Leveled Learning Sessions:







Click on date to expand for more information

Sunday, October 27 

1:30 p.m. – 2:30 p.m. 

Building Cybersecurity Resilience
The Nokia Cybersecurity framework helps Telecom and IT enterprises to leverage AI and Machine learning capabilities to build a secure network. In this interactive session, Nokia will share the latest trends in the cybersecurity threat landscape, insights gained through Nokia Bell Labs research, and best practices to improve the security posture of your network.

Sponsored by Nokia


3:00 p.m. – 5:00 p.m. 

Get Your Cybersecurity Ducks in a Row
In this interactive session, experts in law, insurance, incident response and cybersecurity risk management will use real-world insurance claims to explore developing risk management policies, complying with regulations, implementing best practices for safeguards and threat detection and developing a crisis management strategy that addresses both incident response and service restoration.

Sponsored by Womble Bond Dickinson       CyberESI          


5:00 p.m.–6:00 p.m. 

Welcome reception cocktails sponsor        


*Preregistration is required

Monday, October 28 

8:30 a.m.–9:30 a.m. 

Our Privacy, Cyber Security and New Frontiers 
Pablos Holman, Hacker and Inventor 
IT professionals see firsthand every day how computers have infiltrated all areas of our lives and companies. You understand that nothing is secure, and maintaining privacy and security in the modern world is a war of escalation. Although you may never win, you can learn to mitigate your risk and lose less severely. Hear from a hacker about the cosmos of complications and consequences that we are only beginning to comprehend within the layers of technical components and systems that make up the network. Opportunity lies here for the innovator—whether to build entire new industries or to wreak havoc. 

9:30 a.m.–10:30 a.m. 

Incident Response and Internal Threat Hunting 
Colin Connor, Threat Intelligence and Cyber Forensics Director, AT&T
Companies need to be prepared to respond to attacks before they happen. Half of that preparation is having a well-tested plan in place. The other half is seeking out the threats before they become full-blown attacks. Learn what you need to do to hone your defensive and offensive posture. 


10:45 a.m.–11:00 a.m. 

10:45 a.m.–Noon
Peer-to-Peer Discussions 
Gather around for conversations with other telco security professionals about real-world cybersecurity problems and solutions for small network providers. 

Noon–1:15 p.m. 

1:15 p.m.– 2:15 p.m. 
Small Network Operator Cyber-Threat Information Sharing 
NTCA partnered with the Department of Homeland Security and the National Institute for Hometown Security to supply small telecom operators with critical cybersecurity information through a cyber information-sharing pilot program. Hear an update on the pilot program and what the team has learned so far about cyber intelligence information sharing. 

2:15 p.m. – 3:15 p.m. 
The Effectiveness of Rural Broadband Cybersecurity: An Adversarial Perspective  
In a recent whitepaper, Dynetics, a cybersecurity solutions provider, summarized the results of two years of simulated cyberattacks for 11 rural broadband providers. Hear from the elite ethical hackers and your peer telco network operators about lessons learned and observed trends across small providers. 

3:15 p.m.–3:30 p.m. 

3:30 p.m.–4:30 p.m. 

Level I: The Base 
Where Do We Start? 
With so many questions to be answered, network operators without a comprehensive cybersecurity program can find it hard to jump into security planning. This session breaks down some basics for putting a plan together and getting the buy-in you need.

Level II: The Peak 
BGP and DNS Security Issues 
Border Gateway Protocol (BGP) and the Domain Name System (DNS) play vital roles in routing and resolving internet traffic. From a security perspective, they can be attack vectors as well as potential mitigation tools. Learn more about attacker methods and current and future protection strategies.

Tuesday, October 29

8:00 a.m.–8:50 a.m. 

Tales from the SOC
Matthew Wilson, Director of Network Engineering, Neustar
Let Neustar take you through the key workings of our world class SOC. Learn how we mitigate attacks of all shapes and sizes. Get an overview of the types of attacks and trends we are seeing. See first hand via our interactive demonstrations how our daily attacks are handled and see a live global attack map. Most importantly though—come prepared with questions to make this interactive and let our experts help guide you. 

Learning Outcomes:

  • Live DDoS Attack & Mitigation Demonstrations
  • Education on DDoS and other online attacks
  • Fundamental understanding of a SOC
  • Learn from key Neustar customer case study examples
  • Your questions answered on your particular business security requirements

Sponsored by Neustar


9:00 a.m.–9:50 a.m. 

Level I: Base 

Building a Culture of Cybersecurity 
Scott Kaylor, Team Lead, Information Security, NISC 
People are both the foundation and weak link in any security program. Even the most sophisticated security technologies can be quickly defeated by a simple employee error, so it is critical that organizations build a culture of cybersecurity where every employee recognizes that cybersecurity is part of their job, and it must start at the top. Learn to identify workplace loopholes that put your company more at risk of an attack. 


Level II: Peak 
A Closer Look at Endpoint Detection and Response 
Do you know what’s happening on your network? Are you sure? You might answer that differently after hearing from a peer about their experience with an adversarial simulation, AI monitoring tools and the internal decisions that resulted. 

10:00 a.m.–10:50 a.m. 

Level I: Base 
Today the ISP, Tomorrow the MSP 
As operators continue to grow their products and services, taking on the role of managed service provider becomes an increasingly attractive notion. Learn about the questions you should ask when considering this new venture and the partners who can help along the way. 

Level II: Peak 
Back on the Supply Chain 
Although it is a topic of increasing importance, supply chain security remains a thorn in the side of companies, both large and small alike. This honest discussion of current and developing supply chain security tactics will help small operators better understand how to navigate the choppy waters. 

10:50 a.m.–11:00 a.m. 

11:00 a.m.–Noon 

Cyber Vision 2020 
Dan Lohrmann, Chief Security Officer, Security Mentor 
This fast-paced look at security industry predictions and ramifications for next year and the next decade will leave you with plenty of food for thought. Especially on the IoT front, hear about what you should be doing today to prepare for what’s going to show up on your networks tomorrow.