2015 Cybersecurity Conference

December 15, 2015

Cybersecurity.Durham.472x300

What: 2015 Cybersecurity Conference

Where: Sheraton Imperial Hotel and Convention Center | 4700 Emperor Blvd, Durham, NC 27703

When: Tuesday, Dec. 15 | 7:00 a.m. – 2 p.m.

Ticket Pricing:
North Carolina Chamber Member: $149 or register two at $199
Strategic Partner Cary Chamber Member Ticket: $149 or register two at $199
Strategic Partner NCRMA Member Ticket: $149 or register two at $199
Non-Members: $179 or register two at $299

Protect Your Business From Cybersecurity Threats

The Internet allows businesses of all sizes and from any location to reach new and larger markets and provides opportunities to work more efficiently by using computer-based tools. Whether a business is thinking of adopting cloud computing or just using email and maintaining a website, cybersecurity should be a part of the plan. In today’s digital age, theft of digital information has become the most commonly reported fraud, surpassing physical theft. Every business that uses the Internet is responsible for creating a culture of security that will enhance business and consumer confidence.

Co-hosted with the U.S. Chamber of Commerce, this conference was designed with both small and large businesses in mind. Broadband and information technology are powerful factors in businesses reaching new markets and increasing productivity and efficiency. However, businesses need a cybersecurity strategy to protect their own business, their customers, and their data from growing cybersecurity threats. This event will help businesses learn how to mitigate cybersecurity risks, identify and prepare for potential threats as well as discover the economic impact and how it can affect our state’s infrastructure.

REGISTRATION CLOSED

Get Engaged: #Cyber15

Presenting Sponsors:

Duke Energy Logo for presenting sponsor       smith_anderson_logo_2015_med

Strategic Partners:

         

Silver Sponsor:

CenturyLink

Patron Sponsor:

Citrix

Exhibitor:

Citrix

DRAFT AGENDA

7:00 – 8:00 a.m.
Registration and Breakfast

8:00 – 8:15 a.m.
Welcoming Remarks

Lew Ebert, president and CEO, North Carolina Chamber
Ann M. Beauchesne, senior vice president, U.S. Chamber of Commerce (emcee)

8:15 – 8:45 a.m.
Morning Keynote: Role of DHS in Cybersecurity
Cybersecurity is a top priority for DHS. Cyber threats are increasing in their frequency, scale, and sophistication. Cybersecurity must be a partnership between government and industry. DHS Secretary Johnson will discuss how the DHS will execute it’s mission to serve as the central federal interface for the private sector in responding to and recovering from cyber threats. Secretary Johnson will also detail how the DHS is improving and expanding it’s capability to send and receive cyber threat information to the private sector.

Russell C. Deyo, under secretary for management, Department of Homeland Security

8:45 – 9:00 a.m.
Energy Sector Perspectives on Cybersecurity
The power grid is a complex, interconnected network which can be vulnerable to cyber and physical attacks. A.R. will talk about Duke Energy’s efforts to safeguard the electric grid by, investing in tools, technology, and talent to create more resilient networks, promoting robust information sharing within the electric sector and government partners, and developing incident response plans.

A.R. Mullinax, executive VP, Strategic Services, Duke Energy

9:00 – 9:45 a.m.
Panel Discussion: Risks, Costs, Disputes and Litigation
A few years ago, cyberattacks against the government and corporations were on the margins of news stories. But after the attacks waged against major corporations and OPM, people realize that these attacks are no joke. Have you considered your organizations legal exposure? A panel of experts will discuss cost of a breach or potential breach, overview of the data regulatory landscape and potential regulator fines and penalties, and steps for planning for, responding to and mitigating the effects of a breach.

Jackson W. Moore, partner, Smith Anderson
John H. Jo, partner, Smith Anderson
Alex Pearce, privacy counsel, SAS Institute Inc.
Moderator: Alicia A. Gilleskie, partner, Smith Anderson

9:45 – 10:05 a.m.
Protecting Your Cyber Network Using the NIST Framework
Cybersecurity experts often say that there are two types of businesses–those that have been hacked and know it, and those that have been hacked and don’t know it yet. In 2014, the National Institute of Standards and Technology (NIST) released a cybersecurity framework to help businesses start a cybersecurity program or improve an existing one. Adam will discuss best practices to help early users of the framework better understand it, give business owners tools and tips for strengthening a cybersecurity program, and also explore ways to communicate about cyber with small and midsize supply chain partners.

Adam Sedgewick, senior information technology policy advisor, National Institute of Standards and Technology

10:05 – 10:20 a.m.
Networking Break

10:20 – 10:40 a.m.
Cyber Threats to U.S. Businesses
Nation states, or their proxies, and cyber criminals steal our login credentials, payment card data, trade secrets, and much more on a daily basis. Cybercrime costs the global economy about $445 billion in a typical year. Aside from the monetary costs, businesses risk a loss of consumer confidence and reputation. Brian will talk about these threats and why businesses of all sizes need to adopt basic internet security practices to reduce their network weaknesses and make the price of successful hacking steep.

Denise Anderson, executive director, NH-ISAC

10:40 – 11:25 a.m.
Panel Discussion: Securing the Cyber Supply Chain
Risks to the supply chain can take multiple forms (e.g., natural, accidental, financial, cyber). However, there are wide variety of both public and private sector efforts under way to manage cyber supply chain risk, which is an emerging and complex area. This panel will examine what are malicious actors seeking to get access to (and do) once inside a company’s network, what steps—from basic to more sophisticated—can most businesses undertake to guard their cyber supply chains and how important is timely cyber threat information sharing.

John Cassidy, branch director, Cybersecurity Division, CenturyLink
Terrell Garren, managing director, IT Infrastructure & Operations, Duke Energy
Joe Jarzombek, director of software & supply chain assurance, Office of Cybersecurity & Communications, National Protection & Programs Directorate, Department of Homeland Security
Moderator: Bradley Hayes, director, U.S. Chamber of Commerce

11:25 – 11:55 a.m.
Panel Discussion: Law Enforcement Agency
The Chamber is in close contact with the FBI and the Secret Service, which are often the first entities to learn of criminals’ access to company networks. The Chamber engages law enforcement to build trusted public-private relationships, which are essential to confirming a crime and beginning a criminal investigation. Our message is that as organizations build their cyber incident response plans they should establish a relationship with their local federal law enforcement offices. The purpose of the panel is to introduce local federal law enforcement experts and their capabilities, roles and responsibilities to the private sector. The goal is to build trusted relationships between public-private sectors that cultivates bi-directional information sharing.

Stanley Crowder, special agent, U.S. Secret Service
Jessica Nye
, supervisory special agent, FBI
Moderator: Bradley Hayes, director, U.S. Chamber of Commerce

11:55 – 12:10 p.m.
Networking Break

12:10 – 1:10 p.m.
Utilizing an Operational Technologies (OT) Appraoch to Mitigating Cybersecurity Risk
The growing number of serious attacks on essential cyber networks is one of the most serious economic and national security threats our nation faces. Gouhin will discuss the evolving cybersecurity threat and the tools and resources industry is utilizing to combat the threat.

Patrick Gouhin, Executive Director & CEO International Society of Automation

1:10 – 1:25 p.m.
A Decade Of Data Breaches – Where Are We Now?

Alicia A. Gilleskie, partner, Smith Anderson

1:25 – 1:55 p.m.
Panel Discussion: Evolution of Cybersecurity in Universities and Higher Education
Many experts believe that we are beyond the point of technology being able to solve cybersecurity. Prod-ucts and solutions are regularly brought to market to address emerging threats and the private sector is sharing best practices across sectors. The question now is about people. How are educational institutions building programs to funnel more talent into the pipeline and how are colleges and universities recruit-ing students to these programs.

Richard Biever, chief information security officer, Duke University
Douglas Reeves, professor of Computer Science; associate dean of Graduate Programs for College of Engineering, NCSU Department of Computer Science
Daniel Stein, director of National Cybersecurity Training and Education Program, Office of Cybersecurity and Communications, National Protection and Programs Directorate, U.S. Department of Homeland Security
Moderator: Yi Deng, Ph.D., dean and professor, UNC Charlotte, College of Computing & Informatics

1:55 — 2:00 p.m.
Closing Remarks

Ann M. Beauchesne, senior vice president, U.S.  Chamber of Commerce

Cancellation Policy: Cancellations must be made no later than five business days prior to the program for a full refund. After this date, no cash refunds will be granted. Substitutions are welcome.

Comments are closed.