Summary: CIS Top 20 Controls, the importance of adopting a framework, and easy methods to improve visibility.
Carlos Marques, Enterprise Architect
Mr. Marques is an Enterprise Architect with Mainline from Rochester, NY. He has been working in the industry for 20 years, the first 8 with IBM, and the last 12 with Mainline. His focus includes data center technologies and services, along with emerging cloud technologies. He has worked in a number of large environments across multiple industries.
Matthew Likes, Enterprise Architect
Matthew Likes, CISSP, joined the Mainline team in January of 2017. He has spent his 20+ year career working with organizations of all shapes and sizes, including government agencies. His experience in information security dates back to the early 90’s, and he watched the threat landscape evolve. Matt is a leader in Mainline’s group, and is focused on security strategies for Mainline clients, whose needs span the entire NIST framework. He is an advocate for InfoSec within his local community and a trusted resource for vendors looking to improve their technology.
Directory Access includes a closer look at the departmental structures, sizes, key technologies in place, and more pivotal characteristics of other tribes, casinos, and health facilities. Access contact info for your peers and connect with them directly in a variety of departments throughout tribal government, gaming, and health organizations such as: IT, Tribal Council, Gaming Executives, Health IT, Finance, Human Resources, Marketing, and so many more!
Summary: Handel Information Technologies has over the past decade worked with dozens of American Indian Tribes who have developed ways of using modern technology to engage with clients, integrate programs, increase collaboration, improve service delivery, and secure funding. Some of these initiatives have received national recognition for innovative approaches to addressing community needs.
This webinar will highlight case studies of several Tribes taking ownership and control of their data and will review the processes to create solutions that empower staff and improve member services.
As we have continued to work with Tribes across the country, we have recognized common goals and struggles when seeking to improve programs.
We will review common items that include the improving access to services, engaging with membership more, integrating information from multiple programs, improving and automating collaboration between staff, and enabling comprehensive reporting.
Join Even Brande, founder and CEO of Handel, to see how these tribal programs have utilized technology as a key component in becoming national models for increasing access to and success of member services.
Presentor: Even Brande, CEO of Handel IT and Assistant Lectures in Entrepreneurship at the University of Wyoming.
Presentor Bio: Even Brande is a frequent speaker on topics involving human services and information technology. As the President and CEO of Handel Information Technologies, Even has over 20 years of experience implementing information solutions for government human service agencies. He holds a Bachelor of Business Administration and an MBA both from the University of Wyoming. Prior to founding Handel, Even held executive positions with Aspen Tree Software and Tandy Corporation. He is also a graduate of Leadership Wyoming, Class of 2006. His volunteer activities include serving on the Wyoming Digital Privacy Task Force, UW College of Business Advisory Board, and the State of Wyoming Information Technology Policy Council. Even is passionate about helping government agencies become more efficient and delivering better services to their constituents through better use of technology.
Summary: We’ll discuss some common challenges tribal organizations face as they struggle to manage the volume of IT incidents. The downtime associated with these incidents can directly impact your bottom line, but the damage to your brand can have lasting repurcussions. This webinar will focus on strategies for understanding and leveraging the full scope of your data to take a more proactive approach running your IT Operations. We’ll be joined by Forest Country Potawatomi who will share how they’ve deployed Splunk to monitor key systems, manage incidents, reduce troubleshooting time, and create smarter alerts to streamline processes.
Bill Babilon, Global ITOA Solutions Architect
Mr. Babilon leads Splunk’s US Public Sector practice for IT Operational Analytics (ITOA) as our Chief IT Operations Solution Architect. He has been a consumer of Splunk Enterprise since 2010 as a systems integrator and consultant to the US Federal Government. Mr Babilon has nearly 30 years of expertise in application development, IT operations and enterprise architecture. Mr. Babilon works with customers across the commercial, federal civilian, defense and intelligence communities in the areas of information technology, operations and machine learning. He has a BS in Aerospace Engineering from the University of Virginia and a MS in Software Engineering from George Mason University.
Summary: What is your organizations “Data Governance Policy”? How do you classify the security requirements of the data you are responsible for storing? Have you considered that “cloud” may be more secure than your current strategy in consideration of custom encryption keys and other emerging data sovereignty assurance tools? Attend this session to learn more about key actions you can take today to 1) classify your data, 2) plan its storage, access, and protection, and 3) provide your organization confidence that you have protected their information.
Dave Bailey, CTO and VP, Arctic IT
Dave has 20 years of business experience in Network/Cloud Architecture, Software Design, and Business Process Automation for both private and public-sector enterprise. Dave’s deep experience within the Microsoft Platform, Cloud Computing, and the “Internet of Things” (IoT) are displayed through a blend of hands-on technical knowledge and extensive business process management experience. Dave remains technical and adept within those applications to provide project and customer influence. Tribal Enterprise, Tribal Government, and U.S. Federal Government organizations look to Dave and the team at Arctic IT to provide expert implementations and strategy.
Summary: Recommendations for cybersecurity while traveling abroad often sound like they were taken directly from the plot of a spy movie: use clean “throw-away” devices, accounts, and passwords and assume you’ll be compromised. Similar, although slightly less scary, recommendations abound for travelers going on vacation: don’t post your location online and don’t use public WiFi. In this presentation, the Multi-State Information Sharing and Analysis Center (MS-ISAC) will provide insight into the targeting, theft, scams, and espionage that have driven the creation of these often-touted recommendations so you can intelligently choose which recommendations are appropriate for your level of risk.
Stacey Wright, MS-ISAC Intelligence Program Manager
Eugene Kipniss, MS-ISAC Sr. Program Specialist
Stacey A. Wright is the Senior Intel Program Manager at the Center for Internet Security (CIS), where she runs the Intel Team for the Multi-State Information Sharing and Analysis Center (MS-ISAC). She co-developed the MS-ISAC Intel Team to focus on providing strategic and operational cyber threat intelligence to state, local, tribal, and territorial (SLTT) governments. As of 2017, the team publishes more than 100 formal products per year containing timely, actionable intelligence. The products provide SLTT government-focused insight on risks, actors, trends, vulnerabilities, and incident response, allowing CISOs to improve visibility, detection, accuracy, and strategically align resources to the current cyber environment. In addition to her work at CIS, Stacey teaches two graduate cybersecurity and threat intelligence classes at the State University of New York, College of Emergency Preparedness, Homeland Security, and Cyber Security. Prior to her employment at CIS, Stacey was the Cyber Intelligence Analyst for the Federal Bureau of Investigation (FBI) Albany Division, where she was responsible for coordinating the local cyber intelligence program and served as the FBI’s liaison to the MS-ISAC. Stacey began her career as an Information Systems Specialist for the Cambridge, MA, Emergency Communications and Fire Departments. She received her Bachelor of Science in Criminal Justice from Northeastern University, and her Master of Business Administration from the University of Massachusetts, Boston. She is a formally trained Intelligence Analyst and a national speaker on cybercrime.
Eugene Kipniss is a Senior Program Specialist for the Multi-State Information Sharing and Analysis Center, a division of the Center for Internet Security. He works on the Stakeholder Engagement team with our nation’s State, Local, Territorial, and Tribal (SLTT) governments in order to provide them with access to the many MS-ISAC services and information products which support organizational security posture and awareness. Eugene focuses on managing the accounts of hundreds of MS-ISAC member governments and organizations across the Northeastern and Midwestern U.S. Additionally, he co-chairs the MS-ISAC’s Education and Awareness working group that focuses on bringing cybersecurity knowledge to both end-users and IT staff alike.
Summary: Discussion of application and mobile device security as it relates to MAM (Mobile Application Management) and MDM (Mobile Device Management). Focus on how we can tie MDM and MAM together whether you have an MDM solution in place or not. Identity management will also be a crucial part of this discussion.
Presenter: Thom Oaks, Microsoft Technical Specialist Threat Intelligence
Bio: Thom Oaks is a Technical Solution Specialist supporting Enterprise Mobility and Security featuring Azure Active Directory, Azure Information Protection, Azure Rights Management and Intune. I’ve worked at Microsoft for over 11 years in both Services and Sales supporting all facets of the Federal Government. Before focusing on Security, Identity and Mobility, I’ve enjoyed learning Exchange, SharePoint, Lync, and most recently Azure.
Offered by: Cylance
Date: December 12, 2017
Time: 1:00pm EST
Malware has transformed from its birth as a simple self-replicating worm to world conquering Ransomwares like WannaCry. Take a walk through the evolutionary process as we discuss how Ransomware has evolved from a tool created by governments to a weapon used by criminals into a commodity available to anyone with a Tor browser. Do you have the right tools to protect yourself? If you do… wouldn’t you rather prevent it from coming near you at all? Find out how…
Presenter: Matt Stephenson, Sr. Security Technologist
Matt is a Sr. Security Technologist at Cylance. While he’s not entirely sure what that means, he lives on the front lines of the war on cybersecurity and cybercrime. Having spent time in the storage and security world on the user, manufacturer and partner sides of the data protection conversation, he has seen bad guys coming from many different directions.
Our online training includes classes from the following six categories: