Check back soon for 2019 agenda
June 5th, 20188:00am–9:00am
Join Suneeta Hazra, Chief of the Criminal Division and Judy Smith, Chief of the Cybercrime and National Security Section of the Colorado U.S. Attorney’s Office, as they discuss cybercrime trends and developments. They will discuss the cyber threat landscape nationally as well as locally, including cyber threats that you may not know about that impact your daily routines. They will also share the motivation behind the creation of the office’s Cybercrime and National Security Section and provide insight into how the U.S. Attorney’s Office can assist private and government partners.
June 5th, 20189:15am–10:15am
Join our panel of cyber-physical technology experts as they analyze how the internet of things (IoT), blockchain, mesh networks and other “smart” technologies promise to disrupt the security of cyber-physical systems. Learn how the physical security industry can and should prepare to incorporate these technologies securely within their product offerings.
June 5th, 201810:30am–11:30am
What does it mean for a vendor/manufacturer to be a good cyber partner? Listen to leaders from security-industry vendors discuss what they feel is critical to the cyber success of the security integrator and the end-user client. Learn what they are doing to make themselves and their products cyber hardened to provide you viable options for your business.
Network Video and Cyber Security Training Engineer
Bosch Security Systems
National Business Development, Enterprise Sales Manager
Director, Technical Operations, Americas
Cybersecurity Research Director
The Wall Street Journal
June 5th, 20181:00pm–2:00pm
Findings from the industry’s first detailed physical security threat model have revealed that the security industry is at a crucial crossroads. With end-users building and deploying their own security solutions to circumvent the shortfalls of traditional industry solutions, the industry urgently needs take a collective action regarding cybersecurity. Explore what gaps exist on the road toward cyber maturity and what specific practices the industry will need to adopt to preserve the confidence of their customers and partners.
June 5th, 20182:15pm–3:15pm
Regardless of whether you are a multinational company or a small business, today’s global business environment involves vast, interconnected networks – with critical business information being shared across companies and geographies. How can your company ensure it is effectively protecting your own confidential information and that of customers and other stakeholders? How do you know if your suppliers and third parties have the business processes and protections in place for strong cybersecurity? This session provides practical ways to navigate the risks, regulations and guidance for protecting confidential corporate information and addressing cyber risk management.
June 5th, 20183:30pm–4:45pm
As physical security sprints faster and faster toward becoming indistinguishable from the larger internet of things (IoT), it is important to recognize how traditional physical security will interact securely as part of a system of smart application domains such as smart buildings, smart cities and smart grids. The forthcoming NIST Cyber-Physical Systems Framework, scheduled for release in May 2018, further expands upon the current NIST Cybersecurity Framework to focus on the nexus of the cyber and physical worlds. Get a first look at the revised framework and the tools needed to apply it to projects.
Assistant Professor, Department of Decision & System Sciences
Saint Joseph's University
Associate Director, Smart Grid and Cyber Physical Systems Program Office
National Institute of Standards & Technology (NIST)
Department of Homeland Security
Electronics Engineer, NIST Smart Grid & Cyber-Physical Systems Program Office
National Institute of Standards and Technology (NIST)
June 6th, 20188:00am–9:00am
What do CISOs look for when selecting solution partners for their business? How can the physical security industry meet the cybersecurity requirements of organizations that cannot afford to be impacted by cyber threats? Find out what it takes to properly assess the cyber risk of third-party vendors and what some of the best strategies and practices are that CISOs should employ to make the process as mature and efficient as possible.
June 6th, 20189:15am–10:15am
Explore how industry standards can be a part of an organization’s cybersecurity strategy to assess software vulnerabilities and weaknesses, minimize exploitation, address known malware, review security controls and increase security awareness. Find out what work has been done and what’s on the horizon when it comes to advancing a standards-based approach for testable cybersecurity criteria for network-connectable products and systems.
June 6th, 201810:30am–11:30am
Whether you call them “white hat” or “ethical”, hackers are providing value to organizations by improving the cyber resiliency of connected products and services. Learn what terms like red-teaming and penetration testing mean, and how the security industry can benefit from them and other initiating programs offering bounties to hack their systems before malicious actors do.