 500 consulting services, and more. He specializes in change and turnaround efforts and has a passion for security.

Andy is a boot-wearing native Texan who considers himself over-educated, under-certified and absolutely addicted to continuous personal and professional improvement. He holds a BA in History, an MS in Information Assurance and Security, and is finishing his dissertation for a Doctorate in Learning Technologies from Pepperdine University. He also holds a professional certification in business continuity and intends to pursue his CISM certification next. He is actively involved in a number of industry professional groups and was named the IAFCI Cyber Investigations Contributor of the Year in 2013.

In his spare time Andy volunteers for the SHSU Department of Computer Science in their Digital Forensics and Security Programs. He is a family man with a wife, daughter, and 4 dogs. His hobbies are furniture making, blacksmithing, carpentry, and water sports.

Andy’s professional philosophy is "show works better than tell, every time"; as such he would like to share as much information as possible with you. He asks that you feel free to find and add him on Linkedin to get to know him a bit.

Thank You 2018 Annual Conference Diamond & Platinum Sponsors

TAGITM is professionally managed by CMP Management.

Association Management Software Powered by YourMembership  ::  Legal