2021
Julia DeWeese
Title: A Bizarre Call Detonates BazarLoader Malware Abstract: Bio: Julia DeWeese is an Intelligence Analyst for the Malware and Cyber Threats team at the National Cyber-Forensics and Training Alliance (NCFTA). Her main interests are malware and ransomware analysis, darkweb ransomware data leak sites, and honeypot monitoring. Julia graduated from Duquesne University (Pittsburgh, PA) with a […]
Kevin Flanagan
Title: Ransomware 2021 – Anatomy of a DoppelPaymer Attack Abstract: 2020 was challenging enough as it was, but the number of ransomware attacks continues to grow and exacerbate one of the most difficult years. 2021 is no different as entire companies have been brought to a halt and forced to pay ransoms costing millions of […]
Jack Freund
Jack oversees corporate risk and compliance, and strategy and governance of the firm’s cyber risk products. He is also the co-author of the foundational cyber risk quantification (CRQ) book using the FAIR standard, which was inducted into the Cybersecurity Canon in 2016. Jack was awarded a Ph.D. in Information Systems after his research in disaster […]
Chris Furtick
Topic: Ransomeware Abstract: TBD Bio: Chris Furtick is a proven information security leader with a consultative voice able to bridge the gap between technology and business outcomes. A technically proficient professional, he has experience advising C-level executives and technical engineers in fundamental and advanced information security tactics and strategies. He is a passionate leader accomplished […]
Carrie Gates
Dr. Carrie Gates joined Bank of America in October 2018 as a Senior Vice President in Global Information Security. She has established a research program, working in partnership with universities to pursue longer term, higher risk research in the security space that has the potential to improve the bank’s security posture. Her current portfolio includes […]
Jason Gillam
Title: This is Your Circus AND Your Monkeys: Managing Supply Chain Risk Abstract: We all depend on 3rd parties to provide products, services, and equipment. Whether or not you have a choice, they still present risk to your organization’s objectives and the threat has drastically increased in recent years. In this talk we’ll look at […]
Mike Horn
Title: Peek-a-boo: How Attackers Hide Threats Behind Well Known Services Abstract: Bio: With over 20 years experience in cybersecurity, and as a founder of two cybersecurity startups, Mike is passionate about working with enterprise security teams to identify gaps in their existing security tools & products and then partnering with them to design innovative new […]
Todd Inskeep
Title: Making Security & Legal Best Friends Abstract: Regulation, legal judgements, settlements, and common practices define today’s “best practices” in cyber and information security programs. The best security tool is not enough unless its aligned to evolving legal practices. Make the company lawyer your friend and get their help mapping your program to standards defined […]
Tommy Jinks
Title: Abstract: Bio: Tommy Jinks is a senior vice president and Information Security researcher at Bank of America. Tommy has more than 25 years of experience working with innovation and research teams across the financial industry. He carries a keen understanding of building and deploying innovative technologies in risk averse and highly regulated environments. Jinks […]
Kevin Johnson
Bio: Kevin Johnson is the Chief Executive Officer of Secure Ideas. Kevin has a long history in the IT field including system administration, network architecture and application development. He has been involved in building incident response and forensic teams, architecting security solutions for large enterprises and penetration testing everything from government agencies to Fortune 100 […]