Craig Vincent – The Agile Security Program: Maximizing Efficacy in a World of Fast Changing Threats
Struggling to adapt your security technologies to ever-changing security threats? Agile program management may be the answer. Agile practices aren’t just for developers. Come hear from a security subject matter expert about how adopting agile techniques in your security practice can help tackle advanced security threats.
Nick Lewis – An Update on the Shared Cloud Security Assessments (HECVAT) Working Group, Internet2 NET+ Cloud Services Program, and the NET+ Security and Identity Portfolio
An Update on the Shared Cloud Security Assessments (HECVAT) Working Group, Internet2 NET+ Cloud Services Program, and the NET+ Security and Identity Portfolio
Chris Woods – How to Make Broader use of the Shodan Search Engine and its API for Scanning your Network
Since 2009, the Shodan search engine has provided users with insight about Internet-connected devices. Its convenient interface, command line tools, and API provide IT and security professionals with an inexpensive, fast, and objective tool to learn how their networks appear to outsiders. This information can help IT managers be more effective with their resources and personnel and, ultimately, improve overall security.
Jeff Spielberg – Intro to embedded hardware security and implications for connected healthcare products and services
Embedded devices used to have small attack surfaces, and hardware-level exploitation required deep electrical engineering knowledge. Recently however, shrinking device footprints and increasing connectivity provide more potential vulnerabilities than ever, and exploitation complexity continues to drop. This talk will provide an introduction to embedded and hardware security, and will review the state of this against healthcare products to assess implications for health systems, providers, and patients.
Gerard Shockley – Cloud Security First at BU
The presentation will provide a glimpse into cloud security strategies unfolding at Boston University. Topics include an overview the Shared Security Model in use today by cloud service providers and how adaptation is occurring for current and future cloud deployments.
Gene Kingsley – Introduction to Windows Forensics
This presentation will provide an introduction into Windows Forensics. The attendee will learn what’s possible, how to obtain and analyze digital information for possible use as evidence in civil, criminal or administrative cases.
Topics: computer forensics law, volatile memory & hard drive analysis, using freeware and other inexpensive options.
Allan M. Ross – Overview of Current Cyber Threat Actors and Trends
A representative from the Department of Homeland Security’s Office of Intelligence and Analysis will provide an overview of current cyber threat actors and trends. The briefing will include an overview of cyber threat actor types, trends in common attack vectors like phishing, social engineering and ransomware; as well as DHS cyber resiliency resources for public and private sector partners.
DHS Cybersecurity Advisor (CSA) pamphlet
DHS Cyber Resilience Review (CRR) pamplet