Agenda

 

Monday, February 23, 2015
1:00 p.m. – 1:40 p.m.
You ARE Being Hunted .. How to Defend Against Targeted Attacks
J.D. Sherry, Trend Micro

1:45 p.m. – 1:30 p.m.
Security Threats
Gary Warner, The University of Alabama at Birmingham Center for Information Assurance and Joint Forensics Research

2:35 p.m. – 3:20 p.m.
Insider Threat
John Grimes, Department of Justice Sciences & Center for Information Assurance and Joint Forensics Research

3:25 p.m. – 4:15 p.m
Roundtable Panel Discussion
Moderator: Jem Pagán, Flatiron Strategies
Seth Danberry, Grid32
Jonathan Ratner, Sixgill
Scott Schober, Berkeley Varitronics Systems
Peggy Smedley, Connected World magazine

4:20 p.m. – 4:55 p.m.
Communications – A Foundation Element for Security Success
Boaz Kestel, Altair Semiconductor

5:00 p.m. – 5:30 p.m.
Washington Update
David Olive, Catalyst Partners

5:30 p.m. – 7:00 p.m.
Opening Networking Reception

7:00 p.m.
Connected World Awards Gala Dinner

Tuesday, February 24, 2015
8:50 a.m. – 9:30 a.m.
Importance of Penetration Testing and Vulnerability Assessments
Seth Danberry, Grid32

9:35 a.m. – 10:15 a.m.
Cybersecurity Panel
Scott Schober, Berkeley Varitronics Systems
Peggy Smedley, Connected World magazine

10:20 a.m. – 11:00 a.m.
The Emergency Management Function and Cybersecurity
James Drylie Ph.D., Kean University

11:05 a.m. – 11:45 a.m.
Do Not Underestimate The Wireless Threat – Drone Detection and Location
Scott Schober, Berkeley Varitronics Systems

11:50 a.m. – 1:00 p.m.
Lunch break and Live Broadcast of The Peggy Smedley Show

1:10 p.m. – 1:40 p.m.
All Leaders Can Be Cybersecurity Savvy
Deidre Kashou Diamond, Cyber Security Network

1:45 p.m. – 2:25 p.m.
Where the Puck Is Going
Jonathan Ratner, Sixgill

2:30 p.m. – 3:10 p.m.
Cyber/Cloud Security
Jem Pagán, Flatiron Strategies

3:15 p.m. – 3:50 p.m.
Security First: A Critical Architectural Principle for M2M and IoT
Brian Zaugg, Authentic8, Inc.

3:55 p.m. – 4:25 p.m.
Social Media
John Grimes, Department of Justice Sciences & Center for Information Assurance and Joint Forensics Research

4:30 p.m. – 5:10 p.m.
Open Sourcing Cybersecurity: The Power of Partnerships
Major General Jocelyn Seng, United States Air Force

5:15 p.m. – 6:30 p.m.
Closing Reception

7:00 p.m.
WoM2M Dinner