CyberCrime Symposium - 2015 Speakers & Sessions

The 2015 sold-out event’s featured speakers ranged from high-profile journalists to security specialists, tech sector executives, and public policy advisors. Learn more about them and their presentations below!

countdown_to_zero-1.jpg

Kim Zetter

Award-Winning Investigative Journalist and Author

Kim Zetter is an award-winning journalist who covers cybercrime, civil liberties, privacy, and security for Wired magazine. She is the author of Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. Kim has covered hackers and computer security since 1999 and has broken numerous stories over the years about NSA surveillance, WikiLeaks and Bradley Manning (Chelsea Manning), and the hacker underground.

Stuxnet and Beyond: The Age of Digital Warfare

In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at a uranium enrichment plant in Iran were failing at an unprecedented rate. Five months later, a seemingly unrelated event occurred when researchers with a computer security firm in Belarus were called in to investigate why computers in Iran were crashing repeatedly. What they stumbled upon was the world’s first digital weapon, Stuxnet. Kim Zetter will tell the story of Stuxnet’s planning, execution, and discovery; why the attack was so unique, and the implications to the U.S. critical infrastructure.

Read key insights from Kim's presentation on our blog >>

Shane_Harris-1.jpg

Shane Harris

Author and Journalist

Shane Harris is the author of @War: the Rise of the Military-Internet Complex (2014) and The Watchers (2010). He is currently a senior correspondent at The Daily Beast, where he covers national security, intelligence, and cyber security. He is also an ASU Future of War Fellow at New America. His work has appeared in The New York Times, The Wall Street Journal, Slate, TheAtlantic.com, National Journal, The Washington Post, The Bulletin of the Atomic Scientists, and the U.S. Naval Institute’s Proceedings.

The Internet is a Battlefield

Espionage and warfare are being conducted via computer connections, profoundly changing the nature of intelligence and warfare in the 21st Century.  In this session, Shane explores the new dimensions of the “fifth domain of warfare,” and will explain how cyber security became a top national security concern for the U.S. government. He’ll also examine how recent high-profile breaches at major U.S. companies – including Sony and Home Depot – as well as the hack of the Office of Personnel Management, are changing the nation’s response to cyber threats.

Read key insights from Shane's presentation on our blog >>

todd-fitzgerald.jpg

Todd Fitzgerald

Global Director of Information Security
Grant Thornton International, Ltd.

Todd Fitzgerald is the Global Director of Information Security for Grant Thornton International, Ltd. and a Ponemon Institute Distinguished Fellow. He is the author of Information Security Governance Simplified: From the Boardroom to the Keyboard, and co-author of the ISC2 Book, CISO Leadership: Essential Principles for Success. Prior leadership positions include ManpowerGroup, WellPoint (National Government Services), Zeneca, Syngenta, IMS Health, American Airlines and Blue Cross Blue Shield.

Securing Boomers, Gen Xers, and Millennials: OMG We are So Different!

You may have noticed lately that the workforce is changing. We now have 3 generations working side by side, with a fourth about to join us. Why are we so different? Why do we approach work differently and have different values? What are the implications for information security? This interactive session explores differences between the generations in a fun and informative way!

adam-sedgewick.jpg

Adam Sedgewick

Senior Information Technology Policy Advisor
NIST

Adam Sedgewick is the Senior Information Technology Policy Advisor at the National Institute of Standards and Technology (NIST). He was one of the key members of the NIST team involved with the creation of the Cybersecurity Framework and continues to spearhead efforts on behalf of the Framework’s development and long-term goals. In 2008 and 2013, Adam received the Fed 100 Award for his contributions to the federal information technology community.

The Evolving NIST Cyber Framework

In February 2014, NIST released the NIST Cybersecurity Framework for voluntary use in all critical infrastructure sectors, including financial services, government and healthcare. In this session, Adam will review the key elements of the Cybersecurity Framework, share adoption and implementation feedback, and discuss how the Cybersecurity Framework will evolve in the coming months and years.

Read key insights from Adam's presentation on our blog >>

Trevor-Hughes.jpg

J. Trevor Hughes

President and CEO
International Association of Privacy Professionals

J. Trevor Hughes is the President and CEO of the International Association of Privacy Professionals (IAPP), the world’s largest association of privacy professionals. Trevor is an experienced attorney in privacy, technology, and marketing law. He has provided testimony on privacy issues before several committees within the U.S. Congress, British Parliament and EU Parliament. He is an adjunct professor of law at the University of Maine School of Law and frequently speaks about privacy issues at conferences around the world.

Engineering Privacy: Why Security Isn’t Enough

If we’re going to take hacking seriously, what needs to happen are far more sophisticated data-handling techniques behind the walls we erect. This is where privacy professionals can step into the breach (pun intended), working hand in hand with IT and cybersecurity professionals to identify and inventory data, make sure it’s all useful and necessary, and then most importantly, make sure that data is virtually useless to the outside world should the hackers get in.

Read key insights from Trevor's presentation on our blog >>

Andy-Ellis.jpg

Andy Ellis

Chief Security Officer
Akamai

Andy Ellis is the Chief Security Officer at Akamai, and is responsible for overseeing the security architecture and compliance of the company’s massive, globally distributed network. He is the designer and patent holder of Akamai’s SSL acceleration network, as well as several of the critical technologies underpinning the company’s Kona Security Solutions. Andy is a graduate of MIT and a former US Air Force Officer, the recipient of the CSO Magazine Compass Award, the Air Force Commendation Medal, The Wine Spectator’s Award of Excellence, and the Spirit of Disneyland Award.

The Long Road to a Secure Web

In a world of pervasive monitoring, content injection, and other vexatious adversaries, getting to a secure web experience requires more than just a TLS certificate. Let’s look under the covers of TLS web implementations, and understand the hazards we all face, and the steps forward towards a safer future.

Read key insights from Andy's presentation on our blog >>

jayson-street.jpg

Jayson E. Street

Social Engineer

Jayson E. Street is an author of Dissecting the Hack: The F0rb1dd3n Network from Syngress and the creator of dissectingthehack.com. He has spoken at DEFCON, DerbyCon, UCON, and at several other ‘CONs’ and colleges on a variety of Information Security subjects. He is a highly carbonated speaker who has partaken of pizza from Beijing to Brazil.

Breaking In Bad (I’m The One Who Doesn’t Knock)

Jayson does some weird social engineering engagements. In this presentation, Jayson will share his techniques including the roles he plays and the tactics that would have stopped him from being successful. He will demonstrate how EASY these attacks are and how every single attack has one common thread!

doug-johnson.jpg

Doug Johnson

SVP & Chief Advisor - Payments & Cybersecurity Policy
American Bankers Association

As the American Banker's Association's Senior Vice President, Payments and Cybersecurity Policy, Doug Johnson is involved in a variety of public policy and compliance issues. He currently leads the Association’s enterprise risk, physical and cyber security efforts, in addition to business continuity and resiliency policy and fraud deterrence efforts. Doug serves as Vice Chairman of the Financial Services Sector Coordinating Council and is a Board member of the FS-ISAC.

.Bank Update - What You Need to Know

The new .BANK top level domain has received over 6,000 registrations since going live on June 23, 2015. Conceived by our industry as a trusted, verified and more secure location online for banks, their customers and their stakeholders, this session will discuss the challenges and opportunities bankers are currently addressing as they implement their domains.

Read key insights from Doug's presentation on our blog >>

Rick-Lacafta.jpg

Rick Lacafta

Director of Insurance Services
FS-ISAC

Rick Lacafta has over 40 years of experience in information technology, information security and legal compliance management with Travelers Insurance, Citigroup, Primerica and CitiFinancial and most recently, as the Director of Insurance Services at the FS-ISAC where he manages the Insurance Risk Council, Community Institution Council, and Compliance and Audit Council.

FS-ISAC Threat Intelligence Ecosystem

FS-ISAC threat intelligence is being used nationwide by financial institutions. Rick will detail the ISAC intelligence sharing ecosystem, and how intelligence is shared between members, government partnerships, and additional intelligence sources. The session will include a discussion on the need for intelligence automation and the strategy to address that need.

Read key insights from Rick's presentation on our blog >>

Terrence-Gareau.jpg

Terrence Gareau

Chief Scientist
NEXUSGUARD

As NEXUSGAURD’s Chief Scientist, Terrence “Tuna” Gareau leads various teams in the development of security testing policies, network forensics strategies, and plans to protect client networks. Previously, he was Principal Research Scientist for A10 Networks, Inc. Terrence has more than 13 years of experience in IT security, including significant work with management of DDoS attacks. His knowledge has been shared with several high-level organizations, including IT security groups such as DEF CON and NoVa Hackers, and government agencies.

Creating Honeypots for Tracking Criminals

Digital innovation has created new attack surfaces for hackers to exploit. These same innovations and technological improvements have allowed researchers to create and deploy highly automated and scalable honeypots to lure and trap criminals. In this session, Terrence will describe the creation of a botnet used by NEXUSGUARD to track attacks and cyber-criminals to extract valuable data for defender intelligence. 

Uri-Rivner.jpg

Uri Rivner

Head of Cyber Strategy
BioCatch

Uri Rivner has been fighting cybercrime for 12 years. Currently leading the cyber strategy for behavioral biometrics company BioCatch, Uri’s prior role was Head of New Technologies, Identity Protection at RSA. Innovations that Uri spearheaded now stop billions of dollars in fraud each year and protect hundreds of millions of online banking and eCommerce users.

IoT, When Things Crawl into Your Corporate Network

IoT is coming to the corporate network. From worrying about PCs, servers, and printers, you’ll begin to worry about THINGS: inter-connected, exponentially growing, access-hungry, and yours to control. In this session, we’ll explore the IoT landscape, define what IoTs are, explore the risks of IoT security breaches, and see what we can do about them - if anything at all.

Read key insights from Uri's presentation on our blog >>

sam-curry.jpg

Sam Curry

Chief Technology and Security Officer
Arbor Networks

Sam Curry is the Chief Technology and Security Officer at Arbor Networks. Prior to joining Arbor Networks, Sam was SVP of Information Security and CISO at MicroStrategy. He has also served in significant roles at RSA, McAfee and Computer Associates. Sam is a frequent speaker and widely quoted subject matter expert.

IoT, When Things Crawl into Your Corporate Network

IoT is coming to the corporate network. From worrying about PCs, servers, and printers, you’ll begin to worry about THINGS: inter-connected, exponentially growing, access-hungry, and yours to control. In this session, we’ll explore the IoT landscape, define what IoTs are, explore the risks of IoT security breaches, and see what we can do about them - if anything at all.

Read key insights from Sam's presentation on our blog >>

David-Scott.jpg

David Scott

Software and Data Management Professional

David Scott is a software and data management professional with over 20 years of creative and operational success in all aspects of IT product and services delivery. Beyond the IT world, David is known as a vocalist and choral/orchestral conductor.

Using Musical Principles to Contextualize Security: A Jam Session!

Can Beethoven’s Fifth Symphony predict future cyber events? Does jazz music impact our choice of security tools? Both sound and security events have timbre, style, structure, volume, rhythm, and history. We explore the ways musical concepts such as motifs, chord structures, and improvisation enhance our understanding of security and help us predict future cyber events. This is no mere lecture - join the JAM and EXPERIENCE it!

matthew-oneill.jpg

Matthew O’Neill

Special Agent
U.S. Secret Service

Matthew O’Neill won the Department of Homeland Security Silver Medal in 2014 and the USSS Special Agent of Year Award in 2013 for his efforts in investigating complex transnational cyber-crime investigations including network intrusions, point of sale terminal compromises, bulk online sale of stolen personally identifiable information, money laundering, bank fraud, counterfeit currency cases, wire fraud, and insurance fraud cases. SA O’Neill joined the US Secret Service in December 1998. Since 2007, he has been assigned to the Manchester, New Hampshire, office.

A Chat with Secret Service Agent Matthew O’Neill

New England businesses experience their share of cybercrime. SA O’Neill will brief us on recent cases and investigations. Then, by popular demand, we’ll open up the session for questions from the audience.

Read key takeaways from Matt's talk in our blog post >>