HOME      REGISTER       AGENDA      SPEAKERS      SPONSORS      HOTEL + TRAVEL     

 

AGENDA

Leveled Learning Sessions:

 

 

 

 

 

 

Click on date to expand for more information

Sunday, October 27 

1:30 p.m. – 2:30 p.m. 
PRECONFERENCE SESSION*
Hosted by Nokia

3:00 p.m. – 5:00 p.m. 
PRECONFERENCE SESSION*

Get Your Cybersecurity Ducks in a Row
In this interactive session, experts in law, insurance, incident response and cybersecurity risk management will use real-world insurance claims to explore developing risk management policies, complying with regulations, implementing best practices for safeguards and threat detection and developing a crisis management strategy that addresses both incident response and service restoration.

Sponsored by Womble Bond Dickinson       CyberESI          

 

 

5:00 p.m.–6:00 p.m. 
WELCOME RECEPTION

*Preregistration is required

Monday, October 28 

8:30 a.m.–9:30 a.m. 
OPENING KEYNOTE

Our Privacy, Cyber Security and New Frontiers 
Pablos Holman, Hacker and Inventor 
IT professionals see firsthand every day how computers have infiltrated all areas of our lives and companies. You understand that nothing is secure, and maintaining privacy and security in the modern world is a war of escalation. Although you may never win, you can learn to mitigate your risk and lose less severely. Hear from a hacker about the cosmos of complications and consequences that we are only beginning to comprehend within the layers of technical components and systems that make up the network. Opportunity lies here for the innovator—whether to build entire new industries or to wreak havoc. 

9:30 a.m.–10:30 a.m. 
Incident Response and Internal Threat Hunting 
Companies need to be prepared to respond to attacks before they happen. Half of that preparation is having a well-tested plan in place. The other half is seeking out the threats before they become full-blown attacks. Learn what you need to do to hone your defensive and offensive posture. 

10:45 a.m.–11:00 a.m. 
COFFEE BREAK

10:45 a.m.–Noon
Peer-to-Peer Discussions 
Gather around for conversations with other telco security professionals about real-world cybersecurity problems and solutions for small network providers. 

Noon–1:15 p.m. 
LUNCHEON 

1:15 p.m.– 2:15 p.m. 
Small Network Operator Cyber-Threat Information Sharing 
NTCA partnered with the Department of Homeland Security and the National Institute for Hometown Security to supply small telecom operators with critical cybersecurity information through a cyber information-sharing pilot program. Hear an update on the pilot program and what the team has learned so far about cyber intelligence information sharing. 

2:15 p.m. – 3:15 p.m. 
The Effectiveness of Rural Broadband Cybersecurity: An Adversarial Perspective  
In a recent whitepaper, Dynetics, a cybersecurity solutions provider, summarized the results of two years of simulated cyberattacks for 11 rural broadband providers. Hear from the elite ethical hackers and your peer telco network operators about lessons learned and observed trends across small providers. 

3:15 p.m.–3:30 p.m. 
BREAK

3:30 p.m.–4:30 p.m. 
LEVELED LEARNING SESSIONS A

Level I: The Base 
Where Do We Start? 
With so many questions to be answered, network operators without a comprehensive cybersecurity program can find it hard to jump into security planning. This session breaks down some basics for putting a plan together and getting the buy-in you need.

Level II: The Peak 
BGP and DNS Security Issues 
Border Gateway Protocol (BGP) and the Domain Name System (DNS) play vital roles in routing and resolving internet traffic. From a security perspective, they can be attack vectors as well as potential mitigation tools. Learn more about attacker methods and current and future protection strategies.

Tuesday, October 29

8:00 a.m.–8:50 a.m. 
SPONSORED BREAKFAST PRESENTATION

Sponsored by Neustar

 

9:00 a.m.–9:50 a.m. 
LEVELED LEARNING SESSIONS B 

Level I: Base 
Building a Culture of Cybersecurity 
Scott Kaylor, Team Lead, Information Security, NISC 
People are both the foundation and weak link in any security program. Even the most sophisticated security technologies can be quickly defeated by a simple employee error, so it is critical that organizations build a culture of cybersecurity where every employee recognizes that cybersecurity is part of their job, and it must start at the top. Learn to identify workplace loopholes that put your company more at risk of an attack. 

Level II: Peak 
A Closer Look at Endpoint Detection and Response 
Do you know what’s happening on your network? Are you sure? You might answer that differently after hearing from a peer about their experience with an adversarial simulation, AI monitoring tools and the internal decisions that resulted. 

10:00 a.m.–10:50 a.m. 
LEVELED LEARNING SESSIONS C

Level I: Base 
Today the ISP, Tomorrow the MSP 
As operators continue to grow their products and services, taking on the role of managed service provider becomes an increasingly attractive notion. Learn about the questions you should ask when considering this new venture and the partners who can help along the way. 

Level II: Peak 
Back on the Supply Chain 
Although it is a topic of increasing importance, supply chain security remains a thorn in the side of companies, both large and small alike. This honest discussion of current and developing supply chain security tactics will help small operators better understand how to navigate the choppy waters. 

10:50 a.m.–11:00 a.m. 
BREAK

11:00 a.m.–Noon 
CLOSING KEYNOTE

Cyber Vision 2020 
Dan Lohrmann, Chief Security Officer, Security Mentor 
This fast-paced look at security industry predictions and ramifications for next year and the next decade will leave you with plenty of food for thought. Especially on the IoT front, hear about what you should be doing today to prepare for what’s going to show up on your networks tomorrow.