Category: Conference

Speaker Feature: Jeremy Dorrough

jdorrough1@gmail.com

@jdorrough1

Jeremy has built his career around protecting assets in the most critical IT sectors. He started his career working in a Network Operations Security Center for the US Army. He then went on to work as a Network Security Engineer defending Dominion’s North Anna Nuclear Power Station. He also spent a couple years as a Senior Network Security Engineer/Architect at Genworth Financial. Currently Jeremy works as an Advanced Solutions Architect for Comm Solutions Company focusing on named accounts in the Central VA area. He has presented at DefCon, UNC, JMU, ECPI, FBI Infragard and holds or has held CISSP, CISM, CEH, GIAC GPPA, CCSK, CCNA. Jeremy has spent over 10 years researching and implementing new ways to defend against the latest attacks. He is happily married and a father to two soon to be hackers.

Zero Trust “Lite” Architecture to Securely Future-Proof Your Network

The traditional 3-tier data center architecture model continues to challenge security professionals who are tasked with embracing a highly mobile workforce. I and many others were taught years ago that we must design an onion like perimeter that has a trusted user base and critical data living inside a well-protected perimeter. Forrester turned this model on its head when they coined the term “Zero Trust” in a report published in 2010. I prefer not to speak in absolutes, so I’ll proposed an alternate, more flexible approach to implementing the Zero Trust methodology. Instead of eating the elephant, I’ll show how implementing bite sized portions of the Zero Trust model will help future proof your organization against challenges such as BYOD, SaaS offerings, Cloud hosted resources, mobile workers, and the ever increasing compliance requirements on segmentation.

Come see me at RVAsec 2017. Register Now!


CTF Sponsor – Rapid7

www.rapid7.com

@rapid7

We are very pleased to announce Rapid7 is our sponsor for the CTF this year! Please stop by and say hi to their representatives in the Capture the Flag room.

RVAsec 2017 Register now!


Speaker Feature: Jason Ross

algorythm@gmail.com

@rossjafmqH88GC.jpg (278×278)

Jason Ross is a Senior Consultant with NCC Group – a global information assurance specialist providing organizations with expert security consulting services. Working primarily from Rochester, NY, he has developed and delivered training tools and programs on topics such as advanced mobile penetration testing, android forensics techniques, and enterprise-level malware analysis.
Jason has spoken at many regional conferences across the United States, as well as major security conferences including Blackhat DC, BSides Las Vegas, DerbyCon, and DEF CON Skytalks.

DevOpSec – Killing the Buzz

The DevOps movement continues to grow, and it is beginning to move out of small startups into large enterprises. DevOps and Agile development bring a lot to the table, but are often viewed as coming at the expense of security. This presentation explores ways to integrate security into DevOps environments: identifying the benefits of doing so, outlining potential problems, and attempting to provide solutions to them. Ultimately, the talk hopes to provide practical guidance and tools that can be used as a base to improve security throughout the stack.

Come see me at RVAsec 2017. Register Now!

 


Speaker Feature: Mike Shema

mikeshema@yahoo.com

@CodexWebSecurumAAEAAQAAAAAAAAoZAAAAJGYwM2QxYmQwLThlNDktNGU4Mi1iNDhlLWFlMWUzZWY2OGI3MQ.jpg (200×200)

Mike Shema is VP of SecOps and Research at Cobalt.io, where he organizes crowdsourced pen tests. Mike’s experience with information security includes managing product security teams, building web application scanners, and consulting across a range of infosec topics. He’s put this experience into books like Anti-Hacker Tool Kit and Hacking Web Apps. He has taught hacking classes and presented research at conferences around the world.

Managing Crowdsourced Security Testing

The crowdsourced security model has been embraced by organizations running public bug bounty programs. These programs are intended to discover and resolve vulns in production applications, but they can unexpectedly deviate from being an effective part of the security development lifecycle into a source of noise. This presentation questions what role such programs have in improving security and what pitfalls they pose for security budgets. It covers strategies for keeping a bounty program focused on positive contributions to development and avoiding the traps that make it a distraction.

Come see me at RVAsec 2017. Register Now!


Speaker Feature: Seth Hanford

shanford@ckure.com

@SethHanfordbd0ca9e985a4cf12ed87d3247057a2ef.jpeg (500×500)

As a Staff Information Security Engineer, Seth Hanford applies his experience to incident response, PSIRT, and security operations functions for both enterprise and customer security. Hanford has been an individual contributor for PSIRTs, CSIRTs, and intelligence teams in small businesses, large enterprises, and several global teams. He has worked on-site in operations center watch floors, collaborated globally with FIRST Special Interest Groups, and has more than a decade of experience being an effective full-time remote worker. He has also had the pleasure to serve as a manager both globally and locally, and recruited for world-class threat research teams as well as to relaunch a Fortune 100 SOC into a threat-driven detection & response team.

Defend the Defenders: Managing and Participating in Excellent Teams

Response teams apply threat models to protect an organization’s goals and to determine which controls are important to defend organizational interests. But defensive teams themselves are under threat: working in emergency response takes its toll on individuals. Budgets, over-commitment, urgency, and crisis all put a great deal of pressure on incident responders. This presentation will examine “threats against the goals of the SIRT itself” for managers and “blue team” practitioners: how to build, manage, and participate a defensive / incident response team under fire. Attendees will learn a practical approach for identifying and defending against the key threats against their team goals. The speaker will share examples from his own past threat modeling, such as: how to find, hire, and retain good candidates; how to maintain morale when under crisis; how to improve a struggling team; how to (re)organize to meet imminent challenges to long-term success; and more.

Come see me at RVAsec 2017. Register now!


Speaker Feature: Greg Pepper

gpepper@checkpoint.com

@pepper_greg

Greg Pepper has been an IT professional for 15+ years with expertise in Security, Networking & Cloud Computing. Initially working for Sony Online Entertainment, PriceWaterhouse Coopers & Organic, Greg has spent the last 15 years working for Cisco & Check Point helping customers to design, plan and implement secure networks throughout the Internet Edge, Campus Backbone, Data Center and Cloud Environments. Currently as Head of Cloud Security Architects for Check Point, Greg focuses on Software Defined Data Centers working with customers and partners to secure Software defined solutions with in Amazon Web Services, Microsoft Azure, VMware NSX, Cisco ACI and OpenStack.

Best Practices for Securing the Hybrid Cloud

Cloud has enabled applications and infrastructure to move at a pace not seen before. Organizations are faces with options to invest in and enhance their physical data centers to deploy SDN and build private clouds. Alternatively, many companies are choosing to migrate these applications in to the Cloud. Public Cloud options for Infrastructure as a Service and or Platform as service exist, but there exists a shared responsibility for security in either of those scenarios. Come learn strategies, design templates and best practices on how to secure applications through automation & orchestrations, making security as a integral part of the cloud and SDN deployments.

Come see me at RVAsec 2017. Register Now!


Gold Sponsor Feature: Synopsys

www.synopsys.com

@synopsys

synopsys-logo.jpg (1900×465)

Synopsys technology is at the heart of innovations that are changing the way we live and work. Powering this new era of technology are advanced silicon chips, which are made even smarter by the remarkable software that drives them. Synopsys is at the forefront of Smart, Secure Everything with the world’s most advanced tools for silicon chip design, verification, IP integration, and application security testing. Our technology helps customers innovate from Silicon to Software, so they can deliver Smart, Secure Everything.

Come see us at RVASec. Register now!


RVAsec 2017 Speakers and Schedule Announced

We had many great submissions to the CFP this year! It was extremely hard but the CFP team has managed to select a great lineup for RVAsec 2017.

Thank you to everyone who submitted a proposal to the CFP –the review team had to make some tough decisions and we appreciate all the time and hard work that went into submitting.

Without further delay, here are the speakers for the RVAsec 2017!

For the full details and times for specific talks, please see the schedule page.

Reminder ticket prices are going up April 21st, so you better register quickly is you haven’t yet!


Hospitality Sponsor: f5 Networks

We are pleased to welcome f5 Networks as a Hospitality Sponsor! All the food and drink served on Thursday 8th will be sponsored by them, so be sure to stop by their table to say hi and thank them for feeding everyone!

www.f5.com          @F5Security

JtRe4oYK.png (369×369)

Register Now!


After Conference Reception Sponsor: Sophos

We are pleased to announce that Sophos are sponsoring our After Conference Reception on Friday, 9th June. The Reception will be held in the Commonwealth Ballroom directly after the last talk on Friday afternoon. Thank you to Sophos, and we look forward to seeing you all there!

Sophos Large copy.jpg (374×198)

www.sophos.com  @Sophos

Sophos makes IT security simple. Focused on innovation in next-generation protection, Sophos solutions are simple to deploy, maintain and manage, enabling organizations to protect and defend their networks, their information and their people. Sophos – Security made Simple.

Come see us at RVAsec. Register now!