Theresa Payton will be speaking at the 2020 Charlotte ISSA Summit!
The first female to serve as White House chief information officer, Theresa Payton is one of America’s most respected authorities on cybersecurity, data breaches and fraud mitigation whose real-world strategies and solutions help public and private sector organizations protect their most valuable resources.
As Head of Intelligence on the CBS TV series, “Hunted,” Theresa and her elite team of command center investigators expose the perils and opportunities of our digital world. She is even featured in the 100 Fascinating Women Fighting Cybercrime book. The founder and CEO of cybersecurity consulting firm, Fortalice Solutions, LLC, Theresa is sought out by a wide range of organizations for her expertise in improving security systems against emerging threats.
Now she is here to reveal what we need to know today and look out for tomorrow in the ongoing battle against cybercrime.
Please join us in welcoming Theresa Payton!
8:00 – 8:30 – Registration with light breakfast
8:30 – 9:30 – Pete Seeber, Corvid Cyberdefense
9:45 – 10:45 – Matt DeMatteo, Secureworks
11:00 – 12:00 – Torry Crass, Cybersecurity Advisor, CISO as a Service – Woodstar Labs
CyberSecurity and the SMB!
with Pete Seeber, Chief Strategy and Risk Officer, Corvid Cyberdefense
In the SMB, Cybersecurity is largely the world of the over-challenged and the under-resourced. Unfortunately, the risk to the SMB is compounded because the number of threats and the sophistication of the threats hitting the SMB are the same as those hitting the enterprise organizations. The big difference is the enterprise organizations typically have a greater ability to construct and maintain a strong security posture. This leaves the SMB as the preferred target of bad actors. We will send some time identifying the challenges and the path forward to success for SMBs and the cyber challenge.
Pete is a cybersecurity executive and the Chief Strategy and Risk Officer at Corvid Cyberdefense. He has a deep background in cybersecurity, technology and risk. Over the last 5 years Pete and the team have built Rocus Networks which was recently purchased by Corvid Technologies and has been rebranded as Corvid Cyberdefense. Pete has been in the Charlotte for 25 years and is a graduate of Wake Forest University.
Security and Data Science
with Matt DeMatteo, Global Solution Lead, Secureworks
The rules of big data
Tools and solutions for data lakes
AI, Machine Learning, and Deep Learning applied to Security
How to set your expectations
Matt DeMatteo is a Technical Product Marketer focused on explaining and promoting Secureworks’ Security Products and Services. Matt joined Secureworks in 2007 as a Security Analyst in the Providence, RI SOC. Matt has been working directly with clients for the past ten years as a Presales Engineer, Principal Engineer, Account Manager, and Global Solution Lead for MSS and MDR. His goal is to help show the value of Secureworks and ensure customers realize that value. Matt works with Secureworks’ global sales force to promote best practices in solution design. Matt has a passion for understanding client’s business needs and unique risks. Matt holds a BS in Computer Science from the University of Rhode Island, where he also was the Director of the Digital Forensics Lab.
Practical Incident Response
Building effective response to survive cyber incidents
with Torry Crass, Cyber Security Advisor and member of the CISO as a Service practice at Woodstar Labs, a division of AUI
Incidents are pervasive. Response is, at its best, challenging. As cyber security professionals this is the reality we must deal with on a daily basis. "The first six months of 2019 have seen more than 3,800 publicly disclosed breaches exposing an incredible 4.1 billion compromised records" Davey Winder (Forbes). This presentation will provide a brief overview of incident response processes and how they connect to other functions in cyber security, considerations for forming an incident response team, important questions to consider during the process, and will wrap up with one or more mini-exercises (time permitting). This presentation is intended for and will bring value to both operators and leadership.
Torry Crass currently serves as a Cyber Security Advisor and member of the CISO as a Service practice at Woodstar Labs, a division of AUI. He has more than 20 years of experience in the information technology field and over 10 years of cyber security experience from hands-on keyboard to senior leadership roles. At Woodstar Labs he provides both strategic and tactical cyber security guidance for programs and clients.
Prior to joining Woodstar Labs, Torry was a CISO (Chief Information Security Officer) at LEO Cyber Security based in Fort Worth, TX assisting a variety of clients with all aspects of planning, implementing, and improving cyber security programs in manufacturing, industrial, utility, and financial sectors.
Prior to LEO Cyber Security, Mr. Crass spent 14 years with SPX Corporation and finished his time there as the Manager of Information Security.
He also serves as the chair of the InfraGard National Cyber Camp Program, an advisory board member for the Cyber Crime Technology Program at SPCC, an advisory board member of SecureWorld Charlotte, a co-chair of BSides Charlotte security conference, and a member of the South Carolina State Guard cyber unit regularly participating with cyber related exercises the National Guard and other organizations.
Join Charlotte Metro ISSA and Lastline SME Mustafa Rassiwala for Securing Workloads in the Cloud!
Are you moving your datacenter and applications to the cloud?
Are you already in the cloud?
As a security professional you want to be in control and ready for threats to your workloads in the cloud. In order to do that, you need to detect and contain threats to your servers and various compute resources. The challenge is that you are dealing with a new network environment in the cloud and traditional network security solutions you currently have will not work for the cloud environment. We believe you deserve to be secure in the cloud. At Lastline, we have been in the business of detecting the most advanced and sophisticated attacks with a focus on the network - both cloud and on-premise for hybrid datacenter environments. This webinar will describe a plan for securing your workloads with: Recognize: What you are securing in the cloud Infrastructure as a Service (IaaS) model Confront: The threats you will be facing at each layer in your cloud applications Protect: By deploying the right solutions for the threats in the cloud infrastructure Our objective is to guide you in securing your cloud workloads so that you can be recognized as the defender of your organization and prevent any disruptions to your business and customers.