Registration - Continental Breakfast, Exhibits Open
Welcome and Opening Comments
Keynote Speaker: The Threats to U.S. Business Posed by China’s Technology Acquisition Efforts
The National Counterintelligence and Security Center (NCSC) is led and staffed by a cadre of professionals with decades of national security and law enforcement expertise and varied analytic, investigative and policymaking backgrounds. The NCSC facilitates and enhances U.S. counterintelligence efforts and awareness by enabling the counterintelligence community to better identify, assess, prioritize and counter intelligence threats from foreign powers, terrorist groups, and other non-state entities; ensures that the counterintelligence community acts efficiently and effectively; and provides for the integration of all U.S. counterintelligence activities.
Keynote Speaker: The Most Serious Threats Today and The Biggest Mistakes Companies Are Making in IT Security
The Attorney General is Pennsylvania’s top law enforcement official, with a wide range of responsibilities to protect and serve the citizens and agencies of the Commonwealth. The Attorney General is served by a staff of several hundred prosecutors, attorneys, investigators, agents and support staff in offices across the state, divided into three sections: Criminal Law Division, Public Protection and Civil Law. They are seeing a sharp increase in mistakes companies are making to protect against today’s most serious IT threats, including ransomware, data breaches, and customer/employee information stolen. The Attorney General will provide a unique perspective on dealing with the biggest mistakes companies are making in IT security, and dealing with the today’s most serious IT threats.
Question and Answer Session with the Keynote Speakers
|10 a.m.||Refreshment Break – Exhibits Open|
Offensive Security & Defensive Tactics (Hands-on Workshop)
In this workshop attendees will learn the basics of offensive security and how attackers leverage tools and techniques to discover vulnerabilities in an organization. Attendees will leverage widely used, free, and open source tools to learn how to better protect their organizations. In completing this three hour workshop attendees will learn:
Attendees participating in this lab should bring:
|Noon||Lunch – Exhibits Open|
Offensive Security & Defensive Tactics (Hands-on Workshop) (cont’d)
|2 p.m.||Refreshment Break – Exhibits Open|
The Many Layers of the Dark Web and Protecting Your Company
This presentation will provide fascinating information regarding the little-understood Dark Web portion of the internet. If someone is accessing the Dark Web on a business network, there could be any number of compromises to the network. And, if a business is not adequately securing their sensitive, confidential, or proprietary information, that information could end up for sale on the Dark Web. We will discuss:
Although some of the presenters are attorneys, nothing in this program should be construed as legal advice or as pertaining to specific factual situations.