Donate to Hurricane Recovery

2019 Annual Cyber Awareness Symposium

Event Description

Hosted by the N.C. Department of Information Technology, the 2019 Annual Cyber Awareness Symposium on Oct. 10-11, 2019, features cyberbriefings from leading industry cyber partners, such as CrowdStrike, Tenable Nessus and Tanium.

The event is free, but workshops are limited to 30 people. Register today to reserve your spot.

Register Now

Cybersecurity

Agenda

Thursday, Oct. 10 (Day 1)

9-9:15 a.m. Opening Remarks Maria Thompson, State Chief Risk Officer
9:15-9:30 a.m. Keynote Eric Boyette, State Chief Information Officer
9:30-9:40 a.m. Welcome Video Gov. Roy Cooper
9:40-10:40 a.m. Cybersecurity Emerging Threats - Intelligence Briefing

Josh Burgess, CrowdStrike

10:40-11 a.m. Break  
11 a.m. to noon Friendly Neighborhood National Guard Cyber Team: Stories from the Trenches CW2 Michael Spivey, N.C. National Guard
noon to 1 p.m. Lunch  
1-2 p.m. Transform Risk Prioritization Across the Modern IT Attack Surface Robert Huber, Tenable Nessus CISO
2:2:30 p.m. Break  
2:30-5 p.m. Workshops  
  NCDIT Disaster Recovery Business Continuity

Note: Space is limited to 30 participants and is available on a first-come, first-serve basis.
 

Hank Kaylor, NCDIT
 

Business Continuity Plan Development Workshop
This session is geared toward personnel needing support in developing and completing their agency's business continuity plans.  Also, those interested in learning more about the State’s Business Continuity requirements.

Note: Space is limited to 30 participants and is available on a first-come, first-serve basis.

Debora Chance and Brett Latta
 

Managing Vendor Risks
Vendor risk management is a key aspect of IT operations.  Every organization should have processes in place to carefully assess and identify issues when considering using outsourced services. Topics will cover: weighing and tiering vendors based on risk profile; questions that should be asked of all vendors; and documentation that is invaluable when engaging with outsourced parties.

Note: Space is limited to 30 participants and is available on a first-come, first-serve basis.

Chris Poulin, BitSight

Friday, Oct 11 (Day 2)

9-9:10 a.m. Opening Remarks Maria Thompson, State Chief Risk Officer
9:10-10:10 a.m. Keynote: Bridging Security Intelligence: Hacking, Threat Hunting, AI, Behavioral Anomalies & Incident Response Michael Melore, CISSP, IBM Cybersecurity Advisor
10:10-10:30 a.m. Break  
10:30 a.m. to 4 p.m. Workshops  
 

Capture the Flag
During this session, participants will be provided a simulated environment to conduct cyber game activities. Hunt for security vulnerabilities in a system.

Note: Space is limited to 30 participants and is available on a first-come, first-serve basis. Participants should bring a laptop with administrative permissions.

VMWare/GRIMM Cyber
 

Cyberthreat Hunting
You'll spend the day with endpoint detection and response experts, incident response experts and your peers who face similar challenges. This workshop is intended for practitioners who have at least some hands-on experience conducting endpoint incident response or forensic analysis tasks in Windows environments.

Note: Space is limited to 30 participants and is available on a first-come, first-serve basis. Participants should bring a laptop with administrative permissions.

Tanium
 

Incident Response Plan Development Workshop
An incident response plan is a mandatory document needed to effectively recover from a significant cyber incident.  This session is geared toward educating attendees on what are the key elements to an IRP and how to operationalize it.

Note: Space is limited to 30 participants and is available on a first-come, first-serve basis. Participants should bring a laptop with administrative permissions.

Albert Moore
  State Cybersecurity Requirements & Considerations for IT Procurement
As the world continues to become more interconnected, it is important that IT procurement professionals understand what their roles are in the protection of the state.  This session covers procurement laws and cybersecurity requirements for not just for items classified as IT but also data-centric purchases.  This session also covers the procurement shift from IT-centric to a data-centric model for procurement.  
Patti Bowers
Noon to 1 p.m. Lunch  
4 p.m. Symposium Wrap-Up