This year’s Ohio Information Security Conference will be the fifteenth year that Technology First has hosted the event. The audience will be managers responsible for security policy and administrative decisions and technicians responsible for security implementation and effectiveness.
Technology First is seeking proposals for speaker participation in the March 7, 2018 Ohio Information Security Conference hosted in Dayton, Ohio. A session can be a formal presentation of a successful implementation, administrative solution, or technical solution. Topic content must focus on information security and may range from introductory to advanced or from operational to strategic. Each program session will last 50 minutes, including 10 minutes for Q&A.
All proposals will be reviewed by the Security Conference Committee and proposal respondents will be notified of decisions on or after December 8, 2017.
Speaker Expectations Conference Fees, Travel, and Lodging: Presenters are responsible for securing and paying for travel and lodging. Speakers are encouraged to attend the full conference. Registration fees are waived for speakers.
Tracks: The focus of your presentation should adhere to one of the three perspectives.
Technical: Vulnerabilities and Threats
Management: Making the Best Security Decisions
Implementation: Technology Solutions and Associated Risk
The following are topics that have been suggested but other subjects are welcome:
Innovations in Endpoint Security or 2 Factor Authentication
Incident Response – what do you do now?
Update on Info Sec Liability Issues
Responding to potential litigation (preservation of evidence, interacting with legal teams)
Changing security laws – federal and international legislation
Managing and Organizing the Triangle of Info Sec, Risk, and Compliance
Compliance, Audits, and Response
Data Loss Prevention / Encryption
Windows 10 Security Architecture Changes
SIEM and Analytics OR Behavioral Analysis
Cloud or Not to Cloud: Reasons to migrate to the cloud, Considerations on why not to
Managing the Transition to the Cloud (controls, connections, your concerns now vs the provider?)
Securing the cloud: planning, execution, and continuous monitoring
Internet of Things OR SCADA Considerations and Issues
Web-based vulnerabilities or Social engineering
What is Virtual CISO and does it make sense?
BYOMalware OR BYOD case study – security-based policy / implementation
Free or low cost security tools to consider
How to prioritize and budget in a limited financial resource environment
Consumer-driven IT – new trends and concerns
National security and Corporate breaches – implications to the industry
Differences in securing smartphones, tablets and other mobile devices (iOS, Android)
Combining Physical & Cyber Security
DNS Research
Please note: Technology First reserves the right to decline any presentation proposals at any point in the process. This conference is not the correct place for a sales presentation. An introductory slide outlining speaker’s bio and company contact information is appropriate.