Loading…
VASCAN 2014 has ended
Thursday, October 9
 

8:00am EDT

Registration / Breakfast
Thursday October 9, 2014 8:00am - 9:00am EDT
Commonwealth Ballroom 907 Floyd Ave, Richmond, VA

9:00am EDT

Introduction
Limited Capacity seats available

Introduction and welcome to VASCAN 2014

Speakers
AH

Alex Henson

Chief Information Officer, Virginia Commonwealth University
Alex is the CIO for Virginia Commonwealth University.


Thursday October 9, 2014 9:00am - 9:15am EDT
Commonwealth Ballroom 907 Floyd Ave, Richmond, VA

9:15am EDT

Keynote: Security Insanity: The Same Thing Over And Over
Limited Capacity seats available

Everywhere you turn there seems to be bad news about the state of
security at organizations these days. With approximately 10,000
vulnerabilities disclosed each year and many of them very basic in
nature, it is clear that vendors have not implemented the security
improvement we desire in our software. As the code providing our basic
infrastructure (e.g. water, electricity), cars, medical devices comes
under increasing scrutiny and attack, dramatic reports flood the news
about how vulnerable these critical systems are and the mass chaos
that could ensue, if they were compromised or destroyed.

Unfortunately, no matter how many new shiny information security
appliances are purchased, data breaches continue to happen at alarming
rates. It doesn’t matter what industry or the size of an organization,
as no company seems to be immune. The number of data breaches in 2012
hit record highs with over 3,100 known breaches and in 2013 over 800
million records were exposed. All time there have been over 13,000
known data breaches tracked with over 3.2 billion records exposed, the
costs to organizations simply cannot be ignored.

While many had hoped that market forces would prevail and customers
would choose software with better security, in most cases there are
not viable alternatives and consumers and forced to accept software as
is.  This session takes a look at vulnerabilities, data breaches and
the current state of information security with an eye towards the
future that includes Evidence Based Risk Management, Cyber Liability
insurance, Product Liability and Bug Bounty programs.

Speakers
JK

Jake Kouns

Chief Information Security Officer, Risk Based Security
Jake Kouns is the CISO for Risk Based Security that providesvulnerability and data breach intelligence to help organizationsaddress their real risks. He oversees the operations of OSVDB.org andDataLossDB.org. Mr. Kouns has presented at many well-known securityconferences including... Read More →


Thursday October 9, 2014 9:15am - 10:15am EDT
Commonwealth Ballroom 907 Floyd Ave, Richmond, VA

10:15am EDT

Networking Break
Networking break

Thursday October 9, 2014 10:15am - 10:30am EDT
James River Terrace 907 Floyd Ave. Richmond, VA

10:30am EDT

Optimizing Security by Building Vaue-Added Collaborative Relationships between Internal IT Audit and Information Security Office
Limited Capacity seats available

Promoting collaborative relationships between the Internal IT Audit and Information Security Office functions supports and improves the effectiveness of organizational security and compliance and may also improve relationships with external audit and their audit results.  This session discusses the importance of cultivating this relationship.

Speakers
CO

Courtney Oxman

Associate Director of IT Audit, University of Virginia
Courtney is the associate director of IT audit for University of Virginia
KS

Kevin Savoy

Director of Hospital and IT Audits, University of Virginia
Kevin is the Director of Hospital and IT Audits for University of Virginia


Thursday October 9, 2014 10:30am - 11:30am EDT
Virginia Room B 907 Floyd Ave. Richmond, VA

10:30am EDT

Continuous Monitoring: A Big Data Challenge
Limited Capacity seats available

VA Tech has  been moving to an "outbound" monitoring security strategy since 2012. This strategy in turn has focused our efforts to protecting and detecting Personally Identifiable Information (PII). Continuous Monitoring (CM) aka Network Forensics is based on anomaly detection techniques. The 3 CM phases are: Collection, Detection and Analysis. This talk will discuss the challenges of creating a CM environment. Big Data Analytics will be playing a major role in future intrusion responses. We'll show some examples of how we can build meaningful metrics using CM data.

Speakers
RM

Randy Marchany

Chief Information Security Officer, Virginia Polytechnic Institute and State University
Randy is the Chief Information Security Officer for Virginia Tech.


Thursday October 9, 2014 10:30am - 11:30am EDT
Commonwealth Ballroom 907 Floyd Ave, Richmond, VA

10:30am EDT

Trials and Tribulations of Enterprise Encryption
Limited Capacity seats available

This presentation will look at the experience of an enterprise level encryption system within the realm of higher education. It will provide information on the benefits, drawbacks, considerations, and lessons learned from two schools, JMU and VCU.

Speakers
EM

Erin Miller

Information Security Engineer, James Madison University
Erin is an Information Security Engineer at James Madison University
RT

Rob Toback

Information Security Analyst, Virginia Commonwealth University
Rob is an Information Security Analyst at Virginia Commonwealth University.


Thursday October 9, 2014 10:30am - 11:30am EDT
Virginia Room C & D 907 Floyd Ave. Richmond, VA

10:30am EDT

Virginia Higher Education CIO Meeting
Limited Capacity seats available

Private / invitation-only meeting for CIOs across the State higher education institutions.

Moderators
AH

Alex Henson

Chief Information Officer, Virginia Commonwealth University
Alex is the CIO for Virginia Commonwealth University.

Thursday October 9, 2014 10:30am - 1:15pm EDT
Virginia Room A 907 Floyd Ave. Richmond, VA

11:30am EDT

Networking Break
Networking break

Thursday October 9, 2014 11:30am - 11:45am EDT
James River Terrace 907 Floyd Ave. Richmond, VA

11:45am EDT

Sponsored Session: What's Really Happening on Your Network
Limited Capacity seats available

Today’s cyber threats hide in plain sight amidst your network traffic, making them nearly impossible to defend against. These advanced threats use applications as their infiltration vector, exhibit application-like evasion tactics and they leverage commonly used network applications for exfiltration. Join us at this informative session where we will analyze the intertwined relationship between cyber attacks and applications based on recent data collected from over 5,500 networks


Speakers
RO

Ryan Olson

Director of Threat Intelligence, Palo Alto Networks
Ryan is the director of Palo Alto Networks’ threat intelligence team, responsible for collection, analysis and production of intelligence on adversaries targeting  organizations around the world. Prior to joining Palo Alto Networks Ryan served as Senior Manager in Verisign’s... Read More →


Thursday October 9, 2014 11:45am - 12:15pm EDT
Commonwealth Ballroom 907 Floyd Ave, Richmond, VA

12:15pm EDT

Lunch
Lunch

Thursday October 9, 2014 12:15pm - 1:15pm EDT
Commonwealth Ballroom 907 Floyd Ave, Richmond, VA

1:15pm EDT

Keynote: The Future of Data Protection
Limited Capacity seats available

As the world changes so do our data risks, our protections, and our evolution. Evolution is hard, but we have done it before and we can continue to solve the new challenges we face in cloud, mobile, IoT, and things to come.

Speakers
AE

Adam Ely

Co-Founder and Chief Operating Officer, Bluebox
Adam Ely is the Founder and COO of Bluebox. Prior to this role, Adam was the CISO of the Heroku business unit at Salesforce where he was responsible for application security, security operations, compliance, and external security relations. Prior to Salesforce, Adam led security and... Read More →


Thursday October 9, 2014 1:15pm - 2:15pm EDT
Commonwealth Ballroom 907 Floyd Ave, Richmond, VA

2:15pm EDT

Networking Break
Networking break

Thursday October 9, 2014 2:15pm - 2:30pm EDT
James River Terrace 907 Floyd Ave. Richmond, VA

2:30pm EDT

IT Security Governance - Three Years in the challenge of leading from behind
Limited Capacity seats available

"Executive involvement and buy-in, and business unit ownership of IT security are all essential for the future of successful Information Security Programs.  Walk with me as a new ISO through my journey to strengthen executive and business unit involvement and ownership of Information Security at ODU.  Areas of interest include, 
• Strengthening data ownership through a “Data Stewardship” initiative
• Strengthening Executive involvement and awareness
• Finding the “sweet spot” of executive decision-makers
• Some things you can’t change!
• When IT owns security, the price you pay
• Successful PCI compliance initiative – IT\Business partnership
• Managing the ISO-Auditor relationship – Security versus Compliance
• Home-grown system GRC
IT Departments cannot own IT Security.  It must be a partnership between the highest level executives, the business organization, internal audit, emergency management, General Counsel, Public Relations, data and system owners, IT Security and IT Operations.  The ISO holds a key to bringing all of these people into the discussion and to fostering an organizational approach to a successful IT Security Program.
  "

Speakers
DS

Doug Streit

Information Security Officer, Old Dominion University
Doug is the Information Security Officer for Old Dominion University


Thursday October 9, 2014 2:30pm - 3:30pm EDT
Commonwealth Ballroom 907 Floyd Ave, Richmond, VA

2:30pm EDT

Security by way of Configuration Management
Limited Capacity seats available

Configuration management tools (Puppet, Chef, Salt, etc.) are changing the way that servers are managed. Managing configuration as code allows us to enforce state, track changes, and revert to any previous point in time (or re-create that state somewhere else). In this talk we'll discuss how the *nix team at William & Mary uses configuration management and orchestration tools to manage our servers. We'll talk in depth about how we use various tools like Puppet and mcollective to quickly respond to security threats.

Speakers
PF

Phil Fenstermacher

Systems Engineer, College of William and Mary
Phil is a Systems Engineer from the College of William and Mary


Thursday October 9, 2014 2:30pm - 3:30pm EDT
Virginia Room C & D 907 Floyd Ave. Richmond, VA

2:30pm EDT

Sensitive Data scan with Identity Finder Console
Limited Capacity seats available

This short session will cover UVA's Identity Finder Console Architecture and deployment strategy. UVA has invested in Identity Finder Console for Windows and OSX clients.  We have one centralized server that allows for departmental engineers, local support partners, (LSPs) to access and discover where their highly sensitive data exists. This short session will show our trial and errors, pitfalls, and theoretical wins in the battle to eliminate sensitive data from being exfiltrated.

Speakers
JK

Jer Kong

Security and Policy Analyst, University of Virginia
Jer is a Security and Policy Analyst from University of Virginia


Thursday October 9, 2014 2:30pm - 3:30pm EDT
Virginia Room B 907 Floyd Ave. Richmond, VA

3:30pm EDT

Networking Break
Networking break

Thursday October 9, 2014 3:30pm - 3:45pm EDT
James River Terrace 907 Floyd Ave. Richmond, VA

3:45pm EDT

Handling HIPAA: Challenges and Solutions for a decentralized environment
Limited Capacity seats available

Tim and Jonathon will discuss the University of Virginia’s experiences with HIPAA compliance and their current solutions, which include technical and policy controls, as well as the involvement of various departments across the University that are touched by everyone’s favorite regulation.

Speakers
JN

Jonathon Neel

School of Medicine Information Security Officer, University of Virginia
Jonathon is the Information Security Officer for the University of Virginia School of Medicine
TT

Tim Tolson

Information Security and Policy Analyst, University of Virginia
Tim is an Information Security and Policy Analyst from the University of Virginia


Thursday October 9, 2014 3:45pm - 4:45pm EDT
Virginia Room B 907 Floyd Ave. Richmond, VA

3:45pm EDT

Information Security Firefighting
Limited Capacity seats available

I have extensive Fire and EMS experience that I have found surprisingly applicable to Information Security.  Many times IT personnel will refer to information security mitigation as firefighting incidents.  My presentation will cover how I have applied a variety of strategies, tactics, and experiences to IT.  These include training, Incident Triage, Incident response with assistance from other localities, affecting cultural change, and others.

Speakers
JT

Jeff Tehovnik

Senior Information Security Analyst, Virginia Commonwealth University
Jeff is the Senior Information Security Analyst at Virginia Commonwealth Univeristy


Thursday October 9, 2014 3:45pm - 4:45pm EDT
Virginia Room C & D 907 Floyd Ave. Richmond, VA

3:45pm EDT

Vulnerability Scanning
Limited Capacity seats available

The presentation will go through how the VCCS chose their vulnerability scanner, how it was setup, how it is being used, and the remediation process that the VCCS developed to resolve the vulnerabilities that were discovered during the scans.

Speakers
CC

Chandos Carrow

Information Security Officer, Virginia Community College System
Chandos is the Information Security Officer at the Virginia Community College System


Thursday October 9, 2014 3:45pm - 4:45pm EDT
Commonwealth Ballroom 907 Floyd Ave, Richmond, VA

4:45pm EDT

Networking Break
Networking break

Thursday October 9, 2014 4:45pm - 5:00pm EDT
James River Terrace 907 Floyd Ave. Richmond, VA

5:00pm EDT

Reception
Limited Capacity seats available

Light hor hor d'ourves and refreshments will be served.

Thursday October 9, 2014 5:00pm - 6:00pm EDT
Commonwealth Ballroom 907 Floyd Ave, Richmond, VA
 
Friday, October 10
 

8:00am EDT

Registration / Breakfast
Friday October 10, 2014 8:00am - 9:00am EDT
Commonwealth Ballroom 907 Floyd Ave, Richmond, VA

9:00am EDT

Keynote: How to Achieve Success with Cyber Risk Assessment and Analysis
Limited Capacity seats available

Technical professionals are frequently asked to lead or participate in risk assessments or risk analysis, as well as to provide recommendations for the best approach an enterprise should adopt. Unfortunately, there has been little guidance (outside of expensive consultants) on how exactly to achieve success in this area. Until now. On the basis of recent Gartner research, this session provides guidance for achieving success with cyber risk assessment and analysis.

Speakers
BT

Ben Tomhave

Research Director, Gartner
Ben Tomhave is a Research Director on the GTP Security and Risk Management Strategies team. His research focus areas include IT/information risk management, application security, and security program management and strategy. Based out of the Mid-Atlantic region of the U.S., Mr. Tomhave... Read More →


Friday October 10, 2014 9:00am - 10:00am EDT
Virginia Room C & D 907 Floyd Ave. Richmond, VA

9:00am EDT

SANS 524: Cloud Security Fundamentals
Limited Capacity seats available

Many organizations today are feeling pressure to reduce IT costs and optimize IT operations. Cloud computing is rapidly emerging as a viable means to create dynamic, rapidly provisioned resources for operating platforms, applications, development environments, storage and backup capabilities, and many more IT functions. A staggering number of security considerations exist that information security professionals need to consider when evaluating the risks of cloud computing.

The first fundamental issue is the loss of hands-on control of system, application, and data security. Many of the existing best practice security controls that infosec professionals have come to rely on are not available in cloud environments, stripped down in many ways, or not able to be controlled by security teams. Security professionals must become heavily involved in the development of contract language and Service Level Agreements (SLAs) when doing business with Cloud Service Providers (CSPs). Compliance and auditing concerns are compounded. Control verification and audit reporting within CSP environments may be less in-depth and frequent as audit and security teams require.

The SANS Cloud Security Fundamentals course starts out with a detailed introduction to the various delivery models of cloud computing ranging from Software as a Service (SaaS) to Infrastructure as a Service (IaaS) and everything in between. Each of these delivery models represents an entirely separate set of security conditions to consider, especially when coupled with various cloud types including: public, private, and hybrid. An overview of security issues within each of these models will be covered with in-depth discussions of risks to consider. Attendees will go in-depth on architecture and infrastructure fundamentals for private, public, and hybrid clouds. A wide range of topics will be covered including: patch and configuration management, virtualization security, application security, and change management. Policy, risk assessment, and governance within cloud environments will be covered with recommendations for both internal policies and contract provisions to consider. This path leads to a discussion of compliance and legal concerns. The first day will wrap-up with several fundamental scenarios for students to evaluate.

Attendees will start off the second day with coverage of audits and assessments for cloud environments. The day will include hands-on exercises for students to learn about new models and approaches for performing assessments, as well as evaluating audit and monitoring controls. Next the class will turn to protecting the data itself! New approaches for data encryption, network encryption, key management, and data lifecycle concerns will be covered in-depth. The challenges of identity and access management in cloud environments will be covered. The course will move into disaster recovery and business continuity planning using cloud models and architecture. Intrusion detection and incident response in cloud environments will be covered along with how best to manage these critical security processes and technologies that support them given that most controls are managed by the CSP.


Speakers
DS

David Shackleford

Senior Instructor, SANS
Dave Shackleford is the owner and principal consultant of Voodoo Security and a SANS analyst, senior instructor, and course author. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering, and is a VMware... Read More →


Friday October 10, 2014 9:00am - 5:00pm EDT
Commonwealth Ballroom 907 Floyd Ave, Richmond, VA

10:00am EDT

Networking Break
Networking break

Friday October 10, 2014 10:00am - 10:15am EDT
James River Terrace 907 Floyd Ave. Richmond, VA

10:15am EDT

The Art of Collaboration - Social Engineering a Secure Environment
This presentation focuses on the skillset we use in Information Security and how we can use them to to make a more secure enviroment.  Social Engineering skills are not only to find weeknesses in an organization, but can be used to build relationships, and collaboration between teams.  As the industry moves away from the "Institution of NO" to a more team focus on information secuirty, these skills will become an important part to your success.  

Speakers
CG

Chip Greene

Information Security Manager, Virginia Commonwealth University Health System
Chip is the Information Security Manager in the Virginia Commonwealth University Health System


Friday October 10, 2014 10:15am - 11:15am EDT
Virginia Room B 907 Floyd Ave. Richmond, VA

10:15am EDT

Filelocker - Sharing sensitive files
Limited Capacity seats available

Norfolk State University has implemented a tool to promote the safe and secure sharing of sensitive files with internal and external users. This session will show both how to implement and use this tool and provide use cases. Norfolk State University is currently maintaining and updating this tool on sourceforge.net. Filelocker was developed by IT Networks and Security at Purdue University for the purpose of allowing students and faculty to share files with other people both inside and outside of Purdue University. It is a temporary and secure storage system for sharing files and data. More than 20 universities worldwide are using Filelocker for HIPAA and FERPA compliant data sharing.

Speakers
AD

Andrea Di Fabio

Director, Network and Information Security, Interim Chief Information Officer, Norfolk State University
Andrea is the Director of the Information Security and Network team at Norfolk State University, he is currently serving as the interim Chief Information Officer at NSU


Friday October 10, 2014 10:15am - 11:15am EDT
Virginia Room C & D 907 Floyd Ave. Richmond, VA

11:15am EDT

Networking Break
Networking break

Friday October 10, 2014 11:15am - 11:30am EDT
James River Terrace 907 Floyd Ave. Richmond, VA

11:30am EDT

IT Controls Maturity Model
Limited Capacity seats available

An interactive discussion of the lifecycle for controls in Information Technology.  While there are sufficient references for a curious professional to find guidance, I believe we could achieve a better understanding with a thoughtfully led session on how to evaluate maturity for controls.

Speakers
JM

John Musgrove

Deputy Director of IT Audit for VCU and VCU Health System, Virginia Commonwealth University
John is the Deputy director of IT audit for Virginia Commonwealth University and the Virginia Commonwealth Univeristy Health System.


Friday October 10, 2014 11:30am - 12:30pm EDT
Virginia Room B 907 Floyd Ave. Richmond, VA

11:30am EDT

Security and compliance in Higher Education data management
Limited Capacity seats available

Higher ed institutions are often subject to a wide range of data management regulations. There has traditionally been a disconnect between the individuals handling the data and their understanding of any applicable regulations, let alone the compliance to these regulations. The variance in understanding and the lack of a common framework in institutions have led to data security and management practices that span across the spectrum of overly secure to completely negligent. This presentation will show some of the ideas and practices in creating a consistent practices in data and information management in higher education and academic medical centers, it will also demonstrate a custom framework VCU has developed to govern the management and security of its information. 

Speakers
avatar for Dan Han

Dan Han

CISO, Virginia Commonwealth University
Dan is the Chief Information Security Officer for VCU. He has over 20 years of experience working in IT and information security. Before getting into information security, he worked in application development, network and system administration, and database administration. He holds... Read More →


Friday October 10, 2014 11:30am - 12:30pm EDT
Virginia Room C & D 907 Floyd Ave. Richmond, VA

12:30pm EDT

Lunch and Closing
Luch and closing of the conference.

Friday October 10, 2014 12:30pm - 1:30pm EDT
Commonwealth Ballroom 907 Floyd Ave, Richmond, VA
 
Filter sessions
Apply filters to sessions.