Summit Session Synopses
Wednesday, November 9
IMPROVING NEAR-TERM CYBER RESILIENCE
The Cybersecurity and Infrastructure Security Agency’s (CISA) State Cybersecurity Coordinator (CSC) for Texas, Ernesto Ballesteros, will provide a brief overview of the best practices and no-cost cyber resources CISA recommends organizations – regardless of size or sophistication — consider adopting to prepare for, respond to, and mitigate the impacts of cyberattacks that may disrupt their critical services.
LEVERAGING CISA RESOURCES: A BRIEF OVERVIEW OF NO-COST RESOURCES
The Cybersecurity and Infrastructure Security Agency’s (CISA) Protective Security Advisor for central Texas, Edwin Otten, will provide a brief overview of the various no-cost resources available to your organization to assist with improving security and resilience.
THE TOP 5 THINGS YOU SHOULD KNOW TO IMPROVE YOUR CYBER SECURITY PROGRAM
High reward items to focus on in your next OT or IT cyber risk assessment.
FULL VISIBILITY LEVERAGING CLOUD NATIVE LOGGING
Current solutions for monitoring the IT/OT environments are failing to provide the full visibility required to protect your organization. Issues with performance, data source compatibility, and inability to scale are just a few things that are putting your assets at risk. The lack of centralized visibility across disparate data sources along with rising attacks lengthens the mean-time-to-detect and respond which can exponentially increase your financial impact. Come learn the benefits of how a cloud-native logging and SIEM platform can provide that visibility in a single pane of glass to monitor your environment and alleviate your pain points, while freeing up valuable time for your teams to focus on more pressing tasks.
LESSONS FROM 2019 RANSOMWARE EXPERIENCE
Judge Jill S. Sklar will examine the 2019 cyber security attack that crippled the Jackson County Courthouse. She will discuss the ransomware attack along with Jackson County’s response and recovery efforts to get Jackson County back in full operation.
A GLIMPSE INTO ACTIVE DIRECTORY & IDENTITY SECURITY
For organizations running Active Directory, it’s one of the most critical security components in their environment. Unfortunately, most AD deployments have vulnerabilities that make it easy for attackers to move laterally, elevate privileges, and ultimately gain full control of the environment. In this session, we’ll discuss the most critical AD security issues and discuss what you can do to monitor/fix them.
EMERGING SOCIAL MEDIA, OPPORTUNITIES FOR THREAT INTELLIGENCE
Hear about the evolving tech and social media landscape and how threat intelligence can be leveraged to protect your company, people, and assets. Learn about emerging social media platforms, including traditional, alt social, and diving into deep and dark web. See how users are adopting the platforms, what types of intelligence can be discovered, and how to best gather key intel. Look into case studies on how to use Navigator to detect doxxing, physical threats, and GeoPolitical risks.
Thursday, November 10
This presentation will discuss ransomware and how cyber insurance responds to a ransomware event, what coverages are provided by cyber insurance and, more importantly, what services come with the policy, and lastly what are the insurance company underwriters requiring from the insureds as respects IT controls and what insurance company will write your utility exposure.
DRONES, SECURITY, & ENERGY INFRASTRUCTURE
An overview of the threat drones present to energy facilities, the legal and regulatory framework that energy and drones coexist in, and strategies and techniques to mitigate the threat.
A&M’S CENTER FOR CYBERSECURITY RESEARCH IN SCADA SECURITY & DIGITAL FORENSICS OF CYBER ATTACKS
The Center seeks to advance the collective cybersecurity knowledge, capabilities, and practices, doing so through ground-breaking research, novel and innovative cybersecurity education, and mutually beneficial academic governmental and commercial partnerships. Current research projects include autonomic cyber security, novel methods to defend SCADA and ICS systems and new techniques in the area of digital forensics.