Speakers
The following speakers have been announced for CornCon:
Speaker: Prof. Dean C. Alexander |
Speaker Bio: Dean C. Alexander is Director, Homeland Security Research Program and Professor at Western Illinois University. He has lectured in ten countries, including to law enforcement and military officials at North Atlantic Treaty Organization (NATO), U.S. State Department, fusion centers, as well as state and municipal police events. Since publishing on terrorism in 1991, Prof. Alexander has written several books on the subject, most recently co-authoring the book, The Islamic State: Combating the Caliphate Without Borders (Lexington Books, September 2015).
|
Title/Abstract: "ISIS/The Islamic State's Use of the Internet: Threats and Consequences"
This presentation discusses the multifaceted modes by which the quasi-state, its affiliates, and adherents use the Internet for radicalization, recruitment, communications, propaganda, financing, and other activities. Also, the talk relates government, private sector, and other responses to these threats.
|
Speaker: Joseph Dagama |
Speaker Bio: Joseph Dagama CPO, FSO, CAS is G4S Security Project Manager. Joe has been a part of the security community for over 25 years working with military, law enforcement, and numerous fortune 50 companies. He currently commands a team of over 25 Officers specializing in Maritime and Physical Security while reporting to various local and federal agencies. Joe holds the designations of Certified Protection Officer (CPO), Facility Security Officer (FSO), Certified Anti-terrorism Specialist (CAS) and is working on his Security Fundamental Professional Certification (SFPC) through the Department of Defense. When he is off duty he spends time with his family, road trips, and works in his ministries.
|
Title/Abstract: Situational Awareness - Attack Scenarios and Breakout Session
Situational awareness Cyber training using everyday scenarios and case studies that would impact families, facilities, and potentially government. Learn about the Dark Web and the seamy underbelly of the Internet. Who are the attackers and what are their motivations?
* Because of material covered, this presentation will be an exercise for adults only *
|
Speaker: Michael J Daugherty @DaughertyMJ |
Speaker Bio: Michael J Daugherty is Founder, President & CEO of LabMD, a cancer detection laboratory based in Atlanta, Georgia, and is the author of the book “The Devil Inside the Beltway, The Shocking Expose of the US Government's Surveillance and Overreach into Cybersecurity, Medicine and Small Business”.
He holds a BA in Economics from University of Michigan-Ann Arbor. Before founding LabMD Mike spent 18 years at US Surgical and Mentor. He regularly blogs atMichaelJDaugherty.com and sits on the boards of Snoopwall, a cyber privacy company in Nashua, New Hampshire, The Private Bank of Buckhead in Atlanta, Georgia, and writes for CyberDefense Magazine. He is a private pilot and resides in Atlanta, Georgia.
|
Title/Abstract: Secret Law: How the FTC Regulates Cybersecurity Without Specifics, Rules or Standards
In America today the FTC, FCC and Homeland Security are jousting over who is going to regulate the internet. Michael J. Daugherty will rivet you about his blood in the water battle with the Federal Trade Commission over their relentless investigation into LabMD's data security practices showing you what they do to those who dare not "go along to get along." What happens inside the Beltway no longer impacts solely inside America's borders.
Mike exposes the real time maneuvers of government lawyers and regulators who are accustomed to no one looking. Is their power lust resulting in a less secure world?
|
Speaker: Jen Fox @j_fox |
Speaker Bio: Jen Fox, CIPT, is a Sr. Security Consultant and governance Practice Lead at VioPoint. Her 20+ years in IT and information security includes training, usability design, business process analysis, risk management, vendor risk management, and security awareness. Specialties include information elicitation and business/technology translation. She is also a locksport enthusiast and Myers-Briggs nerd. And, this year she took first place in the DEF CON 23 Social Engineering Capture The Flag (SECTF) competition, bringing home a black badge.
|
Title/Abstract: How I Got Network Creds Without Even Asking: A Social Engineering Case Study
On a professional pen testing engagement, why is one call or phish pretext selected over another? Why does it work (or not)? This case study describes how an SE pen testing engagement used a combination of exploits – phishing, vishing, and a spoofed site to successfully gain network credentials without even asking for them. Learn why the pretexts and exploits were selected for the engagement and how and why they worked. See the email! Hear the calls! See the site! This presentation is ideal for attendees who understand some social engineering basics but want to learn more about how an SE engagement works.
|
Speaker: Prof. Jessica Gosnell |
Speaker Bio: Dr. Gosnell regularly teaches Ethics, Applied Ethics and Conflict Analysis at St. Ambrose University. She is a certified mediator and board member of Quad City Mediation Services.
She has particular interest in justice and peace issues. Her classes are oriented around providing practical applications of theoretical concepts.
|
Title/Abstract: Kids and the Ethics of Technology * KIDS TRACK ONLY *
Dr. Gosnell will give a keynote presentation on the ethics of using technology. She will introduce the children to the ethical uses of technology and how hacking is a power, like The Force, that one must use for good and not go over to The Dark Side.
|
Speaker: Carlos F. Lerma
@NukeL4Loosh |
Speaker Bio: Carlos F. Lerma is a Senior Information Security Architect at Beam Suntory Inc, based in Deerfield, IL. He holds a bachelor’s degree in accounting from Universidad Autónoma de Tamaulipas (Ciudad Victoria, Mexico) and a Master of Science in Telecommunications and Network Management from Syracuse University. His research interests are cyber intelligence systems, threat management, SIEM systems and the use of strategic intelligence in information security management. The rest of his spare time is spent playing baseball and beer-league softball, serving as lead singer for the now-defunct metal cover band "The Fat Vampires", imbuing in as many craft beers as possible and hating the New York Yankees as well as the New England Patriots.
|
Title/Abstract: Strategic Intelligence: Skynet loved it, Terminator used and it might help you secure your organization if you don't have a clue on how to do it
The main purpose of the talk is to explain to security practitioners what is the Intelligence Cycle, how intelligence agencies use this process to plan, analyze information and act to protect. The user is introduced to the generic concept of intelligence and how it can be applied to secure a network by defining objectives, selecting tools, positioning sensors, gathering information, analyzing it (and providing analysis methods, which is the most important part of the talk) and how to act to protect computer systems based on the previous steps. Additionally, examples of how Open Source Intelligence (OSINT) combined with a good process foundation, can help an organization to create an in-house Threat Intelligence program. All of this under a "Terminator" theme.
The talk also discusses the use of the Intelligence Cycle as a design tool that helps an organization to correctly assess the risks that the organization is facing. It considers the information security resources at hand and the ones that it needs, the way it will allocate these resources in order to put them to work for the benefit of the organization, and the way it will monitor this infrastructure in order to assure a proper level of protection.
|
Speaker: Jodi Selby |
Speaker Bio: Jodi L. Selby, CCBSP, CAMS, CFSSP is
Vice President/Financial Intelligence Department at Bankers Trust Company. Jodi joined Bankers Trust Company in January 2000. Her primary responsibilities include Security, Information Security, and Bank Secrecy Act/Anti-Money Laundering Compliance. She has over 24 years of experience in the Banking industry.
Jodi holds a bachelor’s degree in Business Administration and is currently a Certified Community Bank Security Professional (CCBSP) Certified Anti-Money Laundering Specialist (CAMS), and Certified Financial Services Security Professional (CFSSP). In her free time, Jodi serves as a volunteer guardian and conservator for the State of Iowa representing elderly/dependent adults and also serves on the board of Ballet Des Moines. Jodi grew up in Adel, Iowa, and continues to reside there with her husband and children.
|
Title/Abstract: Data Breach, Corporate Account Takeover, and other Financial Related Crimes
Please join Jodi Selby for the latest information on trends in financial related cybercrimes.
|
Speaker: Richard Thieme |
Speaker Bio: Richard Thieme is an author and professional speaker focused on the challenges posed by new technologies and the future, how to redesign ourselves to meet these challenges, and creativity in response to radical change and identify shift. His column, "Islands in the Clickstream," was distributed to subscribers in sixty countries before collection as a book in 2004. When a friend at the National Security Agency said after they worked together on ethics and intelligence issues, "The only way you can tell the truth is through fiction," he returned to writing short stories, 19 of which are collected in “Mind Games.” A novel FOAM will be available this month (October 2015). He is also co-author of the critically extolled “UFOs and Government: A Historical Inquiry,” a 5-year research project using material exclusively from government documents and other primary sources, now in 65 university libraries.
His work has been taught at universities in Europe, Australia, Canada, and the United States, and he has guest lectured at numerous universities, including Purdue University (CERIAS), the Technology, Literacy and Culture Distinguished Speakers Series of the University of Texas, the “Design Matters” lecture series at the University of Calgary, and as a Distinguished Lecturer in Telecommunications Systems at Murray State University. He addressed the reinvention of “Europe” as a “cognitive artifact” for curators and artists at Museum Sztuki in Lodz, Poland, keynoted CONFidence in Krakow 2015, and keynoted “The Real Truth: A World’s Fair” at Raven Row Gallery, London, He has spoken for the National Security Agency, the FBI, the Secret Service, the US Department of the Treasury, and Los Alamos National Labs and has keynoted “hacker” conventions around the world. He spoke in 2015 at Def Con for the 20th year.
|
Title/Abstract: UFOs and Government: a Case Study in Disinformation, Deception, and Perception Management
There is no one "government." There are many components of government that interact and respond to challenging and anomalous events, often contending with one another - and leaving their disputes on record.
UFOs were challenging and anomalous since the 1940s, when "foo fighters" trailed planes on bombing runs over Germany and Japan. But strange flying vehicles did not go away when the war ended. In the 1950s, the CIA advocated training observers "inside" to learn what they could while dismissing reports from "outside."
To understand why and how a government responds that way is analogous to hacking a complex system. One has to do appropriate reconnaissance, then execute effective counter-measures, then engage in offensive operations.
The proliferation of reliable reports of unidentified flying objects elicited a response that feels familiar in the days of Assange, Snowden, and the NSA. UFOs were anomalous, well-documented, and challenging because, as Major General John Samford said, “credible people have seen incredible things.” Snowden, too, thought he had seen incredible things that needed to be brought into the light.
But this talk isn't about Snowden, it's about how governments manage these challenges. An NSA veteran thinks that Thieme's talk is "perfect timing - it's about how the government deals with serious yet largely unknown or not understood potential threats, while trying desperately to keep the public from knowing what they are doing. What better way to discuss the current situation at a meta level, without ever getting into the knee-jerk muddle of response to current events? You can't ask for a better context for this talk."
Richard Thieme was privileged to be invited to join the UFO History Group which includes the best researchers in the field. After 5 years of work, they produced “UFOs and Government: A Historical Inquiry,” an outstanding work of historical scholarship that reads like a fascinating detective story. In almost 600 pages and with nearly 1000 citations, the work illuminates the response of the government since the early 1940s. how and why policies were set, and how they were executed. Reviewers say, "this is the best book about the UFO phenomena that was ever written" and "UFOs and Government is a triumph of sober, conscientious scholarship unlikely to be equaled for years to come."
Don Quixote said, “Insanity is seeing things as they really are." This speech uses UFO phenomena as dye in the arteries of "how things really are." And how governments carry out cover and deception with all of the best intentions in the world.
|
Speaker: Ira Winkler @irawinkler |
Speaker Bio: Ira Winkler, CISSP, is President of Secure Mentem and Co-host of The Irari Report (www.irarireport.com). He is considered one of the world’s most influential security professionals, and has been named a “Modern Day James Bond” by the media. He did this by performing espionage simulations, where he physically and technically “broke into” some of the largest companies in the World; investigating crimes against them, and telling them how to cost effectively protect their information and computer infrastructure. He continues to perform these espionage simulations, as well as assisting organizations in developing cost effective security programs. He also won the Hall of Fame award from the ISSA, as well as several other prestigious industry awards. Most recently, CSO Magazine named him a CSO Compass Award winner as “The Awareness Crusader.”
|
Title/Abstract: 7 Habits of Highly Effective Security Awareness Programs
The human element is still the most critical vulnerability to CISOs and very often the root of high-profile corporate data breaches. As such, security awareness has become the top concern to many. In a perfect world, security awareness programs would create a culture of security by way of seamless, consistent communication of the importance of information security. In reality, these programs are often a patchwork of materials created in-house and tools purchased from vendors which can lead to a lack of a consistent, coordinated message. Ira Winkler will provide a methodology for developing a cohesive security awareness program that will help to establish a strong security culture. |
Contact Us
Please send inquiries to CornCon@CornCon.net
HOME
©2015 CornCON is organized by the QC Cybersecurity Alliance, St. Ambrose University and the Iowa Illinois IEEE Computer Society
A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology. |