Summary: According to the Small Business Administration, 50% of all new businesses fail in the first 5 years. This is a staggering statistic that comes at a great expense in both time and money. This webinar by Even Brande, will focus on some basic business principles that can help your next business thrive instead of becoming another statistic. Before your tribe launches another venture, this webinar will teach you how to evaluate your business concept, develop an effective business model, write a business plan, build the right team, and create a sustainable business. With over 25 years of experience in starting and running technology firms and for the past decade teaching entrepreneurship, Even will share his knowledge both from a real world and academic perspective.
Presentor: Even Brande, CEO of Handel IT and Assistant Lectures in Entrepreneurship at the University of Wyoming.
Presentor Bio: Even Brande is a frequent speaker on topics involving human services and information technology. As the President and CEO of Handel Information Technologies, Even has over 20 years of experience implementing information solutions for government human service agencies. He holds a Bachelor of Business Administration and an MBA both from the University of Wyoming. Prior to founding Handel, Even held executive positions with Aspen Tree Software and Tandy Corporation. He is also a graduate of Leadership Wyoming, Class of 2006. His volunteer activities include serving on the Wyoming Digital Privacy Task Force, UW College of Business Advisory Board, and the State of Wyoming Information Technology Policy Council. Even is passionate about helping government agencies become more efficient and delivering better services to their constituents through better use of technology.
Summary: We’ll discuss some common challenges tribal organizations face as they struggle to manage the volume of IT incidents. The downtime associated with these incidents can directly impact your bottom line, but the damage to your brand can have lasting repurcussions. This webinar will focus on strategies for understanding and leveraging the full scope of your data to take a more proactive approach running your IT Operations. We’ll be joined by Forest Country Potawatomi who will share how they’ve deployed Splunk to monitor key systems, manage incidents, reduce troubleshooting time, and create smarter alerts to streamline processes.
Bill Babilon, Global ITOA Solutions Architect
Mr. Babilon leads Splunk’s US Public Sector practice for IT Operational Analytics (ITOA) as our Chief IT Operations Solution Architect. He has been a consumer of Splunk Enterprise since 2010 as a systems integrator and consultant to the US Federal Government. Mr Babilon has nearly 30 years of expertise in application development, IT operations and enterprise architecture. Mr. Babilon works with customers across the commercial, federal civilian, defense and intelligence communities in the areas of information technology, operations and machine learning. He has a BS in Aerospace Engineering from the University of Virginia and a MS in Software Engineering from George Mason University.
Summary: What is your organizations “Data Governance Policy”? How do you classify the security requirements of the data you are responsible for storing? Have you considered that “cloud” may be more secure than your current strategy in consideration of custom encryption keys and other emerging data sovereignty assurance tools? Attend this session to learn more about key actions you can take today to 1) classify your data, 2) plan its storage, access, and protection, and 3) provide your organization confidence that you have protected their information.
Dave Bailey, CTO and VP, Arctic IT
Dave has 20 years of business experience in Network/Cloud Architecture, Software Design, and Business Process Automation for both private and public-sector enterprise. Dave’s deep experience within the Microsoft Platform, Cloud Computing, and the “Internet of Things” (IoT) are displayed through a blend of hands-on technical knowledge and extensive business process management experience. Dave remains technical and adept within those applications to provide project and customer influence. Tribal Enterprise, Tribal Government, and U.S. Federal Government organizations look to Dave and the team at Arctic IT to provide expert implementations and strategy.
Summary: Recommendations for cybersecurity while traveling abroad often sound like they were taken directly from the plot of a spy movie: use clean “throw-away” devices, accounts, and passwords and assume you’ll be compromised. Similar, although slightly less scary, recommendations abound for travelers going on vacation: don’t post your location online and don’t use public WiFi. In this presentation, the Multi-State Information Sharing and Analysis Center (MS-ISAC) will provide insight into the targeting, theft, scams, and espionage that have driven the creation of these often-touted recommendations so you can intelligently choose which recommendations are appropriate for your level of risk.
Stacey Wright, MS-ISAC Intelligence Program Manager
Eugene Kipniss, MS-ISAC Sr. Program Specialist
Stacey A. Wright is the Senior Intel Program Manager at the Center for Internet Security (CIS), where she runs the Intel Team for the Multi-State Information Sharing and Analysis Center (MS-ISAC). She co-developed the MS-ISAC Intel Team to focus on providing strategic and operational cyber threat intelligence to state, local, tribal, and territorial (SLTT) governments. As of 2017, the team publishes more than 100 formal products per year containing timely, actionable intelligence. The products provide SLTT government-focused insight on risks, actors, trends, vulnerabilities, and incident response, allowing CISOs to improve visibility, detection, accuracy, and strategically align resources to the current cyber environment. In addition to her work at CIS, Stacey teaches two graduate cybersecurity and threat intelligence classes at the State University of New York, College of Emergency Preparedness, Homeland Security, and Cyber Security. Prior to her employment at CIS, Stacey was the Cyber Intelligence Analyst for the Federal Bureau of Investigation (FBI) Albany Division, where she was responsible for coordinating the local cyber intelligence program and served as the FBI’s liaison to the MS-ISAC. Stacey began her career as an Information Systems Specialist for the Cambridge, MA, Emergency Communications and Fire Departments. She received her Bachelor of Science in Criminal Justice from Northeastern University, and her Master of Business Administration from the University of Massachusetts, Boston. She is a formally trained Intelligence Analyst and a national speaker on cybercrime.
Eugene Kipniss is a Senior Program Specialist for the Multi-State Information Sharing and Analysis Center, a division of the Center for Internet Security. He works on the Stakeholder Engagement team with our nation’s State, Local, Territorial, and Tribal (SLTT) governments in order to provide them with access to the many MS-ISAC services and information products which support organizational security posture and awareness. Eugene focuses on managing the accounts of hundreds of MS-ISAC member governments and organizations across the Northeastern and Midwestern U.S. Additionally, he co-chairs the MS-ISAC’s Education and Awareness working group that focuses on bringing cybersecurity knowledge to both end-users and IT staff alike.
Summary: Discussion of application and mobile device security as it relates to MAM (Mobile Application Management) and MDM (Mobile Device Management). Focus on how we can tie MDM and MAM together whether you have an MDM solution in place or not. Identity management will also be a crucial part of this discussion.
Presenter: Thom Oaks, Microsoft Technical Specialist Threat Intelligence
Bio: Thom Oaks is a Technical Solution Specialist supporting Enterprise Mobility and Security featuring Azure Active Directory, Azure Information Protection, Azure Rights Management and Intune. I’ve worked at Microsoft for over 11 years in both Services and Sales supporting all facets of the Federal Government. Before focusing on Security, Identity and Mobility, I’ve enjoyed learning Exchange, SharePoint, Lync, and most recently Azure.
Offered by: Cylance
Date: December 12, 2017
Time: 1:00pm EST
Malware has transformed from its birth as a simple self-replicating worm to world conquering Ransomwares like WannaCry. Take a walk through the evolutionary process as we discuss how Ransomware has evolved from a tool created by governments to a weapon used by criminals into a commodity available to anyone with a Tor browser. Do you have the right tools to protect yourself? If you do… wouldn’t you rather prevent it from coming near you at all? Find out how…
Presenter: Matt Stephenson, Sr. Security Technologist
Matt is a Sr. Security Technologist at Cylance. While he’s not entirely sure what that means, he lives on the front lines of the war on cybersecurity and cybercrime. Having spent time in the storage and security world on the user, manufacturer and partner sides of the data protection conversation, he has seen bad guys coming from many different directions.
Our online training includes classes from the following six categories: