What: 2015 Cybersecurity Conference
Where: Sheraton Imperial Hotel and Convention Center | 4700 Emperor Blvd, Durham, NC 27703
When: Tuesday, Dec. 15 | 7:00 a.m. – 2 p.m.
North Carolina Chamber Member: $149 or register two at $199
Strategic Partner Cary Chamber Member Ticket: $149 or register two at $199
Strategic Partner NCRMA Member Ticket: $149 or register two at $199
Non-Members: $179 or register two at $299
Protect Your Business From Cybersecurity Threats
The Internet allows businesses of all sizes and from any location to reach new and larger markets and provides opportunities to work more efficiently by using computer-based tools. Whether a business is thinking of adopting cloud computing or just using email and maintaining a website, cybersecurity should be a part of the plan. In today’s digital age, theft of digital information has become the most commonly reported fraud, surpassing physical theft. Every business that uses the Internet is responsible for creating a culture of security that will enhance business and consumer confidence.
Co-hosted with the U.S. Chamber of Commerce, this conference was designed with both small and large businesses in mind. Broadband and information technology are powerful factors in businesses reaching new markets and increasing productivity and efficiency. However, businesses need a cybersecurity strategy to protect their own business, their customers, and their data from growing cybersecurity threats. This event will help businesses learn how to mitigate cybersecurity risks, identify and prepare for potential threats as well as discover the economic impact and how it can affect our state’s infrastructure.
Get Engaged: #Cyber15
7:00 – 8:00 a.m.
Registration and Breakfast
8:00 – 8:15 a.m.
8:15 – 8:45 a.m.
Morning Keynote: Role of DHS in Cybersecurity
Cybersecurity is a top priority for DHS. Cyber threats are increasing in their frequency, scale, and sophistication. Cybersecurity must be a partnership between government and industry. DHS Secretary Johnson will discuss how the DHS will execute it’s mission to serve as the central federal interface for the private sector in responding to and recovering from cyber threats. Secretary Johnson will also detail how the DHS is improving and expanding it’s capability to send and receive cyber threat information to the private sector.
Russell C. Deyo, under secretary for management, Department of Homeland Security
8:45 – 9:00 a.m.
Energy Sector Perspectives on Cybersecurity
The power grid is a complex, interconnected network which can be vulnerable to cyber and physical attacks. A.R. will talk about Duke Energy’s efforts to safeguard the electric grid by, investing in tools, technology, and talent to create more resilient networks, promoting robust information sharing within the electric sector and government partners, and developing incident response plans.
A.R. Mullinax, executive VP, Strategic Services, Duke Energy
9:00 – 9:45 a.m.
Panel Discussion: Risks, Costs, Disputes and Litigation
A few years ago, cyberattacks against the government and corporations were on the margins of news stories. But after the attacks waged against major corporations and OPM, people realize that these attacks are no joke. Have you considered your organizations legal exposure? A panel of experts will discuss cost of a breach or potential breach, overview of the data regulatory landscape and potential regulator fines and penalties, and steps for planning for, responding to and mitigating the effects of a breach.
9:45 – 10:05 a.m.
Protecting Your Cyber Network Using the NIST Framework
Cybersecurity experts often say that there are two types of businesses–those that have been hacked and know it, and those that have been hacked and don’t know it yet. In 2014, the National Institute of Standards and Technology (NIST) released a cybersecurity framework to help businesses start a cybersecurity program or improve an existing one. Adam will discuss best practices to help early users of the framework better understand it, give business owners tools and tips for strengthening a cybersecurity program, and also explore ways to communicate about cyber with small and midsize supply chain partners.
Adam Sedgewick, senior information technology policy advisor, National Institute of Standards and Technology
10:05 – 10:20 a.m.
10:20 – 10:40 a.m.
Cyber Threats to U.S. Businesses
Nation states, or their proxies, and cyber criminals steal our login credentials, payment card data, trade secrets, and much more on a daily basis. Cybercrime costs the global economy about $445 billion in a typical year. Aside from the monetary costs, businesses risk a loss of consumer confidence and reputation. Brian will talk about these threats and why businesses of all sizes need to adopt basic internet security practices to reduce their network weaknesses and make the price of successful hacking steep.
Denise Anderson, executive director, NH-ISAC
10:40 – 11:25 a.m.
Panel Discussion: Securing the Cyber Supply Chain
Risks to the supply chain can take multiple forms (e.g., natural, accidental, financial, cyber). However, there are wide variety of both public and private sector efforts under way to manage cyber supply chain risk, which is an emerging and complex area. This panel will examine what are malicious actors seeking to get access to (and do) once inside a company’s network, what steps—from basic to more sophisticated—can most businesses undertake to guard their cyber supply chains and how important is timely cyber threat information sharing.
John Cassidy, branch director, Cybersecurity Division, CenturyLink
Terrell Garren, managing director, IT Infrastructure & Operations, Duke Energy
Joe Jarzombek, director of software & supply chain assurance, Office of Cybersecurity & Communications, National Protection & Programs Directorate, Department of Homeland Security
Moderator: Bradley Hayes, director, U.S. Chamber of Commerce
11:25 – 11:55 a.m.
Panel Discussion: Law Enforcement Agency
The Chamber is in close contact with the FBI and the Secret Service, which are often the first entities to learn of criminals’ access to company networks. The Chamber engages law enforcement to build trusted public-private relationships, which are essential to confirming a crime and beginning a criminal investigation. Our message is that as organizations build their cyber incident response plans they should establish a relationship with their local federal law enforcement offices. The purpose of the panel is to introduce local federal law enforcement experts and their capabilities, roles and responsibilities to the private sector. The goal is to build trusted relationships between public-private sectors that cultivates bi-directional information sharing.
Stanley Crowder, special agent, U.S. Secret Service
Jessica Nye, supervisory special agent, FBI
Moderator: Bradley Hayes, director, U.S. Chamber of Commerce
11:55 – 12:10 p.m.
12:10 – 1:10 p.m.
Utilizing an Operational Technologies (OT) Appraoch to Mitigating Cybersecurity Risk
The growing number of serious attacks on essential cyber networks is one of the most serious economic and national security threats our nation faces. Gouhin will discuss the evolving cybersecurity threat and the tools and resources industry is utilizing to combat the threat.
Patrick Gouhin, Executive Director & CEO International Society of Automation
1:10 – 1:25 p.m.
A Decade Of Data Breaches – Where Are We Now?
Alicia A. Gilleskie, partner, Smith Anderson
1:25 – 1:55 p.m.
Panel Discussion: Evolution of Cybersecurity in Universities and Higher Education
Many experts believe that we are beyond the point of technology being able to solve cybersecurity. Prod-ucts and solutions are regularly brought to market to address emerging threats and the private sector is sharing best practices across sectors. The question now is about people. How are educational institutions building programs to funnel more talent into the pipeline and how are colleges and universities recruit-ing students to these programs.
Richard Biever, chief information security officer, Duke University
Douglas Reeves, professor of Computer Science; associate dean of Graduate Programs for College of Engineering, NCSU Department of Computer Science
Daniel Stein, director of National Cybersecurity Training and Education Program, Office of Cybersecurity and Communications, National Protection and Programs Directorate, U.S. Department of Homeland Security
Moderator: Yi Deng, Ph.D., dean and professor, UNC Charlotte, College of Computing & Informatics
1:55 — 2:00 p.m.
Ann M. Beauchesne, senior vice president, U.S. Chamber of Commerce
Cancellation Policy: Cancellations must be made no later than five business days prior to the program for a full refund. After this date, no cash refunds will be granted. Substitutions are welcome.