Loading Events

« All Events

  • This event has passed.

Cyber Security Summit

November 17, 2015 @ 9:00 am - 4:00 pm

9:00am Welcome
9:15am – 10:00am John (Dave) Frymier, Vice President and Chief Information Security Officer, Unisys Corporation

Underlying causes of cybersecurity problems on the Internet and the Strategy to mitigate the problem
This talk takes a step back from control objectives, risk models and expensive, complicated tools to look at the underlying causes of many of the cybersecurity problems we see on the Internet, as well as proposing one strategy any organization can use to help cope.

10:00am – 10:15am Break
10:15am – 11:00am Chuck Davis, MSIA, CISSP-ISSAP
Executive Malware Defense & Vulnerability Management Architect, IBM CHQ, BT/IT CIO

Malware Defense: From The Endpoint to the EnterpriseBest practices and strategic insight for Prevention, Detection, Analysis and Remediation
Malware is a threat that remains dynamic in its delivery and attack methods. It has been well-known for many years that signature based anti-malware solutions are not enough to detect and prevent many malware attacks. So how do we protect our organizations from the constantly growing threat of malware? Chuck Davis will talk about the threat, review today’s best practices and provide strategic insight on methods of Prevention, Detection, Analysis and Remediation.
11:00am – 11:15am Break
11:15am – Noon Joe Cudby, Senior Director Professional & Security Services, Level3

This talk will cover the role of Security Leadership in the Organization’s Culture, Security Education and Awareness Training, Mitigating Vulnerabilities & Threats in regard to aspects of Shared Computing (cloud) and Managing the Organization’s Technical Security Solutions Portfolio

Noon – 1:00pm Lunch – On your Own
1:00pm – 1:45pm Srini Subramanian, Principal
State Sector Risk Advisory Services Leader
Deloitte & Touche LLP, Camp Hill, Pennsylvania

Improve Response to Cybersecurity Risks by Getting Closer to the Business
To improve response to cyber threats and compliance, there is a need to better identify potential business-specific risks and improve communication around these risks. The new channels of connecting to citizens and onset of the Internet of Things (IoT) makes this approach even more critical. In addition, documenting citizen privacy issues – the business outlook of “why” citizen data needs to be protected – and possible business implications of a breach are necessary steps to manage changing risks. Join this session to learn more about the need and options for getting closer to the business.
1:45pm – 2:00pm Break
2:00pm – 2:45pm Renault Ross, US Security Business Principal (Distinguished), Public Sector Strategic Programs, Symantec Corporation

·         Global Threat Landscape — Who and what you’re protecting against.

·         Methodology for Building Security Program and Aligning Technologies – moving from tactical to strategic.

·         Real World Examples/Business Use Cases – Best practices security principles and associated technology capabilities

2:45pm – 3:00pm Break
3:00pm – 3:45pm Steve Caimi, Industry Solutions Specialist, US Public Sector Cybersecurity, CISCO Systems

Cybersecurity Best Practices: Learn and Apply the NIST Cybersecurity Framework

It’s time for a threat-centric approach, as traditional defenses that rely exclusively on detection and blocking for protection are no longer adequate. In this session, we’ll explore cybersecurity best practices from the National Institute of Standards and Technology (NIST). It shows how agencies and organizations can apply a new security model that covers the entire attack continuum – before, during, and after the attack.

3:45pm – 4:00pm Wrap-up
Please select a valid form


November 17, 2015
9:00 am - 4:00 pm


Security Center of Excellence


Harrisburg University – Room 1151
326 Market Street
Harrisburg, PA 17101 United States
+ Google Map