- This event has passed.
Tampa Bay ISSA and Tampa Bay InfraGard Joint Event (Full-Day Event)
April 16 @ 8:00 am - 4:00 pm$20
Breakfast and Lunch will be provided to attendees.
- William D. Anton, Ph.D., CEO Effectiveness, LLC
- Stacy Arruda, Executive Director, Florida ISAO (FL-ISAO)
- Ben Curry, CISSP, Microsoft MVP
- Ryan English, CEO and Co-Founder, FLYMOTION
- Keyaan Williams, CEO, Cyber Leadership and Strategy Solutions, LLC
- Tazz, Director of Threat Intelligence, Divine Intel, LLC
BREAKFAST SPONSOR: SECURITY COMPLIANCE ASSOCIATES – Please join us in thanking Security Compliance Associates!
8:15 AM – REGISTRATION
Please note: Attendees might be asked to present a government-issued photo ID to verify meeting registration.
8:50 AM – WELCOME & RECOGNITION OF OUR SPONSORS
9:00 AM – Countering Drones at the Source
Ryan English – CEO and Co-Founder
Summary: This session will provide an in-depth focus on countering small unmanned aerial systems (C-UAS) and the growing need for it as it applies to civil, military, and event security operations. As presented by a CEO of an internationally recognized tech-solution company, it will cover historic C-UAS implementation, current operations, real-world threats, mitigation limitations, detection, and conclude with the need to counter drones at the source.
10:00 AM – Strategies for Advancing Your Security Career
Keyaan Williams – CEO
CLASS (Cyber Leadership and Strategy Solutions) LLC
11:00 AM – The Dangers of Social Media
Stacy Arruda – Executive Director, Florida Information Sharing and Analysis Organization (FL-ISAO)
Summary: The presentation covers how criminals, terrorists, and spies can use the information we post on the Internet against us. Audience members will see how the offender utilizes this information to create infected emails the victim will open. Once the email is opened, the ensuing network is compromised. In these instances, it does not matter how robust your IT budget is. The offender has totally bypassed it. Ms Arruda will demonstrate what a motivated offender can do with your information in as little as 45 minutes. From finding a target on the Internet, building a profile and crafting three different emails that will likely be opened and compromise the business’ network.
LUNCH – 12:00 PM to 12:55 PM – LUNCH SPONSOR: TAMPA BAY ISSA CHAPTER – Please join us in thanking the TAMPA BAY ISSA CHAPTER!
1:00 PM – SECURING THE ENTERPRISE – WHY PEOPLE DON’T DO WHAT’S GOOD FOR THEM
Speaker: William D. Anton, Ph.D., CEO
CEO Effectiveness, LLC
Summary: Aligning a team to perform any task can seem daunting. There is a mismatch between what science knows and what business does. Focus on closing this gap separates the most successful enterprises from the rest. This can only be accomplished by understanding ourselves and others more deeply than is traditionally the case. Our level of self-knowledge is the upper limit on what we can meaningfully accomplish with others. Our brains are designed to preserve early mental models and beliefs. Once in place, we form cognitive, emotional, behavioral and interpersonal habits to resist seeing these habits and hence we keep them in place. This tendency, in combination with hard-wired brain tendencies, silently influence everything in our lives, including our ability to persuade others. What we don’t know about ourselves limits our capacity for empathy, which may be thought of as a method of gathering information about the subjective life of another person. Too much noise in this system and influence is lost.
2:00 PM – Creating a Security Plan for Office 365 – The Blue Pill Session
Ben Curry, CISSP, MVP, MCP, MCT
Summary: Many organizations struggle to understand and address the wide array of security threats facing a modern business in Office 365. Adding to this pressure, these leaders must simultaneously tackle industry regulations that impose unique cybersecurity controls on their information systems. In this workshop, Ben will guide you through the preparation of a baseline Office 365 security plan. The audience will leave with a consolidated perspective on how Office 365 and its complement of products achieve both a secure and compliant foundation. This tutorial will walk you through planning for the major security areas such as:
|* Data Governance||* Tenant Security|
|* Mobile device security||* eDiscovery and classification|
|* Azure Information Protection||* Azure AD security options|
|* Conditional Access and Multi-factor Authentication||* OneDrive for Business Governance and Security|
3:00 PM – Leveraging OSINT (Open-source intelligence) for Business Decisions
TAZZ – Director of Threat Intelligence
Divine Intel, LLC
A BIG THANK YOU TO OUR EXPERT SPEAKERS, SPONSORS AND THE FBI