Craig Vincent – The Agile Security Program: Maximizing Efficacy in a World of Fast Changing Threats

Struggling to adapt your security technologies to ever-changing security threats? Agile program management may be the answer. Agile practices aren’t just for developers. Come hear from a security subject matter expert about how adopting agile techniques in your security practice can help tackle advanced security threats.

Slides from the presentation

Nick Lewis – An Update on the Shared Cloud Security Assessments (HECVAT) Working Group, Internet2 NET+ Cloud Services Program, and the NET+ Security and Identity Portfolio

An Update on the Shared Cloud Security Assessments (HECVAT) Working Group, Internet2 NET+ Cloud Services Program, and the NET+ Security and Identity Portfolio

Slides from the presentation

Chris Woods  How to Make Broader use of the Shodan Search Engine and its API for Scanning your Network

Since 2009, the Shodan search engine has provided users with insight about Internet-connected devices. Its convenient interface, command line tools, and API provide IT and security professionals with an inexpensive, fast, and objective tool to learn how their networks appear to outsiders. This information can help IT managers be more effective with their resources and personnel and, ultimately, improve overall security.

Slides from the presentation

Jeff Spielberg  Intro to embedded hardware security and implications for connected healthcare products and services

Embedded devices used to have small attack surfaces, and hardware-level exploitation required deep electrical engineering knowledge. Recently however, shrinking device footprints and increasing connectivity provide more potential vulnerabilities than ever, and exploitation complexity continues to drop. This talk will provide an introduction to embedded and hardware security, and will review the state of this against healthcare products to assess implications for health systems, providers, and patients.

Slides from the presentation

Gerard Shockley – Cloud Security First at BU

The presentation will provide a glimpse into cloud security strategies unfolding at Boston University. Topics include an overview the Shared Security Model in use today by cloud service providers and how adaptation is occurring for current and future cloud deployments.

Slides from the presentation

Gene Kingsley  – Introduction to Windows Forensics

This presentation will provide an introduction into Windows Forensics. The attendee will learn what’s possible, how to obtain and analyze digital information for possible use as evidence in civil, criminal or administrative cases.
Topics: computer forensics law, volatile memory & hard drive analysis, using freeware and other inexpensive options.

 

Allan M. Ross  Overview of Current Cyber Threat Actors and Trends

A representative from the Department of Homeland Security’s Office of Intelligence and Analysis will provide an overview of current cyber threat actors and trends.  The briefing will include an overview of cyber threat actor types, trends in common attack vectors like phishing, social engineering and ransomware; as well as DHS cyber resiliency resources for public and private sector partners.

DHS Cybersecurity Advisor (CSA) pamphlet

DHS Cyber Resilience Review (CRR) pamplet