|Start Time||End Time||Presentation|
|6:00 AM||7:30 AM||Sponsor & Event Setup|
|7:30 AM||8:30 AM||Registration, Networking & Continental Breakfast|
|8:30 AM||8:40 AM||Call to Order, Pledge of Allegiance, National Anthem
Presentation of the Colors by the Cass Tech Color Guard under the Leadership of MSG Malone & the National Anthem
|8:40 AM||8:50 AM||Welcome & Opening Remarks
David Paul Gelios, Special Agent in Charge, Federal Bureau of Investigation (FBI)
|8:50 AM||9:10 AM||The Role of DHS
Our experts will provide an overview of DHS efforts to:
○ Unify a national effort to secure America
○ Prevent and deter terrorist attacks
○ Protect against and respond to threats and hazards to the Nation
○ Respond to and recover from acts of terrorism, natural disaster, or other emergencies
○ Coordinate the protection of our Nation's critical infrastructure across all sectors
Ernie Lorson , Protective Security Advisor, U.S. Department of Homeland Security
Mike Baker , Protective Security Advisor, U.S. Department of Homeland Security
|9:10 AM||9:30 AM||Michigan Cybersecurity Initiative Updates
This session will provide updates on the following initiatives:
○ Michigan Initiative for Cyber Education (MICE) - developed by K12 instructors to deliver cybersecurity education throughout the state. It will introduce the background, current status, and future vision to educate students in the cyber career pathway to prepare them for entry into the workforce or post-secondary education.
○ Cybercrime Support Network - what the CSN is and how businesses can support it.
○ Michigan CyberPatriot Program - University of Detroit Mercy's Cyber Center in partnership with Midwest CISSE and MEDC supports the growth of the Michigan CyberPatriot Program. Middle and High School students across Michigan are encouraged to join this exciting career path with real world cybersecurity competitions that run from Oct-April each year. Over 4,000 teams participated internationally last year with the top 12 teams going head-to-head in the Nation's capital to compete for the Top Spot and receive job offers and university scholarships.
|9:30 AM||9:50 AM||Keynote Speaker: Technology as a Complement, Not as a Substitute
As our daily lives become more integrated with technology, we need to ensure we do not become so dependent to the point of losing our ability to think and communicate without it.
Sheri Donahue, Cyber Security Strategic Partnerships Director, Humana
|9:50 AM||10:10 AM||Keynote Speaker: IRS-Criminal Investigation and Identity Theft
This session will discuss the role the IRS-CI takes in combating tax related identity theft.
Sarah Kull , Assistant Special Agent in Charge, IRS-Criminal Investigation
|10:10 AM||10:40 AM||Networking Break and Visit with Sponsors|
|10:40 AM||11:10 AM||Slowing the Pace of the Reactive Cycle
The optimist would have titled this "Breaking the Reactive Cycle" as if we can end intrusions, but we have to be pragmatic: there will always be incidents. We need to shift toward resilient environments and operators that assume breaches will continue. We can only do this by being proactive.
Chris Hallenbeck, Tanium Director, Endpoint Detection and Response (EDR Team)
|11:10 AM||11:40 AM||Confronting Cyber Threats: Cybersecurity from the FBI's Perspective
This session will provide an in-depth review of the current cybersecurity threats as seen by the Federal Bureau of Investigation (FBI).
Jason Bilnoski , Supervisory Special Agent (SSA), Federal Bureau of Investigation (FBI)
|11:40 AM||12:50 PM||Group Luncheon with Presentations|
|12:00 PM||12:05 PM||Welcome Message
Speaker: To be announce, University of Detroit Mercy
|12:05 PM||12:10 PM||Message from Michigan InfraGard President
|12:10 PM||12:50 PM||Keynote Presentation - Indiana Crit-Ex
In 2016, the State of Indiana conducted a two-part exercise series called Crit-Ex, which was a tabletop and a functional exercise that was focused on a cyberattack causing utility service disruptions. The series included representatives from the energy and water industries; local, state, and federal government; and private sector information technology professionals. The presentation will provide a basis as to how Crit-Ex was formed, information on the tabletop and functional exercise, lessons learned, and how Indiana continues to move forward.
Doug Rapp , Advisor for Cybersecurity and National Security Initiatives, Indiana Economic Development Corporation
Chetrice Mosley , Indiana Cybersecurity Program Director, Indiana Office of Technology and Indiana Department of Homeland Security
|12:50 PM||1:00 PM||Transition to Breakout Sessions|
|1:00 PM||2:00 PM||Breakout Sessions|
|#1 -Geolocation Accuracy & Storytelling
Investigations, both digital and standard, are increasingly able to leverage geolocation data. Many mobile forensics investigations rely heavily on location placement. Geolocation data can originate from many different types of sources, tremendously impacting accuracy
expectations. This session will explore baseline differences between triangulation and trilateration, GPS system implications, and geolocation story telling. Real world data will be provided to illustrate geolocation accuracy.
David A. Schippers , Professor/Professional Investigator, Walsh College
|#2 - The Modern Threat Landscape
From ransomware to nation-state threat actors, organizations both public and private face an evolving threat landscape. We will show real-world examples of modern threat tools, techniques, and procedures, show how they’ve evolved, and discuss how to protect against them.
Matt Bing , Security Researcher, Arbor Networks
|#3 - Effective Cyber Threat Intelligence
A discussion of processes, tools, and best practices that can be used to establish an effective Cyber Intelligence team in the modern threat landscape. Participants will learn about the state-of-the-art tools and techniques utilized by GE Aviation’s Cyber Intelligence program to investigate, remediate, and document cyber threat incidents, from broad phishing attacks to sophisticated Advanced Persistent Threats (APTs).
Jeffrey Archer , Cyber Intelligence Analyst, GE Aviation
Brent Cieszynski , Senior Director - Global Cyber Security, GE Aviation
|#4 - Making a Cultural Change
Information Security is in demand like never before. The staggering risk of a cyber attack is painfully clear to organizations of any size. As business leaders struggle to manage risk, it is critical that organizations create a roadmap to success that accounts for the current business challenges, as well as, align metrics and program goals with information security. Protecting an organization’s entire information security profile is not as difficult as one might imagine. Learn how to prioritize IT initiatives based on risk and business drivers while supporting executive and staff agendas. Change the culture by promoting the understanding of risk throughout the entire organization, including the financial and brand impact.
|2:10 PM||3:10 PM||Breakout Sessions|
|#1 - One Imaging Tool to Rule Them All
Eric will discuss the file system imaging needs of small and medium sized businesses. With limited resources and few defined processes for data collections, having a suite of tools (or no tools at all) to handle IR, Forensic, and eDiscovery collections can create problems. He will discuss the idea of having the right tool for the job and how to utilize the most out of the tools that you have. Eric will discuss the use and advantages of a versatile free tool called FTK Imager. He will discuss his experience with FTK Imager, and its use as an all--in--one collection tool for all levels of the organization.
Eric Schultz , Manager, Threat Intelligence and Digital Forensics, Perrigo
|#2 - Why a Law Enforcement or Security Mindset is Critical to Having a Successful Cyber Security Program
CyberSecurity involves fighting criminals. Organized crime, hacker groups, nation states and lone wolf criminals stalk corporate victims on a daily basis. Any person who finds herself/himself as a CyberSecurity leader or on the front lines as a Cyber Defender needs to have a law enforcement and security mind set. Far too many cybersecurity professionals today have come up through the Information Technology ranks and have not been exposed to or taken training for thinking like the criminal element they are trying to defeat. Come
listen to some ideas on how to start thinking like a fraudster and attacker so that you are better prepared to defeat your enemy by understanding your enemy.
Dr. Kevin Lynn McLaughlin , Professor, American Public University
|#3 - XGenTM Blend of Cross-Generational Threat Defense
XGenTM blend of cross-generational threat defense techniques that intelligently applies the right technology at the right time, resulting in more effective and efficient protection against a full range of threats. Trend Micro’s unique approach uses proven methods to quickly identify benign data and known threats, freeing its advanced techniques, such as application control, exploit prevention, behavioral analysis and machine learning, to more quickly and accurately identify unknown threats. Trend Micro is the first to infuse ‘high-fidelity’ machine learning into its approach – uniquely analyzing files both before execution and at runtime, using ‘noise cancellation’ features like census checking and whitelisting to reduce false positives.
Ken Donze, Principal Sales Engineer, Trend Micro
|#4 - Car Hacking and Yor
Your car is a network of dozens of computers responsible for everything from controlling brakes to playing MP3s. We’ll take a look at some of the technology underneath and some of the tools available for interacting with and attacking these systems.
Mitchell Johnson , Security Researcher, Grimm (SMFS, Inc.)
|3:10 PM||3:30 PM||Networking Break and Visit with Sponsors|
|3:30 PM||4:15 PM||Panel Discussion: InfraGard Sector Chiefs
What’s happening in the critical infrastructure sectors in Michigan and around the country? Our InfraGard Sector Chief program was setup to provide public-private partnerships in protecting these critical assets and critical data for the nation. This session will cover what’s happening and where we are going with the Michigan InfraGard Sector Chief program. Most important, how can you get involved and help. We will also take your questions, so get ready to engage the experts.
Moderator: Dan Lohrmann, Chief Security Officer, Security Mentor
Chris Burrows , Chief Information Security Officer, Oakland County
Lanse LaVoy , VP, Information Security, Quicken Loans
Glenn Levine , Michigan InfraGard, Food & Agriculture Sector Chief and Owner/Farmer, Alcinous Grove Farm
Stephanie Scheuermann , Technical Leader, In-vehicle and Enterprise Cyber Threat Intelligence, Ford Motor Company
|4:15 PM||5:00 PM||Theft of Trade Secrets (A FBI Computer Forensics Case)
What happens after the FBI is called to a Theft of Trade Secrets event. The steps, tools and strategies a FBI computer forensic examiner takes in processing a case.
Walker Sharp , Senior Computer Forensic Examiner, Federal Bureau of Investigation (FBI)