Missouri Governor's Cybersecurity Summit 2016 Banner

Overview

At the direction of Governor Jay Nixon, the State of Missouri Office of Administration hosted the Governor’s Cybersecurity Summit in Jefferson City. The purpose of the Summit:  to engage with stakeholders, including representatives of state and local governments; law enforcement; business; higher education; and K-12 institutions across the state.

The key goals of the Summit included:

1) Information Sharing and Awareness, including case studies and information sharing on current and emerging threats and industry best practices;

2) Training and Exercises, with an emphasis on sharing expertise and experience on tools proven most effective in detecting and defending against the growing number of cyber events;

3) Workforce Development, including strategies for educating the current and future cybersecurity workforce;

4) Hardening Critical Infrastructure, such as the electrical grid with an emphasis on ensuring continuity of services; and

5) Incident Response, with an emphasis on swift and effective coordinated response to cyber attacks.

 

This Year's Topics include: 

  • Organizational Awareness – What Leaders Can Do
  • Combating Small Business Cyber Threats
  • The Tabletop Exercise – What, Where, When, Why and How
  • Solving the Personnel Gap
  • Network Awareness
  • The Role of Education in Cybersecurity
  • The Internet of Things – Managing the Unmanageable
  • The Legal Side of Cybersecurity
  • Getting Back to the Basics or How Not to be the Low Hanging Fruit
  • How to Be Prepared for Cyber-Attacks Resulting from Civil Disruptions
  • Automation and Orchestration
  • Web and Mobile App Security
  • ROI for Cybersecurity Investment
  • Social Engineering as an Attach Vector
  • Ransomware Epidemic

A message from our Keynote Speaker

State government is uniquely positioned to serve as a resource for organizations in both the public and private sectors and further strengthen cybersecurity preparedness across Missouri.


- Governor Jay Nixon, State of Missouri

Speakers

Honorable Jeremiah W. (Jay) Nixon

Honorable Jeremiah W. (Jay) Nixon

Governor, State of Missouri

Jay Nixon is serving his second term as governor of Missouri. Garnering the highest margin of victory for a non-incumbent governor in 44 years, Nixon was overwhelmingly elected by Missourians as their 55th Governor on Nov. 4, 2008, to lead the state in a new direction. Gov. Nixon was elected to a second term on Nov. 6, 2012.
As Governor, Jay Nixon has worked to make government more efficient, effective and responsive to the needs of Missouri families. He is committed to maintaining fiscal discipline, creating jobs, growing the economy and investing in public education.
As he did while serving in the state Senate and during his four terms as attorney general, Governor Nixon is reaching across the aisle to put Missouri families first. In 2010, he called the legislature into a special session to pass the Missouri Manufacturing Jobs Act, landmark legislation credited with saving Missouri’s auto industry and creating thousands of good manufacturing jobs. As a result, Ford, General Motors, and automotive suppliers around the state have invested billions of dollars and created thousands of jobs to build next-generation vehicles and parts in the Show-Me State.
Just like Missouri families have to do at home, Gov. Nixon has made the tough choices necessary to balance the budget every year without raising taxes. The Governor’s commitment to fiscal discipline has helped protect Missouri’s AAA credit rating, while enabling smart investments to improve education, expand access to mental health services, and help communities struck by natural disasters rebuild and recover.
Gov. Nixon has made a strong public education system one of his chief priorities. Under his leadership, Missouri’s public elementary and secondary schools have received record funding, and test scores and graduation rates have gone up. Similarly, even as other states were raising tuition by double digits, Missouri has led the nation in holding down tuition increases at public universities.
Prior to becoming Governor, Jay Nixon was elected to a record four terms as Missouri’s Attorney General, beginning in 1992. Inheriting an office tainted by scandal, Nixon restored integrity to the Attorney General’s Office by cleaning up corruption, cracking down on crime, and protecting consumers and the environment. Under his leadership, the Attorney General’s Office became one of the most efficient and effective in state government.
As Attorney General, Nixon earned a reputation for taking on the toughest fights and winning. Nixon himself argued before the United States Supreme Court in Nixon v. Shrink, a landmark victory that reinstated Missouri’s campaign contribution limits and cleared the way nationally for campaign finance reform. His lawsuit against the big tobacco companies continues to collect billions of dollars for Missourians, and his settlements with the insurance industry and hospitals led to the formation of two of the largest health care foundations in state history. One of Nixon’s most successful programs, Missouri’s popular No-Call List, has become a model for states across the nation to stop unwanted telemarketing calls.
A native of De Soto, Missouri, Jay Nixon was raised in a family of public servants. His mother, the late Betty Nixon, was a teacher and served as president of the local school board. His father, the late Jerry Nixon, was elected mayor of De Soto and was a judge for the community.
After earning both his undergraduate and law degrees from the University of Missouri-Columbia, Nixon returned to DeSoto to practice as an attorney. In 1986, he was elected to his first term in the Missouri State Senate, where he would represent the people of Jefferson County for six years. As a State Senator, Nixon reached across the aisle to pass several major pieces of legislation, including an expansion of pre-natal care for expectant mothers.
Governor Nixon and his wife, Georganne Wheeler Nixon, have two sons, Jeremiah and Willson. They belong to the First United Methodist Church in Jefferson City.

More
Commissioner Doug Nelson

Commissioner Doug Nelson

Missouri Office of Administration

On December 19, 2012, Missouri Gov. Jay Nixon appointed Doug Nelson to the cabinet post of Commissioner of Office of Administration, after he served as Acting Commissioner since February of 2012.
The Office of Administration is the administrative and managerial arm of Missouri State Government and the Commissioner serves as Chief Executive with oversight of the seven divisions of the Office of Administration.

The Commissioner serves on the following Boards:

Commissioner Nelson attended the University of Missouri-Columbia where he earned a bachelor's degree in psychology. He earned a law degree from the University of Missouri-Kansas City.
Commissioner Nelson has a long and distinguished career in public service. After graduation from law school, he served 18 years in the Attorney General's Office. During his service, he held six different positions, the last 10 as Deputy Chief of Staff to the Attorney General. The majority of his time was spent pursuing environmental and consumer protection cases. In his consumer practice, Mr. Nelson oversaw the prosecution of numerous consumer cases and the implementation of the Missouri No-Call List.
In 2009, Mr. Nelson accepted the position of Deputy Commissioner/General Counsel for the Office of Administration. In 2010, Mr. Nelson began his tenure as Deputy Chief of Staff for the Governor's Office. In that role Mr. Nelson primarily worked with departments pursuing objectives and maximizing efficient operations.
Commissioner Nelson and his wife, Joanne, reside in Columbia with their children, Trey, Paige and Cole.

More
Teri Takai – Featured Speaker

Teri Takai – Featured Speaker

Former CIO of U.S. Department of Defense, State of California and State of Michigan

Teri Takai is one of the most respected and influential CIOs in the country. Teri is most well-known for her public sector roles, starting in budget-torn Michigan where she led the state to the #1 ranking in the Digital States Survey four years in a row. Never one to back down from a challenge, she next accepted a plea from Governor Schwarzenegger to put the state’s struggling technology efforts back on track. And if that wasn’t enough, Teri next took on the job of heading up the largest IT budget in the world, a budget matched only by the scope of its problems and complexities. In each locale, she was tasked with driving disruptive change. Her biggest takeaway: No job is too small to make a big impact – but there are right ways and wrong ways to go about it. In this captivating session, Teri shares her extraordinary experiences and lessons learned.

More
Dr. Charlie Miller - Featured Speaker

Dr. Charlie Miller - Featured Speaker

Security Engineer, Uber

Dr. Charlie Miller is "one of the most technically proficient hackers on Earth", according to Foreign Policy. After receiving his PhD in Mathematics from the University of Notre Dame, Dr. Miller was a computer hacker for the National Security Agency for five years. Since that time he has been a consultant and worked for the Twitter information security team. He has won the “Super Bowl” of computer hacking, the annual Pwn2Own competition four times. Dr. Miller has found countless vulnerabilities in a number of Apple products including their laptops and phones. Perhaps the most notorious of these issues was the ability to remotely compromise an iPhone by merely sending it a malicious text message. He also has the privilege of having been the first to remotely exploit the iPhone when it was released as well as the first Android phone when it was released (on the day it came out). Lately, Dr. Miller has spent considerable time in the field of automotive security along with his research partner Chris Valasek. Together they demonstrated that a variety of Fiat Chrysler vehicles could be remotely hacked from anywhere in the county and he could control the radio, brakes, wipers, transmission, and even the steering of the target vehicle. The demonstration of these vulnerabilities led to the recall of 1.4 million vehicles. Dr. Miller has been featured on the Today Show, ABC World News Tonight, CNN, NPR, CNBC, New York Times, USA Today, Forbes, etc.

More
Grady Summers

Grady Summers

Senior Vice President and Chief Technology Officer, FireEye

As Senior Vice President and Chief Technology Officer for FireEye, Grady Summers oversees a global CTO team that supports R&D and product engineering efforts and works with customers worldwide to address today’s evolving threat landscape. Grady has over 15 years of experience in information security both as a CISO and consultant to many Fortune 500 companies. He joined FireEye through its acquisition of Mandiant in 2014. At Mandiant, Grady led the company’s strategic consulting and customer success divisions. Prior to Mandiant, Grady was a partner at Ernst & Young, responsible the firm's information security program management practice. In this role, he worked with CISOs, CIOs, and directors to help improve their information security programs, with a focus on strategic information security planning, organization design, incident response, and targeted threats. His focus included board-level oversight of cyber security, and he has advised dozens of audit and risk committees on successful approaches to cyber risk governance.
Before E&Y, Grady was the Chief Information Security Officer (CISO) at General Electric, overseeing a large global information security organization. GE's information security function grew substantially under his leadership, including the development of the company's first incident response team, a software security center of excellence, and global security operations. His previous roles at GE include divisional CTO and a variety of positions in application security, web development, and infrastructure management.
Grady’s insights frequently appear in print, and he has been a guest on numerous television programs, including CNN Starting Point, Andrea Mitchell Reports, Cavuto, ABC World News, Australia’s Lateline, and France’s The Interview. Grady holds an MBA from Columbia University and a bachelor of science in computer systems from Grove City College in Pennsylvania.

More
Brennan P. Baybeck

Brennan P. Baybeck

Vice President, Global IT Risk Management, Oracle Corporation

Brennan Baybeck leads IT security risk management for Global Customer Support Services at Oracle Corporation. In this role, he also is responsible for leading security, privacy and availability for Global IT’s key enterprise IT services, including GIT’s cloud initiatives. He has over 20 years experience in IT security, risk, audit and consulting and has worked in various industries designing, implementing and operating enterprise wide programs to address global security risks. He has held previous leadership positions at Sun Microsystems, StorageTek and Qwest Communications, and served as an information security risk consulting manager for several years. Brennan is also actively involved with ISACA International and serves as committee chair for important board initiatives. Brennan has received a BBA in Computer Information Systems from Western Michigan University.

More
Troy Campbell

Troy Campbell

Director, Cyber Threat Intelligence Program and IT Director, Kansas City Terrorism Early Warning Fusion Center

Currently, Troy is the Cyber Threat Intelligence Program Director as well as the IT Director for the Kansas City Terrorism Early Warning Fusion Center (KCTEW). Nationally he a co-founder of the National Fusion Center Associations (NFCA) Cyber Intelligence Network (CIN), and Co-Chair of the NFCA Cyber Threat Intelligence Subcommittee for the 78 members of the National Network of Fusion Center.
A principal architect and co-author of the National Fusion Center Association (NFCA) Cyber Intelligence Capability Framework, Troy lead an implementation of a national counter-terrorism Situational Awareness messaging system for the Domestic Nuclear Detection Office (DNDO) at DHS, returning to the KCTEW in 2011.
A member of CAP/USAF Auxiliary in various command and operational positions for 27 years, LtCol Campbell was the former Vice Commander for the Missouri Wing at Whiteman AFB, former Director of Emergency Services for 7 states (North Central Region) and former mission transport pilot. He is the former Senior Engineer and co-architect for Advanced Digital Reconnaissance Systems for the Advanced Technology Group at National Headquarters. His current assignment is Homeland Security Officer for the North Central Region.
Before joining the TEW, working with worked with DHS, USAF, FEMA, USCG, Mitre Corp and other agencies Troy specialized in designing Geospatially enabled Situational Awareness systems and tools to communicate between DOD, GOV and State/Local entities down to the First Responder.
In private business, he has formed and directed multiple IT ventures and groups ranging from secure financial and telecommunications applications, to implementing a multi-million dollar supply chain projects at medium/large enterprises.

More
Darren W. Carroll

Darren W. Carroll

Director, Security & Risk Management Practice, Enterprise Solutions Group, SHI

As SHI’s Director of Security and Risk Management Practice, Darren is a risk management and information security leader with over 28 years of experience in operational, technical, management, and architectural roles. Throughout his career, Darren has provided consultative thought leadership, strategic direction, and tactical response to multiple federal, state, and local agencies, most of the Fortune 100 and hundreds of mid-sized enterprises.
Darren has assisted numerous clients with their comprehensive risk management programs, including leading them from assessment and identifi¬cation, to prioritization, mitigation and remediation. He has developed programmatic solutions for risk mitigation and transformed organizations’ security management processes to better codify and consume risk information.
Darren brings a strong understanding and familiarity with diverse compliance and regulatory frameworks, including NIST CSF & 800 series, ISO 2700X series, HIPAA/HITECH, PCI regulations, and several critical infrastructure & industry-specifi¬c guidelines (ISA, API, CFR, etc.).

More
Daniel Clark

Daniel Clark

Security Architect, Sophos

Daniel Clark is a Security Architect for Sophos Security and a frequent presenter at security events throughout the United Sates. Dan has spent nearly thirty years in the information security industry and specializes in making security simple.
Mr. Clark has worked with many fortune 500 companies as well as state and local governments to help them protect and secure sensitive data and critical infrastructure. His current focus is on data protection, endpoint, mobile and perimeter security.

More
Jeff Coiner

Jeff Coiner

Director of Information Systems, City of Springfield

Jeff Coiner joined the City of Springfield as the Information Systems Director in August, 2007. The Information Systems Department is responsible for the development, implementation, and maintenance of current and future technology systems for the city’s operations.
Prior to working for the City of Springfield, Coiner served for two years as the Director of Information Technology at Northrop Grumman Litton Interconnect in Springfield and as the Technical Services Manager for EFCO Corporation in Monett, Missouri. Coiner also held several information technology positions for ConocoPhillips in Bartlesville, Oklahoma and Guayama, Puerto Rico.
Coiner graduated with a Bachelor of Science in Computer Information Systems from Missouri State University in 1988. In 1997 he received a Masters in Business Administration from Oklahoma State University. He is married to wife Stacy and they have three children Jordan, Cassidy and Mitchell.

More
Kashif Dhatwani

Kashif Dhatwani

Director, Identity & Access Management and Data Security Practice, BIAS Corporation

Kashif Dhatwani leads the Identity & Access Management and Data Security Practice at BIAS Corporation. Kashif is responsible for leading teams of solution and technical architects in the delivery, design and development of solutions for clients in Public and Commercial sector. Kashif is also responsible for providing customers with best of breed solutions for the identity and access management. The BIAS Security Practice covers IAM suite of products and Data Security Products. Kashif has been at BIAS for 9+ years and has worked on myriad of technologies including Portals, Service Oriented Architecture, Security, prior to BIAS, Kashif spent 6+ years at Oracle USA and 2+ years at IBM in Product Development and Consulting Organizations delivering solutions for customers.

More
Shane Harsch

Shane Harsch

Senior Solution Success Manager, RSA, The Security Division of EMC

Shane Harsch is an information security professional with over 25 years of experience ranging from military to manufacturing to security consulting and professional services. He has managed and architected SOCs for the military and managed service providers. Shane is a commissioned officer in the US Army with a Masters in Business (MBA), and maintains the following certifications: intrusion analyst (GCIA), incident handling (GCIH), enterprise defense (GCED), and information security (CISSP). Shane is currently with RSA as a Senior Solution Success Manager.

More
Charles Herbst

Charles Herbst

Associate Commissioner, District 2, Cape Girardeau County

Jeffery Jensen

Jeffery Jensen

Partner, Husch Blackwell LLP

Jeff concentrates his practice in the area of complex federal litigation, including internal compliance investigations and reviews, emergency response to government investigations and data breach response. He is a member of the firm’s Government Compliance, Investigations & Litigation group.
An effective litigator, Jeff has secured favorable results for clients in a wide range of criminal and civil matters. He regularly advocates for prosecution of individuals who victimize corporate clients. He often navigates witnesses and targets through potentially life-altering disputes with the federal government. Jeff also routinely represents law enforcement officers, prosecuting attorneys and other individuals who are acutely familiar with the state and federal legal system.
Prior to entering private practice, Jeff was a certified public accountant for PricewaterhouseCoopers. He then served as an FBI special agent in St. Louis for 10 years and as a federal prosecutor for another decade when he led prosecutions of notorious securities and computer fraud cases. In 2006, Jeff was named Executive U.S. Attorney for the Eastern District of Missouri, an office with 60 criminal and civil attorneys.
Emergency Response to Government Investigations: Jeff guides corporations through properly responding to government investigations, proactive approaches to avoiding common mistakes and detecting early warning signs.
Data Breach Response Readiness: Jeff counsels clients in preparing for and effectively responding to a data breach. Having authored several articles and spoken on the topic of intrusions numerous times, he advises organizations on the 10 key questions to ask IT, compliance and internal audit staff to determine their level of preparedness. Jeff’s prior experience as an FBI agent and then as a federal prosecutor have afforded him extensive experience investigating and responding to data breaches.

More
Kevin Keeney

Kevin Keeney

Director, Cyber Incident Response Team (CIRT), Monsanto

Kevin Keeney, Jr. joined the military in 1996 and was stationed in Georgia and Vilseck, Germany. After completing active duty in 2000, he moved to Missouri where he lives with his wife, Allyse, and five children. He has spent most of his professional career in the Midwest, with the exception of a two-year move (2007–2009) to Washington, D.C. in order to co-found Capital Business Development Associates, Inc. He has dedicated his professional career to serving his community through various military, civil, nonprofit, and corporate activities. He has been a member of the armed services and has volunteered with the Missouri National Guard, in various capacities, for over two decades.
In the corporate sector, Kevin’s 16+ year career has been oriented toward information technology and security. He held positions such as technical architect, datacenter manager, security analyst, incident response lead, and senior systems administrator. During a recent tenure with World Wide Technologies—a company that works with more than 40 of the Fortune 100 companies and holds major purchasing contracts with the U.S. government—Kevin was responsible for supporting sales to key Department of Defense accounts and providing WWT Data Center and Security expertise to all assigned accounts.
Across all of his corporate and military experiences, he has distinguished himself over the past two decades in the areas of cybersecurity and incident response. In June 2016, he joined a Fortune 200 multinational agrochemical and agricultural biotechnology company, as the Director of Incident Response. He uses his knowledge of IT infrastructure, business, and leadership expertise to implement strong security protocols that will reduce the cost of security organization while maximizing threat reduction. He was commissioned by executives to build a world-class program that will be recognized inside and outside of the company as cutting edge; he is doing this by building and training a high-functioning team. He is tasked with growing a U.S.-based incident response capability to a global one.

More
Charles King

Charles King

Vice President of Information Technology and Chief Information Officer, Kansas City Power & Light

As vice president of Information Technology, Charles King leads KCP&L’s IT corporate applications; transformational roadmap projects; centralized support functions including business alignment, enterprise architecture, project management, testing, information security and desktop support; and corporate infrastructure including network, data centers, telephony and field radio services.
In 2011, Mr. King joined the company as senior director of IT Applications & Delivery. In the following years, he successfully led efforts to improve IT governance, security and compliance; upgrade the company's financial and supply chain systems; and implement a mobile work management system.
With more than 24 years of experience leading IT functions for consulting, telecom, media and utility companies, Mr. King has managed a broad portfolio of responsibilities, including customer systems, billing, data warehousing, business intelligence, workforce management, finance, human resources, energy management, ecommerce, project management and mergers/acquisitions.
He began his professional career with Andersen Consulting (Accenture) in the utility and telecom practice. Later, he joined Sprint, where he led significant portions of IT efforts for the Sprint/Nextel merger, and Sprint’s local telecom business spinoff to form Embarq (CenturyLink), where he was responsible for all IT delivery and support for Embarq’s consumer, business and wholesale customer lines of business. Prior to joining KCP&L in 2011, Mr. King was director of IT shared services for Dish Network, where his accomplishments included implementing a centralized IT services organization.
Mr. King holds B.S. and M.S. degrees in industrial engineering from the University of Arkansas, and a B.S. in mathematics from Harding University.
Currently a member of the Salvation Army advisory board, Mr. King previously served as a volunteer with the Boys and Girls Clubs of Greater Kansas City, where he helped organize the creation of the Embarq Technology Center.

More
Aaron J. Scantlin

Aaron J. Scantlin

Security Analyst, Division of Information Technology, University of Missouri, Columbia

Aaron is a security analyst for the University of Missouri, as well as an adjunct professor at the Columbia campus where he teaches a cyber security course for the MU IT Program. His primary job duties as a security analyst include incident response and forensic investigation. Combined with his charismatic personality and passion for education, Aaron loves to break down the jargon surrounding cyber security and spread that knowledge in ways that can be easily understood regardless of technical background. In his talk, Aaron will discuss how organizational leaders can educate their users on the threats that face their company, and how those educated users can be leveraged to provide additional protection to the organization's network.

More
Al Pomerantz

Al Pomerantz

Principal, Sofbang

Al Pomerantz has had an extensive career in technology. Some of his notable projects related to the Internet of things include WellTrends, ISIMS, AI in Network Security Appliances, and Animally Detection Engine. Mr. Pomerantz conceived the WellTrends concept which utilizes individual health related data and statistical process control to determine acute and chronic illnesses. He invented ISIMS which is an Intelligent Secure Incident Monitoring System that uses building automation control sensors to alert event first responders to anomalies within the event area. Al managed a successful three year NIST ATP research grant on utilizing Artificial Intelligence (AI) in network security appliances. Mr. Pomerantz has conceptualized a method to manage the massive amounts of Internet of Things data utilizing networked anomaly detection engines that can be cascaded to perform complex analysis of data to bring to the surface only that data which is relevant for use or examination.

More
Allen Russ

Allen Russ

Solution Architect, Public Sector Chief Technology Office, Adobe Systems

Mr. Russ is a Solution Architect working in the Public Sector Chief Technology Office
team. He is responsible for helping customers define and design enterprise
solutions for business process transformation needs.
Mr. Russ has specific expertise assisting public sector agencies transform their
legacy business applications by deploying a new, state-of-the-art user experience via
a web, phone/tablet App or eForm front end. This permits the rapid deployment of
a major application upgrade without the cost, schedule or risk associated with
modifying the underlying legacy business application.

Mr. Russ has extensive expertise and experience in document processing including:
Document management and DOD 5015.2 Certified Records Management
Electronic documents and forms
Paper document capture and automatic data extraction
Automated document generation
Document-driven workflow automation
PDF document security and archiving
Legacy business application integration

He has served as the principal architect for some of the largest document processing
implementations such as the California Department of Corrections and
Rehabilitation. This combination of eForms and scanned documents totals over 750
million pages growing at the rate of over 100,000 pages per day. All documents are
encrypted and protected via Adobe Digital Rights Management. The system is fully
integrated with the department’s Strategic Offender Management System. Over
50,000 authorized users access the document archive from nearly 100 locations
throughout California.
The majority of Mr. Russ’ career has been focused on partnering with public sector
customers to enable government to better serve citizens.

More
Peter Sloan

Peter Sloan

Managing Attorney, Information Governance Group, LLC

Peter advises clients on how best to retain, secure, preserve, and dispose of information. He helps clients throughout the United States create, validate, and update retention schedules; implement compliant information management policies and processes; and defensibly dispose of information. Peter also counsels clients on data security compliance and breach response readiness, and he works with clients to manage data breach response.
Peter has served clients across a broad range of industries, including:
Financial Services (national and state-chartered banks, investment companies, investment advisers, broker-dealers, tax preparation companies, insurance companies, and government-sponsored enterprises)
Health Care (health systems and hospitals, physician practices, pharmacy and pharmacy benefit management companies, pharmaceutical and biotechnology firms, and medical equipment manufacturers)
Energy (power and gas utilities, power transmission companies, oil and gas pipeline companies, and exploration and production companies)
Higher Education
Engineering and Construction
Manufacturing
Retail
Technology
Transportation

More
Dr. Gloria Stephenson

Dr. Gloria Stephenson

Manager, Cybersecurity and LAN Services, MORENet, University of Missouri

Dr. Gloria Stephenson is the Manager of Cyber Security and LAN Services for the Missouri Research and Education Network (MORENet) in Columbia, Missouri. Previous to joining MORENet, Gloria was the Executive Director of Technology for Independence School District and Assistant Director of Technology for Columbia Public Schools. Gloria has 25+ years of experience directing and supporting information technology and data security in educational environments.

More
Dale “Dr. Z” Zabriskie

Dale “Dr. Z” Zabriskie

Symantec Evangelist, Symantec Corporation

As an Evangelist for Symantec Corporation, Dale "Dr. Z" Zabriskie consults with IT professionals across the globe, advising on strategies for securing and managing their information. He is a CISSP (Certified Information Systems Security Professional), certified in Cloud Security Knowledge (CCSK), and is known for his ability to relate both technically and conceptually in an authoritative yet entertaining style. In his 16-plus year tenure with Symantec, Mr. Zabriskie has worked with organizations in over forty countries. Private sector clients include AT&T, Boeing, FedEx, Honeywell, eBay, ING, Shell, BP, and Rio Tinto as well as public sector agencies such as the City of Los Angeles, the Internal Revenue Service, the International Monetary Fund, Saudi Aramco, Her Majesty's Revenue and Customs, the Ministry of Railways of the People's Republic of China, and the Ministry of the Interior of the Kingdom of Saudi Arabia. He has also been a popular moderator and participant in numerous industry panels. His expertise is supported by over thirty years of career experience in information technology, regulatory compliance, research and development, healthcare, manufacturing, and sales with companies like IBM, SunGard, IKON, Fisher Scientific, and VERITAS.

More
View Speakers

Agenda

Tuesday, August 30

7:30 am Central

Registration and Morning Refreshments

Atrium

8:30 am Central

Opening Remarks

Missouri/Capitol Room

Honorable Jay Nixon, Governor, State of Missouri

Commissioner Doug Nelson, Office of Administration, State of Missouri

8:45 am Central

Keynote – Missouri Cybersecurity Task Force

Missouri/Capitol Room

The newly-formed Cybersecurity Task Force brings together government, business and academic leaders from across the State of Missouri to address the challenges and the possibilities arising from technological innovation. The Task Force has been created to help build plans to mitigate risks and safeguard security for government infrastructure networks, foster cyber security education and awareness, promote best practices to protect data statewide, and explore the role of public-private partnerships.

Commissioner Doug Nelson, Office of Administration, State of Missouri

9:15 am Central

General Session – State of the State of Cybersecurity

Missouri/Capitol Room

Rich Kliethermes, Acting Chief Information Officer, State of Missouri

Michael Roling, Chief Information Security Officer, State of Missouri

9:35 am Central

General Session – It Can Happen to You

Missouri/Capitol Room

Today, Distributed Denial of Service (DDoS) attacks and ransomware are in the news on a daily basis. From schools to hospitals and private sector to public sector, no sphere is immune to these attacks. Couple these external threats with the reality of an insider attack and the security of any organization is challenged on a daily basis. There are, however, lessons one can learn and strategies to put in place to help stave off or mitigate your risks. This panel discussion will share what organizations have learned and what they’ve done to survive these attacks and how you can learn from the bad day’s others have had.

Moderator: Alan Cox, Executive Vice President & Publisher, Government Technology magazine

Brennan P. Baybeck, Vice President, Global IT Risk Management, Oracle Corporation

Darren W. Carroll, Director, Security & Risk Management Practice, Enterprise Solutions Group, SHI (@darrencarroll41)

Kevin Keeney, Director, Cyber Incident Response Team (CIRT), Monsanto (@kevinkeeneyjr)

Dale “Dr. Z” Zabriskie, Symantec Evangelist, Symantec Corporation

10:00 am Central

Featured Speaker – What Can I Say?

Missouri/Capitol Room

Teri Takai, Former CIO of U.S. Department of Defense, State of California and State of Michigan; Senior Advisor, Center for Digital Government (@teritakai)

After many years at Ford Motor Company and stints in Michigan, California and the US Department of Defense, Teri Takai has seen it all. What she can tell you is a horse of a different color! Teri will share the thoughts and expertise gained from years of IT experience in many industries covering both the public and private sector. Lessons learned, the pervasiveness of the threats and the job we all must do will all be touched on in this informative presentation.

10:30 am Central

Break

Atrium

11:00 am Central

Concurrent Sessions

Organizational Awareness – What Leaders Can Do

Carnegies Room

On a daily basis, organizations the world over need to be in a state of constant vigilance regarding data security and privacy. Given the diversity in the workforce and the growing trend towards user-owned devices in the workplace, this is a daunting task. In this session, a group of experts will provide guidance on simple things leaders can do on a regular basis to improve overall security awareness and preparedness.

Daniel Clark, Security Architect, Sophos

Charles Herbst, Associate Commissioner, District 2, Cape Girardeau County

Aaron J. Scantlin, Security Analyst, Division of Information Technology, University of Missouri, Columbia

Combating Small Business Cyber Threats

Jefferson B/C

Small businesses are as much a target as larger organizations. In fact, they often have the most to lose as the combination of limited cybersecurity resources and a lack of financial resilience to business disruption can make smaller organizations a prime target. So what can you do? In this session, our speaker will discuss the options available that can help an organization improve its readiness, including best practices owners should be using in this war on cybercrime.

Kevin Seiler, Channel Manager, Check Point Software Technologies, Inc.

The Tabletop Exercise – What, Where, When, Why and How

Jefferson A

One of the most valuable things an organization can do to improve cyber security response is a tabletop exercise. They can last a few hours or be full and multi-day. They serve a vital purpose similar to their counterpart in emergency management disaster simulations and can make a challenging situation one where calm is the order of the day. In this session you will hear about exercises you can take part in and also receive advice and templates to host your own that can be tailored to your unique environment.

Mike Pendergrast, Chief Engineer, Critical Systems Security, Boeing

Renault Ross, Chief Cybersecurity Business Strategist, North America, Symantec Corporation

Solving the Personnel Gap

Truman B/C

If you can’t hire a full-time CISO (who can?), how can you logically divide the tasks and what should the key focuses be for each person? How can you leverage internal staff, create cross-training strategies and even extend the capacity of your current IT staff? Conversely, can you job rotate this position? Join this session to learn creative ideas for how to create a CISO by committee and other innovative ways to solve the personnel gap.

Chris Konrad, Cyber Security Engagement Manager, World Wide Technology (@cjkonrad)

Michael Roling, Chief Information Security Officer, Information Technology Services Division, Office of Administration, State of Missouri

Network Awareness

Truman A

In the business world, it is said that you cannot manage what you cannot measure. In information technology circles, it is said you cannot secure what you do not manage! It is therefore of vital importance to gain endpoint and network visibility, using tools and strategies to bring to learn what is on your network and who is on your network with the fundamental question of why is it on your network? Cyber policies can create pockets within organizations that “go off the ranch” and make their own decisions if they feel the enterprise policies prevent them from being effective and nimble. What can you do to raise the security profile without causing parts of the organization to make decisions that can create greater risk? This session will be an open discussion on how and why to have more awareness of your network.

Darren W. Carroll, Director, Security & Risk Management Practice, Enterprise Solutions Group, SHI (@darrencarroll41)

12:00 pm Central

Lunch

Missouri/Capitol Room

12:45 pm Central

General Session – Cybersecurity Meets the Internet of Everything

Missouri/Capitol Room

Dr. Charlie Miller, Security Engineer, Uber (@0xcharlie)

Current projections suggest that 50 billion devices will be connected to the internet by 2020. As more and more gadgets are connected, cybersecurity issues will arise. This talk discusses the security implications of the Internet of things, including how we got into this situation and how it differs from the history of enterprise security. From this context, it discusses the recent forays into automobile hacking that led to a 1.4 million vehicle recall last year. Finally, it considers whether the security of the Internet of Things is serious concern or not as well as steps we take to protect ourselves.

1:30 pm Central

Break

Atrium

1:45 pm Central

Concurrent Sessions

The Role of Education in Cybersecurity

Carnegies Room

The academic community has important roles in the fight against cybercrime. They are a source of certified professionals and, through research, can help fight the next wave of attacks before they happen. But what are colleges and universities in Missouri doing to alleviate the demand pressure for trained cyber warriors? What is the value of certificates like CISSP, CISM and CISA? What programs can/should you send staff to? How do you plug yourself into this network if you need to hire someone or if you want to provide feedback on skill programs needed? This session will provide you an overview of the role education is playing in the war on cybersecurity and will share resources you can use to help bolster the skills within your organization.

Dr. Vijay Anand, Professor, Southeast Missouri State University

Dr. Jeanette Cowherd, Assistant Superintendent for School Improvement, Park Hill School District

Dr. Bruce McMillin, Professor of Computer Science and Associate Dean, College of Engineering and Computing, Missouri University of Science and Technology

Dr. Gloria Stephenson, Manager, Cybersecurity and LAN Services, MORENet, University of Missouri

The Internet of Things – Managing the Unmanageable

Jefferson B/C

By 2025 it is estimated that there will be over 20 billion devices connected to the internet! From personal medical devices to building automation systems and smart phones to autonomous vehicles, the world is getting connected. This wave of connectivity will add unfathomed risks to cybersecurity and we are just beginning to understand what this will mean. In this session, you will hear a frank discussion of what is coming and what needs to be done so as not to open new doors that will have to be closed before the data escapes!

Gary Johnson, Senior Director, Cyber Security and Infrastructure, Kansas City Power & Light

Al Pomerantz, Principal, Sofbang (@sofbang)

The Legal Side of Cybersecurity

Jefferson A

Whether an internal or external effort, a cyber-attack is a crime. That means that certain legal issues or principals are involved. In Missouri, there are basics steps that organizations are required to follow when responding to a breach. In this session you will gain an understanding of your individual and organizational responsibilities that will ensure you are following published rules and acting in a manner that will preserve a chain of evidence in the event of an attack.

Jeffery Jensen, Partner, Husch Blackwell LLP

Allen Russ, Solution Architect, Public Sector Chief Technology Office, Adobe Systems

Peter Sloan, Managing Attorney, Information Governance Group, LLC

Getting Back to the Basics or How Not to be the Low Hanging Fruit

Truman A

Most attacks go against known vulnerabilities that have not been addressed though they are known about for up to and over a year. For example, there is patch management. You know this needs to be done but it’s still not getting done. What can you do to put in place a comprehensive patch management program without it being a full-time job? Some organizations lack the proper tools to manage this process. Others simply get distracted by other pressing issues only to find a known vulnerability has not been correctly addressed. In this session learn how to handle the basics and not fall victim to an attack aimed at the low hanging fruit!

Jeff Coiner, Director of Information Systems, City of Springfield

Shane Harsch, Senior Solution Success Manager, RSA, The Security Division of EMC

Charles King, Vice President of Information Technology and Chief Information Officer, Kansas City Power & Light

How to Be Prepared for Cyber-Attacks Resulting from Civil Disruptions

Truman B/C

In the immediate aftermath of the civil disturbance in Ferguson, a cyber-attack was launched that caused network disruption to the City of Ferguson and also to St. Louis County and the State of Missouri. This is just one example of many where attacks were launched when officials were thought to be distracted or to add to the challenges that were already in play, be they man-made or natural. This session will be an opportunity to hear what happened but, more importantly, to learn what you can do to be prepared for cyber-attacks during other civil disruptions.

Rick Powell, Client Site Manager, REJIS

Venkat Sundaram, Enterprise Architect, Mythics Inc.

Patrick Woods, Assistant Director – Cybersecurity, Criminal Justice Information Services Division and Chief Information Security Officer, Missouri State Highway Patrol

2:45 pm Central

Break

Atrium

3:00 pm Central

Concurrent Sessions

Automation and Orchestration

Truman A

There are many point solutions employed for cybersecurity but few staff resources to handle the workload. What can be automated in this process? What is the balance between automation and the judgement of a trained professional? What are the next steps you can take? This session is for those organizations that are beyond the basics of cybersecurity but don’t have the resources in place to be a full-fledged enterprise cyber organization with all the bells and whistles.

Charles Cephas, Business Development Director, Veritas

Web and Mobile App Security

Jefferson A

One of the biggest areas of concern for any cybersecurity expert is focused on the development of secure mobile apps and web sites. Without the proper focus, the mobile world is easy to attack and a prime target for the black hats. This session will focus on the do’s and don’ts for web and mobile development so you can begin the process of ensuring greater security as you continue to move into the world where everything is built for mobility.

Kashif Dhatwani, Director, Identity & Access Management and Data Security Practice, BIAS Corporation

David Veit, Information Technology Specialist, Information Technology Services Division, Office of Administration, State of Missouri

Nikki Veit, Technical Architect, Information Technology Services Division, Office of Administration, State of Missouri

ROI for Cybersecurity Investment

Carnegies Room

In government organizations, it is especially difficult to show an ROI on investments towards cybersecurity. The basics can be done but that is rarely enough investment to protect all of the sensitive data within a government organization. So how do you show ROI? What are specific examples of positive ROI on security investments. This session will provide examples of ROI and how one can positively show the value of further cybersecurity investment.

Shawn Lorimer, Senior Aviation Consultant, Digital Aviation Business Consulting, Boeing

Mike Pendergrast, Chief Engineer, Critical Systems Security, Boeing

Social Engineering as an Attack Vector

Truman B/C

Con games go back centuries in human history. In the cybersecurity world, this takes a new form known as social engineering or social hacking. It comes down to this question: How do we secure the human? For both the practitioner and the end users who want to know the latest ways that the bad guys are employing to get sensitive data, this will be a must-attend session to wrap up the day.

Darren W. Carroll, Director, Security & Risk Management Practice, Enterprise Solutions Group, SHI (@darrencarroll41)

Ransomware Epidemic

Jefferson B/C

Ransomware has certainly gathered tremendous momentum over the past 18 months. According to Newsweek, Americans paid over $325 million due to ransomware attacks in 2015. So how do you protect you and your organization? What is the appropriate response? What are the legal issues and what is the role of law enforcement? This session will get you the latest information you need to be better prepared for preventing or remediating a ransomware attack on your data.

Troy Campbell, Director, Cyber Threat Intelligence Program and IT Director, Kansas City Terrorism Early Warning Fusion Center

Chris VanWagoner, Chief Strategy Officer, Commvault

4:00 pm Central

General Session – Tales from the Trenches

Missouri/Capitol Room

Grady Summers, Senior Vice President and Chief Technology Officer, FireEye

The threat landscape is an ever-changing topic. Ransomware, malware, social hacking and other threats are a real and persistent issue for all organizations the world over. This session will include examples of recent breaches and what can be done to prepare for similar attacks on your organization. Given that cybersecurity is a shared responsibility, knowing what is out there and what can be done to mitigate these threats will make it more difficult for the bad guys and potentially save your organization from a messy situation.

4:30 pm Central

End of Conference

Conference times, agenda, and speakers are subject to change.

For current updates, please visit the Executive Events website at www.govtech.com/events.

Capitol Plaza Hotel

415 West McCarty Street
Jefferson City, MO 65101
(573) 635-1234

Get Directions To
Capitol Plaza Hotel

Made Possible by Our Corporate Sponsors

Registration Information / Contact Us

Contact Information

 

2017 Sponsorship opportunities are available. For more information, contact:

Heather Earney
Government Technology
Phone: (916) 932-1435
E-mail: hearney@govtech.com

Venue

Capitol Plaza Hotel

415 West McCarty Street
Jefferson City, MO 65101
(573) 635-1234