Agenda

Instructor Training Sessions (Additional Charge to Attend)



  • 11:15 AM - 12:15 PM

    Why Defense is the Best Offense in Security

    Presenter: Tejas Vashi, Senior Director, Product Strategy & Marketing Learning @Cisco, Cisco Systems

    Today’s world of security looks very different than it did yesterday. Security now requires a coordinated team effort to protect, defend and manage data. It also requires employees who are trained to mitigate risks. Organizations can no longer take a reactive stance. Instead, they must consider what happens before, during and after an attack and what their capabilities to manage an incident truly are. How can organizations be best prepared?

    In this presentation, Tejas Vashi from Cisco will illustrate how defense is the best offense when it comes to security. He will demonstrate that talent is key to ensuring that companies not only react to the threats but proactively defend their data and assets. He will show how, much like a football team, security analysts must be coordinated in their approach to threat defense, and how organizations can lead the effort to mitigate security risks.

    Click here for more details.
    Speakers:
    Speaker

    Tejas Vashi

  • 2:00 PM - 3:00 PM

    Cybersecurity: It's Not Just IT. Defining the Industry

    Speaker: Sari Greene, Founder, Sage Data Security, LLC


    The traditional information security model - one that is based on IT controls is simply is not enough anymore. We need to adopt a new model. One that requires executive engagement, on-going governance, and internal and external collaboration. To build cyber aware, cyber tough and cyber secure environments we need to know where we are, where we want to go, and how we are going to get there. This session will explore the convergence of technology, risk management, relationships, and education. Ultimately, it is our job as educators to foster a cadre of professionals and practioners that have the knowledge and insight to protect our companies, our communities, and our country from those who seek to do us harm.

    Click here for more details.
    Speakers:
    Speaker

    Sari Greene

  • 3:00 PM - 4:00 PM

    Cyber Security Enterprise Risk Management – Key to an Organization’s Resilience

    Presenter: Richard Spires, CEO at Learning Tree International and Former CIO at the IRS and at the U.S. Department of Homeland Security

    For many organizations, dealing with the threat of a cyber attack has become its most significant risk.  Highly visible cyber security breaches have elevated this topic to the board room, and organizations are having to deal with the cultural, skills, and technology issues to address this key enterprise risk.  This presentation will focus on key factors necessary to address this enterprise risk, to include highlighting NIST’s Cyber Security Risk Management Framework.  As part of the framework, NIST has also developed a National Cyber Security Workforce Framework to help organizations address what skills are required to establish an effective cyber security program.

    Click here for more details.
    Speakers:
    Speaker

    Richard Spires

  • 4:15 PM - 5:15 PM

    Security in Training and Certification – A look at why security should become a part of your DNA

    Presenter: Jedi Hammond, Dell Certification Strategy Lead at Dell EMC Proven Professional Certification Program

    Information security is critical to the future success in protecting your business and is integral to deployment, configuration and administration of new technologies. As IT administrators, security needs to become a part all your actives. Join me as we explore how to include security in your training and certification planning.

    Click here for more details.
    Speakers:
    Speaker

    Jedi Hammond

  • 9:00 AM - 10:00 AM

    Practical Tips to Help IT Pros Bridge the Cybersecurity Skills Gap

    IT professionals agree that cybersecurity skills are among the most important skills to have, yet the majority of organizations don’t have in-house security knowledge or access to third-party security experts. In this age of corporate hacks and ransomware, what can explain this cybersecurity skills gap, and what can be done about it? Join us for insights from Spiceworks and a panel of experienced IT professionals.

    Moderator: Peter Tsai, Senior Technology Analyst at Spiceworks

    Panelists:

    Click here for more details.
    Speakers:
    Speaker

    Peter Tsai

    Speaker

    Jason Ware

    Speaker

    Jeff Grettler

  • 10:00 AM - 11:00 AM

    Synthetic Teammates and the Future of Cybersecurity

    Speaker: Dr. Fernando Maymí, Lead Scientist at Soar Technology


    Artificial Intelligence is becoming the key enabler of solutions to problems posed by the increasing variety, complexity and volume of cyber incidents. Based on our analysis of likely threats in the next ten years, it is likely that teams consisting of human and synthetic analysts will have to routinely work together in many if not most organizations in order to mitigate these risks. To fully leverage the potential of our synthetic teammates, we will need cybersecurity operators with broad knowledge and skills, and who know when to task agents and when to question their reports. This talk provides firstly an overview of future threats, then a vision of how human and synthetic teammates might work together, and finally some ideas on how we should develop today’s human assets to be able to thrive in tomorrow’s challenges.

    Click here for more details.
    Speakers:
    Speaker

    Fernando Maymí

  • 1:00 PM - 2:00 PM

    Creating the Next Generation of Cyber Professionals

    Speaker: Prem Jadhwani, Chief Executive Officer and Founder of Intellectual Point 

    The cyber threat landscape is evolving rapidly and the corporations are scrambling to find skilled people to fill the cyber positions. There is clearly an acute shortage of skilled cyber professionals. Cybersecurity workforce training and development is going through a major transformation today with the changing threat landscape as well as rapidly evolving technologies such as machine learning, artificial intelligence and big data analytics. This presentation will bring real world best practices from the trenches on how cyber security education and training can be both affordable and effective in helping people fill the cyber security job openings with the right skills. The presentation will highlight critical skills required in the next generation of cyber professionals and how is the role of a security analyst rapidly evolving with the advent of advanced targeted attacks and zero day attacks. Attendees will walk away with a clear understanding of practical cyber security training solutions as well as best practices in developing and delivering an effective cyber security program from a pragmatic perspective within the commercial and federal organizations.  Attendees will learn how an accredited training provider (Intellectual Point) has been leveraging the Workforce Innovation Opportunity Act (WIOA) program to effectively impart cyber security education to the unemployed and underemployed folks and help them transition to a lucrative and stable career in cyber security with the help of hands-on professional short courses and IT certifications.

    Click here for more details.
    Speakers:
    Speaker

    Prem Jadhwani

  • 2:00 PM - 3:00 PM

    The Help Desk, the Security Analyst, and the Kill Chain: A Study in Job Role Morphology

    Over the past few years, we’ve heard sad (and sometimes tall) tales about devastating Distributed Denial of Service (DDoS), zero day, vendor impersonation, and social engineering attacks. Attacks seem to continue unabated. But some things are, in fact, changing. Join Dr. James Stanger to learn more about CompTIA’s research into critical job roles and responsibilities in today’s organizations. Using CompTIA research gathered from IT pros around the world, he’ll discuss how industry response to attacks over the last few years has helped morph key job roles in the industry. For example, research is showing key shifts in the security analyst and help desk job technician roles. After this presentation, you’ll have greater insight into how the Information Technology Service Management (ITSM) community fits into the security kill chain.

    Click here for more details.
    Speakers:
    Speaker

    James Stanger

© CompTIA, Inc. All rights reserved.