Author: karen

Gold Sponsor Feature: University of Richmond

www.spcs.richmond.edu

@urspcs

The School of Professional & Continuing Studies (SPCS) at the University of Richmond offers degree and certificate programs, enrichment opportunities, professional training and summer programs to part-time and non-traditional students of all ages.

Come see us at RVAsec! Register now.


Silver Sponsor Feature: BlueVoyant

www.BlueVoyant.com

@BlueVoyant

Our team is made up of nimble problem solvers who are energized by the idea of outsmarting threat actors. Because we are built on best-of-breed technology, proprietary service models, threat intelligence data, and expert analysts, BlueVoyant is uniquely positioned to focus energy on the evolving threat landscape. Our expert analysts don’t spend their days on mundane tasks; those processes and playbooks are automated to allow us to detect and respond faster and with less manual human intervention.

Come see us at RVAsec. Register Now!


Platinum Sponsor Feature: SentinelOne

www.sentinelone.com.com

@SentinelOne

We are very pleased to announce SentinelOne is our Platinum Sponsor for this year!

Sentinelone’s Autonomous Endpoint Protection Saves You Time by Using Multiple AI Engines, Providing Complete Visibility into All Activity, and Even Rolling Back Threats with a Single Agent.

Our team understands how much endpoints matter. When attackers come after our privacy, intellectual property, infrastructure, and collaborative modes of working, they assault more than just data. We’re under attack, and so are our values. That’s why we’re dedicated to keeping our breakthrough platform ahead of threats from every vector. Gartner, NSS Labs, and industry leading organizations recognize that our approach sets us apart. Come see us at RVAsec 2020. Register Now!

 


Gold Sponsor Feature: Gigamon

www.gigamon.com / @gigamon

Today’s IT leaders often overlook opportunities to drive business innovation found in the ones and zeros hidden in their networks. The Gigamon Visibility and Analytics Fabric captures all network data, processes it and sends it to the tools and teams who need it. Using a single integrated platform, digital teams can choose advanced capabilities for easing network burdens, analyzing applications, and detecting and responding to threats.

Come see us at RVAsec. Register now!


Speaker feature: Charles Tango

Charles is the Chief Information Security Officer at Altria, the parent company of producers of superior branded tobacco and wine products such as Philip Morris USA and Ste. Michelle Wine Estates.
Charles also represents Altria on the board of the Richmond Technology Council, which supports technology innovation in the greater Richmond area, as well as the board of the Virginia Cybersecurity Partnership—a joint information sharing organization between government agencies and the private sector. Additionally he is a member of IBM Security’s Advisory Board, and a board member of a block chain venture capital fund / accelerator – Bloccelerate.
Prior to his role at Altria, Charles held senior level Information Security positions with financial institutions in the NY metro area, including Chief Information Security & Risk Officer for Sterling National Bank and Senior Vice President, IT & Operational Risk at Citigroup. During his time in NY he was also a charter founding member of the NY ISC2 Chapter.

Being Secure Doesn’t Mean You Are Managing Risk

Charles will explain the beginner concepts of identifying, quantifying, qualifying, and decisioning risks with a focus on how this differs from the practice of cybersecurity.

Come see Charles at RVAsec! Register now.


Speaker feature: Barry Kouns

Barry Kouns is CEO at Risk Based Security, a vulnerability intelligence, organizational ratings,
and on-demand security solutions firm. Barry’s experience includes information security consulting, risk assessment and quality management. Barry has full knowledge of GLBA, FFIEC, HIPAA, Sarbanes-Oxley, and ISO 27001 and is well versed with PCI DSS, ISO 9001, COBIT, FISMA, NIST 800-53, BS 25999, ISO 31000 and ISO 20000. He has earned a B.S. in Statistics from Virginia Tech and a M.S. in Industrial Engineering Management from North Dakota State University. He has earned the CISSP designation, is a trained ISO/IEC 27001:2013 Auditor & ISMS Implementer, and is ITIL Foundation Certified. Barry was a Captain in the United States Air Force and served as a B-52H Bombardier.

Risk Assessment – The Heart of Risk-based Security

Everywhere you look today you see “risk-based security” being touted as the next big thing. Knowing your assets, understanding the threats and vulnerabilities that may impact those assets, and calculating a risk score in order to prioritize mitigation actions, should be every organization’s goal. Risk-based security is not accomplished by performing a risk assessment exercise once a year. It requires a continuous assessment of your organization’s risk posture. Too many businesses think that completing a risk assessment is a difficult and complicated process that requires expensive software and can only be done by third party consultants. As a result, risk assessments are not conducted or conducted once and stored away to show the auditors. Risk assessments are essential in order to assure that the expenditures involved in mitigating vulnerabilities and the implementation of security controls are commensurate with the risks facing the organization. Attend this interactive session to explore the definitions, methodologies, structure and the expected results of a proper risk assessment that can be produced by your organization

Come see Barry at RVAsec! Register now.


Speaker feature: Chandos Carrow

@ChandosJCarrow

Chandos Carrow is a Co-Information Security Officer for the Virginia Department of Health. He has worked for the Commonwealth of Virginia for more than 10 years and has been with the VDH for almost 2 years. Chandos has worked in several state agencies in his career including healthcare and higher education. He obtained his Master of Science in Information Systems from VCU and his CISSP from (ISC) 2. He is a member of several information security user groups including the (ISC) 2 Richmond Metro Chapter, Virginia Cyber Security Partnership, and Commonwealth of Virginia Information Security Council’s Conference and Knowledge Sharing Committees. Chandos enjoys giving back the knowledge he has obtained over his career and is currently an adjunct IT professor at Bryant & Stratton College in Richmond.

Security Mind Expansion

Information security is always changing and to keep up with these changes we need to somehow upgrade the professionals to keep up. In order to do this we need to expand the brain of the information security professionals. In this presentation we will cover several modern day philosophy concepts and how to incorporate these concepts into your everyday practice. These concepts include: ontological design, looking-glass self, feedback loops, flow state, cognitive play. Applying these concepts will hopefully expand your mind and improve how information security is conducted.

Come see Chandos at RVAsec! Register now.


Hospitality Sponsor: Lacework

We are pleased to welcome Lacework as a Hospitality Sponsor this year! All the food and drink served on Thursday 23rd will be sponsored by them, so be sure to stop by their table to say hi and thank them for feeding everyone!

www.lacework.com

@LaceworkInc

RVAsec 2019. Register now!


Speaker Feature: Deana Shick

Deana Shick has been a Member of the Technical Staff at the Software Engineering Institute’s CERT Coordination Center (CERT/CC) for 5 years. Deana works on the Threat Ecosystem Analysis team where she researches and analyzes current and emerging threats and vulnerabilities. Prior to working at CERT/CC, Deana was an International Trade Specialist focusing on EAR and ITAR regulatory processes. In 2014, she completed her M.S. in Information Security Policy and Management from Carnegie Mellon University. Along with her position at CERT/CC, Deana teaches at the Heinz College at Carnegie Mellon University, and pioneered the Information Security program at Duquesne University in Pittsburgh, PA.

Intro to Infosec and Overview of the 101 Track

Information Security is constantly in the news and making headlines. Which companies are breached? What are the impacts? How will the government respond to adversarial nations? The Internet still behaves much like the wild west – policy decisions are consistently being made and changed based on the structure and sustainability of the web. Organizations large and small are feeling the impacts of having a poor cyber security posture. This talk is perfect for those who are beginners, career changers, or anyone who needs a refresh on the building blocks of  information security. It will discuss how data can be compromised, what those impacts are, and some suggestions of first steps. We will then dive into what vulnerabilities are and what to do about it. Finally, we will go over the things the rest of the 101 track will cover.

Come see Deana at RVAsec! Register now.


Speaker Feature: Eddie Glenn

Eddie Glenn is the senior threat intelligence manager at Venafi and is responsible for researching the risks and threats of code signing and endpoint infrastructure. Eddie has more than 30 years of experience in enterprise software at companies such as IBM, Rational, and Wind River where he held a variety of senior level positions in product management and product marketing. Eddie is co-author of the Definitive Guide to Next Generation Fraud and has written for various industry publications. He has a Bachelor of Science degree in computer and electrical engineering from the University of Virginia, and an MBA from the University of Oregon.

Code Signing: A Security Control That Isn’t Secured

Enterprises know code-signing is an important security control, for both self-defense and external reputation protection, but most overlook securing the infrastructure that supports the signing process, leaving them vulnerable to security and brand risks.
This session will discuss the four main poor practices often applied to code-signing infrastructure. This will be followed by a look at how these poor practices result in operational inefficiencies and security risks. The session will highlight the abuse and exploitation enabled by these poor practices and their ramifications, including the use of code-signing certificates to sign malicious code.
The session will conclude with a look at creating a secure enterprise code-signing infrastructure, including signing operations and models, inter-organizational communications, process and policies, and certificates issuance and management. Overall, the session will consider what is needed to create an infrastructure foundation for code-signing that will scale and adapt as networks continue to evolve and grow.

Come and see Eddie at RVAsec! Register now.