Session List
Registration Begins at 8:30 AM
AM Sessions - 9:00 to 11:30
Lunch
PM Sessions - 12:00 to 3:00
AM Sessions
Security on a Shoestring Part 1 - Starting Your Security Program

Part 1 of this 2-part series will review basic cybersecurity methodologies from identity and access management, setting up risk and cybersecurity management, utilizing industry standard frameworks, crafting effective policies, standards, and procedures.

Topics include:

  • Identity and password management
  • Implementing a Risk Management program within your organization
  • Achieving your cybersecurity goals by utilizing scanning tools and software hardening documents
  • Crafting and structuring a policies, standards and procedures
Making the shift from VMWare to Microsoft Hyper-V
  • Compare features between the two platforms
  • Migrating and converting Virtual Machines
  • Extending management through System Center Virtual Machine Manager (VMM)
  • Planning & Design and Training opportunities with Microsoft credits
PM Sessions  
Security on a Shoestring Part 2 - Using Open Source Tools and Intelligence: 'See What the Bad Guys See'

Part 2 of this series focus on using various Open Source tools for vulnerability and web application scanning, using Open Source Intelligence to your advantage and other free resources your organization can take advantage of.

Topics include:

  • Using both graphical and command line tools to detect vulnerabilities within your environment
  • Setting up alerts using free or low cost tools to keep an eye on your network
  • The use of openly available tools to gain network intelligence
  • Information sharing and free resources
Getting started with a Public Cloud Infrastructure
  • Overview of Microsoft Azure and Amazon Web Services
    Public Cloud Reference architectures
  • Iaas or PaaS?
  • Common services and use cases
  • Common mistakes and pitfalls to avoid