HOME     REGISTRATION     AGENDA     SPEAKERS     SPONSORS

 

 

Agenda

Attendees are encouraged to login 10 minutes prior to the start of the conference. All times listed are Eastern Standard Time.

 

Tuesday, December 8

3:00 p.m.–3:35 p.m.

Welcome From Your Tuesday Host
Jill Canfield, General Counsel and Vice President of Policy, NTCA

 

 

 

Managing Cyber Risk 
Laura Galante, Founder of Galante Strategies LLC and Senior Fellow, Atlantic Council
A decade of nation state cyberattacks has transformed how we think about network security today. This presentation will explore the emerging cyberthreats of 2021, managing risk at the local level, and building trust in your community during a time of heightened threats and constant change.

 

3:35 p.m.–4:05 p.m.
Back to Basics: Initial Steps Toward a Comprehensive Cybersecurity Program
Shira Dankner, Security Operations Manager, NineStar Connect
Most presentations about cybersecurity best practices tend to focus on tools, tests and all the disasters that can occur once your network is compromised. Learn practical steps your company can take to define internal processes and establish a cybersecurity program that involves all employees. Hear from a peer about their efforts from planning to implementation to ongoing efforts.

4:05 p.m.–4:15 p.m.
Break    

4:15 p.m.–4:40 p.m.
Rethinking Admin Rights Across the Enterprise 
Josh Folkerts, Senior Network Consultant, Premier Network Solutions
Too many users on your network have levels of administrative rights beyond what they need for day-to-day business. This includes legitimate admins who may also have access rights exceeding their actual needs. All this access might be convenient, but it also presents an attractive attack vector. Learn how admins are assessing and limiting levels of access for all users, including themselves, to increase network security.

4:40 p.m.–4:55 p.m.

Small Provider Cyberthreat Information Sharing 
Scott C. Algeier, President and CEO, Conrad Inc. 
Learn how you can have access to an industry-wide cybersecurity team that follows indicators and actionable threat information. Discover how you can be part of a trusted community whose sole purpose is to improve your security posture.

 

4:55 p.m.–5:20 p.m.

Headshot_KelvinColeman

Usable Partnerships: Effecting and Measuring Engagement in Cybersecurity
Kelvin Coleman, CEO and Executive Director, National Cyber Security Alliance
As the technological landscape evolves, products and processes are becoming faster and more accessible. What about the partnerships to help secure our information in our continuously connected society? In this session, Kelvin will discuss the resources and human-centric focus on best practices for implementing public and private-sector engagements to better mitigate the risk of cyber threats.  

Wednesday, December 9

2:30 p.m.–2:50 p.m.
Strengthening the Weakest Link: Improving Employee Practices through Security Culture

headshot_James McQuiggan

James McQuiggan, CISSP, Security Awareness Advocate, KnowBe4
Every 14 seconds, a business is the victim of a ransomware attack, often with devastating consequences. Many of these cybercriminals bypass perimeter defenses with increasingly sophisticated social engineering attacks. How can you combat these threats? Training is a good start, but it can be ineffective: employees complete it, move on, and most of the time don't really remember it. By implementing a security culture, you can instill a security-focused mindset in your employees and significantly reduce the risk of a data breach.

In this session you’ll learn why a security culture is essential along with security awareness and training and how to implement policies for a strong security culture and measure your security culture's effectiveness.

 

3:00 p.m.–3:35 p.m.

Welcome From Your Wednesday Host
Roxanna Barboza, Industry and Cybersecurity Policy Analyst, NTCA

 

 

 

Going Toe-to-Toe with a Foe — Understanding the Other Side of the Cybersecurity Fight
Michael Anaya, Supervisory Special Agent, Cyber Division, FBI (Ret.)
In this lively discussion, a recently retired FBI cyber agent shares insight into the criminal mind and helps you to better understand the nature of the threats we are up against. 

 

3:35 p.m.–4:05 p.m.
Mitigating and Managing Phishing Risks

headshot_Keith_Frederick

Keith Frederick, Chief Information Security Officer, RigNet
The ongoing battle against phishing is an operational black hole for all levels of IT, your internal users and your customers. Although small network operators are using industry leading solutions and following dkim/SPF and DEMARC guidance, spear phishing attacks appear to be constant and not slowing down any time soon. Learn the latest successful practices for mitigating this attack vector and possibly how to claw some time back to focus on other pressing matters. 

 

4:05 p.m.–4:15 p.m.
Break    

4:15 p.m.–4:45 p.m.

State of Ransomware 
Sharon D. Nelson, Esq., President, Sensei Enterprises, Inc.
John Simek, Vice President, Sensei Enterprises, Inc.

Ransomware is a burgeoning problem for network admins across the globe. Ransom demands are much higher and there are now two ransom demands, one for the decryption key and one for not disclosing confidential data that the criminals stole before they encrypted your data. Our presenters are experts who have handled ransomware attacks and recovery. They will also tell you how to guard against ransomware attacks and discuss the federal advice (and sometimes legal restrictions) against paying ransoms.

4:45 p.m.–5:30 p.m.

Cyber Stories 
Robert Dowling, Director of Research Development, Auburn University
Cap off the day with a lineup of special guests to share some educational and entertaining case studies from the cybersecurity front.

 

 

 

Thursday, December 10

2:30 p.m.–2:50 p.m.
Preconference Session Don’t Take the Bait — Focus on Your Controls
David Raucher, Director of IT and Managed Services, CHR Solutions

 

In this session, you will discuss the high risk of phishing, the threat it poses to the company network, and be introduced to new tools on the market that help fight phishing.

3:00 p.m.–3:35 p.m.

Welcome From Your Thursday Host 
Jill Canfield, General Counsel and Vice President of Policy, NTCA

 

 

 

The Dark Side of IoT 
Stacey Higginbotham, Author and Podcast Host, Stacey on IoT
For every day ending in Y you can find a story about a hacked camera, light bulb, coffee maker, or another connected device. Manufacturers of connected devices have tried to push strict security measures such as two-factor authentication, but there are other ways. Learn how ISPs can apply their skills, access and clout to add security services to their networks. 

3:35 p.m.–4:05 p.m.

headshot_Brian_Babineau
headshot_Paul_Rainey

What’s in Your Stack? An Intro to the MSP Market 

Brian Babineau, Senior Vice President and General Manager, Managed Services Providers, Barracuda 
Paul Rainey, MSP Manager Range Companies, Montana

Dive into the world of a managed service provider (MSP). When it comes to network security, what is an MSP, and what are the products? Uncover the fundamentals to possibly expand your security offerings. 

 

4:05 p.m.–4:15 p.m.
Break    

4:15 p.m.–4:45 p.m.

Keeping Up With Internet Security 
John Curran, President and CEO, American Registry for Internet Numbers
Network operators must keep up with the changes in internet infrastructure if they wish to remain secure, and that includes big changes with IPv6 and internet routing security. Join the discussion on important changes in internet infrastructure that affect your reliability and security. 

 

4:45 p.m.–5:15 p.m.
Quick Hits, Hot Topics
A panel of network professionals will run attendees through the most pressing cybersecurity issues in a rapid-fire manner. 

5:15 p.m.         
Wrap up With Jill Canfield