Please enter the building through 900 E Market St Ste 101, San Antonio, TX 78205 (near the UPS store). From the lobby you may take the elevator, stairs, or escalator up to the 3rd level. DO NOT ENTER in through the Lila Cockrell Theater, as our meeting space is on the opposite side of the convention center.
Download the CyberTexas Conference App by Whova to stay connected at the event. The App will have the most up to date agenda. Click the Whova logo below to download the App.
Click a block to view session details
Hemisfair Ballroom Pre-Function Area
Mr. Joe Sanchez
Hemisfair Ballroom Section 1
Mr. Jim Perschbach
Dr. Taylor Eighmy
Mr. Robert Cole
Hemisfair Ballrom Section 2&3
Dr. Davina Pruitt-Mentle
Brigadier General Bernie Skoch (USAF, Ret.)
Ms. Sarah C. Moffat
Mr. Kevin Nolten
For the first time since the Labor Department started keeping track in 2000, there are more job openings in the U.S. than unemployed workers to fill them. The number of openings hit a record 6.7 million for July 2018, exceeding the number of jobless by 352,000. On paper, there's more jobs than job seekers. This news comes as the unemployment rate sits at 3.9 percent nationwide, a rate that measures the percentage of out-of-work people who are actively looking for a job against the entire labor force. These numbers include a shortage of 1.8 million information security workers predicted by 2022. So, we have this unique situation-a low jobless rate, record job openings, and more than enough people to fill them. So why aren't employers hiring the millions available who are actively looking for work? Many focus on the need to bring awareness to youth and others about careers in this field. Some economists consider a big factor to be that of a skills mismatch. Simply put, there is a disconnect between the skills employers are looking for in their workers and the skills the jobseekers have.
Entire industries, as well as individual companies, are feeling the pressure of these issues already, and are on the hunt for a solution. A holistic approach has been suggested to build awareness and interest in cybersecurity careers and pathways, and provide the education and training of both the current and future workforce in a way that is both exciting and effective.
Join our stellar panel of experts as they share insight into how to best address these issues to increase the number and improve the quality and diversity of the cybersecurity workforce.
The Cyber Job Fair is free and open to both clearned and non-cleared cyber Professionals and students in a college-level cyber security program
Interview with Abacus Technology, Accenture Federal, Air Force Civilian Service, Ball Aerospace, Bank of America, CNF Technologies, IPSecure, ManTech, SOSi, USCYBERCOM, USAA and more!
Resume Reviews during the event with Army veteran and Six Second Resume author Bill Branstetter.
Mr. Jim "Brodie" Brazell
Mr. Chris Cook
Dr. Glenn Dietrich
Mr. Robert J. Kaufman III
Mr. Fred Ramirez
How San Antonio Developed the Foundation for a Thriving Cybersecurity Ecosystem
Abstract: San Antonio is home to our nation's second largest concentration of uniformed and civilian cybersecurity experts. The city's significant military presence, growing private cybersecurity enterprises and nationally recognized technology and research institutions have helped SA develop a large concentration of critical network security assets. In recognition of the city's tricentennial anniversary, hear top business, education and military leaders discuss:
- SA's technological and business development growth, and the city's role in changing the national cyber landscape;
- SA's innovative approach to cyber education and training;
- DOD's cyber-related enterprise growth and opportunities
Hemisfair Ballroom Section 2&3
Mr. Robert W. Heller
Roadway vehicles being manufactured today are produced with devices that connect them to the Internet. Manufacturers use these devices to provide a multitude of services including detection of emergency conditions, monitoring maintenance conditions, and providing over the air firmware updates to the numerous electronic control units. Vehicle users make use of the connectivity to stay in touch, provide entertainment, receive navigation aid (directions and traffic conditions), request information and request emergency help.
Similarly, our transportation professionals are expanding networks to the roadside. When combined with the cost of right of way, the impact of construction on current capacity and the cost of the roadway surface itself, the addition of lane miles is being cost prohibitive. By using information gathered from roadside devices, transportation professionals are squeezing more capacity out of the existing roadway system.
As the connectivity continues to expand, the exposure to cyberattacks does as well. The common press as well as the trade publications have related numerous stories of attacks on connected vehicles. Fortunately, the publicized attacks have been "white hat" attacks, but I believe it is only a matter of time before a less well intentioned attack takes place.
This presentation will cover examples of known vehicle attacks, the vehicle attack surface, and countermeasures that vehicle manufacturers can and are taking to mitigate vehicle vulnerabilities. Similarly, a survey of the roadside network will be provided with countermeasures that manufacturers, installers and operators can take to make the roadside network more secure. Strengthening the security of vehicles and the roadside network can provide a more reliant roadway transportation system.
Mr. Joey Rachid
Room 212 AB
This presentation outlines how to address the problem through a multi-business unit approach, while setting up controls to protect, detect, and respond to the insider threats. Concepts covered include: who insiders are and the most prevalent types; insider threat best practices; foundational procedures and technologies; detection indicators; and a few real world examples of insider activity.
Dr. Daniel Ragsdale
Daniel L. Cruz
Room 213 AB
Come explore the past, present, and future of competition-based cybersecurity education! With cybersecurity being such a rapidly moving and changing target, learn about tactics to engage learns young and old through the use of interactive and engaging techniques designed around enabling student-learners to enjoy and want to actively participate in lifelong learning. Journey through the history of cybersecurity competitions, including taking a detailed look at the next generation of competitive platforms and technologies that are being deployed to engage all types of ages, interests, and abilities.
Dr. Nicole L. Beebe
Mr. Jacek Materna
Mr. Chris Gerritz
Featured Product: Source Code Management
The recent onslaught of cyber-attacks has left many organizations re-evaluating what's in their toolbox to help combat cyber-crimes. Having the right armor for pre- and post-cyber-attack strategies is the key to survival. Learn how these four innovative products can help you defend your network in real-time. Hear a panel of product development experts and technologists provide insight on next generation tools designed to protect business and personal assets.
Mr. Paul Guido
Mr. Hed Kovetz
Mr. Ross Johnson
Mr. Gregory Garza
Ms. Elizabeth A. Rogers
Mr. Todd Kimbriel
Mr. R. Sean McCleskey
Dr. Richard Ford
You're a proactive CEO or Board Chair and realize that a Cybersecurity professional needs its own swim lane in your company. Move over CISO, CTO and CIO. But, wait. How do you describe the position? What are the required skill sets? Where do you find professionals with the unique skillset of a CXO? This (panel) presentation will provide practical advice about the recruitment sourcing and selection of the candidate who will provide leadership in this critical role that is evolving on a global basis. Learn how to create the posting, how to screen and facilitate the interview process and how to ultimately select the ultimate candidate.
Ms. Deborah Carter
Security is a business issue affecting everything from personal data, revenue, operations and customer experience, and it must be an active and ongoing process to keep up with advanced persistent threats affecting organizations by the minute. Qualified Cyber Security talent is needed now more than ever. Rackspace, in partnership with local Cyber leaders, created Open Cloud Academy's Cyber Security Learning Track. Join us to learn more about the opportunity to gain in demand Cyber Security skills and certifications.
The National Initiative for Cybersecurity Education (NICE) - a partnership between government, academia, and the private sector - is working to energize and promote a robust network and an ecosystem of cybersecurity education, training, and workforce development. This presentation will report highlights of a variety of NICE coordinated activities, and will discuss in greater detail NICE efforts and various opportunities for CyberTexas participants to be more involved and engaged with the NICE program. Be prepared to
*Explore how Texas cybersecurity education opportunities compare to other states,
*Explore free tools like CyberSeek, the Challenge Project, and the NICE Workforce Framework and learn how they can be used to design cybersecurity career pathways,
*Learn about the National Cybersecurity Career Awareness Week (NCCAW), a national celebration that focuses on increasing awareness about the plethora of careers in cybersecurity, what's in store for this year, and walk away with examples and suggestions of how you can participate and make a difference, and
*Start preparing for this year's NICE K12 Cybersecurity Education Conference to be held in San Antonio in December.
Laura Baker, MBA, ARM, BS Marketing
Mr. Bret Piatt
Hemisfair Ballrom Section 1
In today's digital world, it is more important than ever to ensure that your data is protected especially with the rise of machine learning also known as artificial intelligence (AI). Machine learning is a popular technology topic as it's becoming a part of our daily lives and can potentially have powerful implications for good and evil. Hackers are now using AI to automate time-consuming attacks with the use of hackbots, email phishing and social media phishing. The presentation will help attendees understand how AI and machine learning are being used for offensive and defensive cybersecurity activities.
Colonel Allan Abel Carreiro
Mr. Grant Bourzikas
More than a third of all companies are still approaching cybersecurity manually. This is not sustainable. As cybercriminals get smarter, the need for SOC operations to evolve becomes more important.
The next generation SOC is modular, open, and automated. Integration of data, analytics, and machine learning are the foundations of the advanced SOC. Human-machine teaming turns security events into actionable insights and act to confidently detect and correct sophisticated threats faster.
· Overview of the changing threat landscape and the most important, imminent risks
· An understanding of how to build a human machine teaming structure for maximum efficiency in cybersecurity
· Lessons learned from 3 phases of a state-of-the art SOC build out
Mr. Gordon MacKay
Roman Medina, Jr.
Dr. Greg White
Mr. Patrick Robinson
Mr. Michael Stewart
Mr. Joseph Krull
Mr. Rick Lipsey
During this session, the audience will engage in an in-depth discussion about the following topics:
1) Current State of Cybersecurity - The current attack profile and true segmentation of the attack groups
2) Common Errors and Misconceptions - Three fundamental things we are doing wrong because we are slow to adapt as cyber defenders
3) Good News On The Horizon - Emerging and disruptive cyber technologies and strategies
4) Things to Take Away - Three Relatively Simple Things You Can Do Now to Improve Your Defenses
Mr. George Finney
The most significant risks that businesses today face is Cybersecurity. Security is a people problem, not a technology problem, which is why 95% of breaches are caused by the human element. Cybersecurity is a behavior, not a skill. Yet, we've taught cybersecurity awareness for years as though it were a skill to be learned like any other technology. To change behaviors, we need to understand the underlying habits that govern our responses. This presentation will explore nine key cybersecurity habits, and will look at how you can use those habits to focus on changing behaviors in your security training. Join this session to tailor your approach to awareness training and have the greatest impact for all of your employees.
Mr. Phil Bezanson
Ms. Angela Styles
Mr. Bob Wagman
As the world's largest purchaser of cybersecurity products and services, the federal government drives the standards for and funds significant portions of the Cybersecurity space. Whether you provide commercial products or complex research, understanding your position in the federal contracting marketplace, the potential opportunities, the compliance expectations and the potential risks, ensures that the Cybersecurity industry continues to grow and evolve. From protecting intellectual property to understanding federal standards and potential liability, successfully learning how to navigate federal contracting and subcontracting in the Cybersecurity space will reduce risks, demonstrate responsibility and increase the potential to share in federal funding.
Mr. Andrew Pilato
Whenever a vulnerability becomes known to the public, an organization should ask the following questions in order to adequately understand the actions and urgency necessary to defend against it. Is the organization's technology affected, exposed, vulnerable, patched, exploitable, engaged? Often those questions cannot be fully answered due to a lack of security information their presentation to analyst. This demonstration and paper explore the innovative possibilities utilizing ingested data from numerous sources into a common group of open source capabilities. These capabilities can accept data in any format and allow search, analysis, and visualization methods to provide maximum cyber situational awareness in real time.
Mr. O'Shea Bowens
Mr. Adam Moore
Mr. Justin Swisher
Ms. Juliet Okafor
As organizations have become acutely aware of the importance in maintaining solid incident response programs, there has been a paradigm shift. Attackers continue to evade countermeasures and in case after case of successful breaches, recognition of threat hunting programs has become prevalent. The panel will touch on important strategies, tools, techniques and planning to consider for your hunt. We will talk about the reality of the relationship between incident response, cyber threat intelligence and threat hunting, as well as how one defender's constrained resources led them to the Purple Team concept, and how that may be something for your organization to consider.
Mr. Jacob Stauffer
In the wake of the Russian conspiracy to interfere with the 2016 U.S. Presidential Election, a number of questions have been raised regarding voting system security. No system is "hacker-proof" and even systems without a direct connection to the Internet are potential targets. States and local governments, with the assistance of federal agencies, are investing time and resources into securing their systems. But are we doing enough as a nation, in the subject of cybersecurity, to safeguard our democracy and verifying that our vote counts for the right candidate or resolution?
During this briefing we will discuss the role of federal, state, and local governments in elections and how states like California lead the way in voting system security. We will cover the different components that make up election operations and the various elements of risk management and the potential impact of a breach. We will also discuss advancements in the field of security and how local and state officials are working to safeguard election operations. Finally we will go into case studies based on public report findings and dispel rumors and half-truths from both sides of the field.
Ms. Pam Cerny
Stories about Bitcoin and other virtual currencies have been all over the news. So what does this payment innovation mean to you? What might it mean to the future of payments? Attend this session to learn the ins and outs of how virtual currencies work and how recent market activity and developments are helping to fuel the frenzy around virtual currencies and the technology that supports them.
The latest Cybersecurity tools often tout data analytics, artificial intelligence and machine learning as solutions to help find the needle in the stack of needles, but most major incidents still occur because someone forgot to patch or there was excessive elevated privilege, etc. While there is a lot to be gained from new tooling and technologies, they need to be stood up on a solid foundation that includes getting the basic blocking and tackling done right. This intent of this talk is to remind us that nailing the fundamentals isn't just basic, it's strategic in today's fight against Cyber criminals.
Federal Business Council, Inc.
All rights reserved.