SECURING OUR EVER-CHANGING WORLD - MAY 10-11, 2022 MYSTIC LAKE CENTER #SEC360

Page created by Janice Barton
 
CONTINUE READING
SECURING OUR EVER-CHANGING WORLD - MAY 10-11, 2022 MYSTIC LAKE CENTER #SEC360
V. 5.6.1

   SECURING OUR
      EVER-CHANGING WORLD
          MAY 10-11, 2022
          MYSTIC LAKE CENTER

            #SEC360

SECURE360.ORG
SECURING OUR EVER-CHANGING WORLD - MAY 10-11, 2022 MYSTIC LAKE CENTER #SEC360
GREETINGS AND WELCOME TO THIS YEAR’S                                       SECURE360
              SECURE360 CONFERENCE!                                               CONFERENCE APP

It is such an exciting time in history, and we are so pleased to be back in     You don't want to miss this
person here at Mystic Lake Center. Now in its 17th year, the Secure360         year's conference- so be sure
Conference is the professional conference of choice for comprehensive         to download the mobile app so
security and risk management education, collaboration and new                        you can see it all!
perspectives for you and your teams.
                                                                              Here is how:
Each and every day, our world continues to change. Now is the time to
                                                                               1. Download ExpoPass
take inventory of the unique skills found in the companies and industries
                                                                               2. Once the app is ready,
in which we work. Opportunities to make a difference are quickly
                                                                                  click Create an Account.
revealing themselves and it’s time to take charge and define our
                                                                               3. Input your information! Be
responsibilities. There is power in numbers and potential with our
                                                                                  sure that the email
combined skill sets. That is the focus of this year’s conference, Securing
our Every-Changing World.                                                         address you use matches
                                                                                  your registration email.
As the host of this event, the Upper Midwest Security Alliance (UMSA) is       4. The app will now send you
proud to be comprised of local member organizations who help support              an email to verify your
educational opportunities throughout the year. I encourage you to visit           account- go through your
our member booths located on both sides of the tradeshow hall.                    email to verify!
                                                                               5. Click the Magic Link
In order to support the work of the UMSA Foundation, we've set up a               button to verify your email
special fundraising campaign for student scholarships. The goal for this          and be sent back to
special Secure 360 Conference Fundraising Campaign is $10,000, and                ExpoPass.
with your help, we will be able to provide educational scholarships to         6. Now that you're verified,
students studying fields in or related to business continuity and disaster        you will now see
recovery, cybersecurity, governance, risk and compliance, and physical            Secure360 under
security. You can make your donation online or in person at the                   'Upcoming Events'. At the
registration desk. Thank you for helping support the next generation of           bottom of that page, click
cybersecurity professionals!                                                      Enter.
                                                                               7. You will now see all your
We hope you find your time at this year’s Secure360 event educational
                                                                                  registration information.
and worthwhile as you continue to foster the connections and discover
                                                                                  You can update it now or
the power of possibilities in the security space.
                                                                                  just click Save.
                                                                               8. You are now in! You will be
Have fun out there,
                                                                                  brought to the 'About the
Val Mooney                                                                        Event' page. Click the three
Secure360 2022 Conference Chair                                                   lines on the upper left to
                                                                                  find the agenda, exhibitors,
                                                                                  and more.

                                                                                                            1
2022 TABLE OF CONTENTS

Welcome Letter................................................................................................................ Page 1

UMSA Information ........................................................................................................... Page 3

Start Up Corner & Foundation ......................................................................................... Page 4

Kelley Archer Founders Award ........................................................................................ Page 5

Conference Extras ........................................................................................................... Page 6

Mark Schulman Keynote ................................................................................................. Page 7

Tyler Cohen Wood Keynote ............................................................................................. Page 8

Tuesday, May 10th Schedule ................................................................................... Pages 9-12

Wednesday, May 11th Schedule ........................................................................... Pages 13-15

Demo Stage Schedule ................................................................................................... Page 16

Mystic Lake Maps - Campus ......................................................................................... Page 17

Mystic Lake Maps - Exhibit Hall .................................................................................... Page 18

Thank You, Cisco Secure! ............................................................................................. Page 19

Thank You, Platinum Sponsors .................................................................................... Page 20

Sponsors ........................................................................................................................ Page 21

Exhibitors ....................................................................................................................... Page 22

UMSA Scholarship Recipients ...................................................................................... Page 23

2023 Save The Date ...................................................................................................... Page 24

2022 Bingo Board .......................................................................................................... Page 25

                                                                                                                                             2
UMSA LEADERSHIP

UMSA is an alliance of security-related organizations. The organization serves business, government and
education professionals in the upper Midwest, collaborating with professional associations, educators
and industry-leading companies to provide professional development opportunities that contribute to a
stronger security foundation for organizations. Our member organizations include:

UMSA MEMBER ORGANIZATIONS

           UMSA FOUNDERS                                2021-2022 UMSA BOARD MEMBERS

Kelley Archer, ISSA       James Ringold, ISFA           Ryan Sather, President
Joe Beissel, ASIS         Nick Ryberg, ISACA            Ken Shaurette, VP
Mike Brady, ASIS          Mike Stickney, BCPA           David Knight, Treasurer
Rick Ensenbach, ISSA      Marie Strawser, BCPA          Andrew Bethel, Secretary
                                                        Valerie Mooney, Secure360 Chair
                                                        Michael Johnson, Student360 Chair

                      SECURE360 PLANNING COMMITTEE MEMBERS

                               Val Mooney, Chair       Justin Opatrny
                               David Vega              Michelle Chevalier
                               Tyler Berends           Phaik Huen Tan

                                                                            The 2022 Secure360
CONFERENCE PARTNERS                                                         Conference is managed by
                                                                            Fusion Learning Partners.

                                                                                                          3
START UP CORNER

For the fifth year, UMSA is proud to support local start-up
companies for a chance to be a part of the conference experience.
Vigilant Technology has been selected and is sponsored to get
their foothold in the security industry. Congratulations!

UMSA FOUNDATION

                               The Upper Midwest Security Alliance (UMSA) Foundation is a Minnesota-
                               based 501(c)(3) organization created to support continuing education for
                               security, continuity and risk professionals. The UMSA Foundation was
                               started by UMSA to be its philanthropic arm with a singular and unique
                               focus towards advancing the information risk, audit, continuity, disaster
                               recovery, cybersecurity and related fields through the giving of funds to
                               support college scholarships and grants for those focused on these fields.

The mission of the UMSA Foundation is two-fold: support the research and education in matters
involving security and risk-related professions, organizations and practices; promote, develop, foster
and support a scholarship for individuals pursuing a security and risk-related profession. Learn more at
https://umsa-security.org/foundation/.

Help Support the Next Generation of Cybersecurity Professionals!

Before, during and after the Secure 360 Conference, the UMSA
Foundation is requesting donations from individuals and companies to
fund the 2023 scholarship awards. The goal for this special Secure 360
Conference Fundraising Campaign is $10,000, and with your help, we
will be able to provide educational scholarships to students studying
fields in or related to business continuity and disaster recovery,
cybersecurity, governance, risk and compliance, and physical security.
Your donation will offer the financial assistance to students who
otherwise would not have the means for cybersecurity education.

Donating is easy, tax deductible and any amount is welcome. Please
visit the Donation Page and make your donation today! Learn more
                                                                                     DONATE!
about 2022 recipients on page 23 & around the event center!

                                                                                                            4
KELLEY ARCHER FOUNDERS AWARD

The Kelley Archer Founder's Award recognizes members who
have rendered distinguished service to the information security
and risk management profession. Typically, no more than two
awards are granted annually and the award does not have to be
granted every year. Award recipients are presented with an award.

Selection Criteria
The individual(s) selected will have served the information
security and/or risk management profession for an extended
time, usually in a variety of leadership roles wherein effective
service or leadership was provided within UMSA or through UMSA                Kelley Archer
member organizations. The individual’s contributions will have              Founding member &
had significant impact on the association beyond the time of              first president of UMSA
her/his incumbency.
The Founder's Award Committee depends on the membership to submit nominations. The award may
not be given to a sitting member of the Founder's Award Committee or a sitting member of the UMSA
Board of Directors.

Award Recipient Responsibilities
The award recipient(s) will be responsible for providing a current photograph for the following year’s
program and website. Because the element of surprise is our aim in presenting this award, the previous
year’s recipients are presented for publication each year.

Nominations
Nominations are due by March 15, 2023. The award is presented at the Secure360 conference in May.
Nomination letters should contain a list of people who can be contacted to verify the candidate’s
credentials and provide additional information. Email nominations to director@umsa-security.org or send
via mail to PO Box 130935, St. Paul, MN 55113.

Questions? Please contact the UMSA managing director, Marie Strawser (director@umsa-security.org).

                                                                                                          5
CONFERENCE EXTRAS

Check out some of our special events and opportunities this year!

              CPE/CEU Certificates
                                                                        Sponsor Demo Stage
Certificates that can be used to submit for CPE/CEU
     hours will be sent to conference attendees            Back by popular demand, sponsors will be wowing
 approximately 1 week after the event. Questions?           conference attendees on the demo stage located
         Contact the conference director at                behind the conference center escalators. These 20-
               info@umsa-security.org.                    minute sessions held during breaks are designed to
                                                          showcase the latest and greatest products/services
                                                          from our sponsors. Seating is limited, so grab a spot
          Secure360 Conference App                              while you can. Full demo stage times and
                                                            descriptions can be found on the conference app.
  Download this year’s conference app for Android or
 iOS (also available through your web browser). View
   each day’s schedule, sponsor lists, get the latest
notifications of room/time/session changes, network               Tuesday Happy Hour Reception
with other app users, post directly to social media and
                                                           Stick around after the last sessions on Tuesday for
   rate conference speakers all within the app. Visit
                                                          our happy hour reception. Held on-site at Mystic Lake
Attendee Registration or the UMSA information booth
                                                           Center inside the Minnetonka Ballroom, this is your
                        for help.
                                                          chance to network with peers, sponsors and speakers
                                                          and recap your day of learning. New this year: throw a
                                                               game or two of corn hole while you network!
                  Bingo Is Back!
  Now is your chance to harness all your Secure360
knowledge and fill out our 2022 bingo card! Solve the                   Wifi & Social Media
  clues and retrieve stickers to black out your card.
                                                                    To connect to Secure360’s WiFi:
 Drop off your completed card at the UMSA booth to
                                                                      Username – Secure360
  be entered to win one of two $100 Visa gift cards.
                                                                    Password – 2022Secure360

                                                          Be sure to follow along on social media while you are
     Volunteer Opportunities with UMSA                    attending Secure360 2022! Use hashtag #Sec360 in
                                                                               your posts!
 UMSA has many ways to get involved in the security
community. Consider attending our annual meeting to
                                                                               We are on:
  learn about the opportunities available, open board
      positions and/or to join the team. For more                            @secure360
 information, visit the UMSA information booth in the
                                                             /company/upper-midwest-security-alliance/
            Minnetonka Ballroom or email:
              director@umsa-security.org.                                    @secure360

                                                                                                            6
Don't miss our 2022 Keynotes, Mark Schulman &
 SECURE360 KEYNOTES
                                           Tyler Cohen Wood, in the Mystic Lake Showroom!

                                     MARK SCHULMAN
                                           MARK SCHULMAN
                                     TUESDAY, MAY 10TH, 8AM - 9AM CDT
                                        TUESDAY, MAY 10TH | 8AM
                                     MYSTIC LAKE SHOWROOM
                                     Hacking the ROCKSTAR ATTITUDE:
                                     How To Ignite Rockstar Performance During Uncertain Times

Mark’s high-energy, dynamic presentation, Hacking the Rockstar Attitude, can best be described as a Rock
show disguised as a keynote. Mark uses three core principles during this kinetic and sensory-driven
program – ABC: Attitude * Behavior * Consequences. You can’t always control what happens to you – as
evidenced by the global pandemic – but you can control your attitude, which drives your behavior, and your
behaviors determine your consequences. Your audience will walk away with a blueprint for how to
incorporate Rock & Roll philosophy, techniques, and swagger in order to overcome obstacles, drive
performance, and energize their work and personal lives. Are you ready to rock?

**A 30-minute meet & greet will follow Mark's presentation.**

                                     ABOUT MARK SCHULMAN

Mark Schulman is the drummer for P!NK, performing for sold-out audiences all over the world. Get ready to
be empowered, inspired and elevated to an evolved mindset and new level of peak performance. Having
performed for over a billion people, Mark unlocks the Rockstar Attitude by incorporating his powerful
business philosophy and innovative strategic content with engaging multimedia and drum performances.
Through Mark’s high-energy speaking style, strategic business expertise, and dynamic, interactive musical
activities, you will get to express your own rhythms, fortify individual strengths, and enhance emotional
connections with your colleagues and families. Mark’s presentations have the excitement of a rock show
with the transformational results of a cutting-edge keynote. Think Tony Robbins meets Bono meets Ringo
Starr; you’ll break the boundaries of possibility and performance while rocking out to an unforgettable mix
of live drumming, interactive performances, and compelling stories from Mark’s intimate experiences with
P!NK, Billy Idol, Foreigner, Cher, and other world-class artists.

Learn more about Mark at https://www.markschulman.com/.

                                                                                                             7
Don't miss our 2022 Keynotes, Mark Schulman &
SECURE360 KEYNOTES
                                             Tyler Cohen Wood, in the Mystic Lake Showroom!

                                       TYLER  COHEN WOOD
                                         MARK SCHULMAN
                                          TUESDAY,
                                       WEDNESDAY, MAYMAY 10TH
                                                      11TH,        | CDT
                                                            8AM - 9AM 8AM
                                       MYSTIC LAKE SHOWROOM
                                       Redefining Cyber Security by Employing a New Paradigm

The media is awash with seemingly daily reports of more and more serious cyber-attacks. We are losing the battle
with cybersecurity and will continue to in the future unless we make critical and fundamental shifts to our paradigm.
Cybersecurity leaders agree that the field has become one in which we find ourselves in a constant reactive loop,
where we’re putting out fires without truly identifying underlying problems. Without addressing the problems, how can
we even begin to address the solutions?

This presentation will closely align the disconnects and critical failures facing cybersecurity with another industry
that has achieved pockets of excellence that go a long way to mitigating failure. Through Wood’s extensive
background in multiple aspects of cybersecurity and her experience navigating another equally complex field, she will
use her expertise and unique storytelling approach to share how to truly understand cyber challenges in order to fully
address the bigger picture with concrete solutions. Through analogies and case studies, Wood will detail the major
cyber problems businesses face today and demonstrate how, by employing a new model and paradigm, we can begin
to solve the cybersecurity and workforce problems today and those on the threat horizon of tomorrow.

                                    ABOUT TYLER COHEN WOOD

As a keynote speaker, author, national security expert, and overall cyber authority, she is relied on to provide
unique insight into cyber threats, cyber warfare, mitigating cyber risk, national security, and ensuring
industries have the tools and knowledge they need to defend themselves in the digital world. She has
received many awards such as Top 10 cybersecurity keynote speakers in Onalytica’s 2021 report, “Who’s
Who in Cybersecurity and The Top Influencers and Brands, Cybercrime magazine’s Top 30 Cybersecurity
Experts to Follow in 2021”. She was also listed "Top 50 Women in Tech Influencers to Follow 2021" by The
Awards Magazine, 30 Most Inspiring Women in AI 2021 by Engati, Top 10 Cybersecurity speakers and
influencers by Kevsbest, and is a Finalist for Cybersecurity of Woman Leader of the Year 2021.

Learn more about Tyler at https://tylercohenwood.com/.

                                                                                                                   8
CONFERENCE SCHEDULE                            DAY 1 - TUESDAY, MAY 10TH
7AM - 8AM: Registration & Refreshments
7:45AM - 8AM: Welcome & Opening Comments

8AM - 9:15AM: Mark Schulman Keynote: Hacking the ROCKSTAR ATTITUDE: How To Ignite Rockstar Performance
              During Uncertain Times, Mystic Lake Showroom
9AM: Tradeshow Opens, Minnetonka Ballroom

9:15AM - 9:35AM: Risk Based Vulnerability Management, Demo Stage
                 Alex Crepas, Cisco Secure
9:45AM - 10:45AM: Breakout Sessions

    ROOM                        TITLE                       SPEAKER(S)           TRACK          LEVEL

                 Secrets of a Successful Bug Bounty        Michelle Killian,
    ANOKA                                                                         Cyber      Intermediate
                               Program                      Peter Lukas

  OWATONNA           I am Joe's Executive Order             Scott Forbes          Cyber      Intermediate

                                                        Adam Mishler, Jadee
                                                       Hanson, Judy Hatchett,
    ISANTI                   CISO Panel                                          Spotlight      Basic
                                                       Karen Andersen, Patrick
                                                               Joyce

                  Conducting Exercises in a Hybrid
  WACONIA I                                                Fred Klaptezky         BCDR       Intermediate
                             Manner

                   The Art of Preparing for CMMC
  WACONIA II     Readiness: A Cyber Standard for the          Ali Pabrai           GRC       Intermediate
                                2020s

                                                         Angie Itschert, Brian
  WACONIA III     The Future of Corporate Security                               Physical    Intermediate
                                                        Peters, John Shuman

  WACONIA IV       I.O.S. Internal Operating System         Rana DeBoer          Prof Dev    Intermediate

  WACONIA V        Between the Chair & Keyboard          Wolfgang Goerlich       Sponsor      Advanced

                  Your External Data Invites Cyber &
  WACONIA VI                                              Daniel Matthews        Sponsor     Intermediate
                          Physical Threats

                                                                                                            9
10:50AM - 11:10AM: Machine Identity Management - Going Fast & Staying Secure, Demo Stage
                   Tim Connolly, Venafi

11:15AM - 12:15PM: Breakout Sessions

     ROOM                            TITLE                        SPEAKER(S)         TRACK           LEVEL

                    Attack Surface Management - The New           Gaurav Gaur,
    ANOKA                                                                             Cyber       Intermediate
                                  Necessity                        Mike Kelly

                       Being Human in the Age of Digital
    ISANTI                                                         Jeff Butler      Spotlight     Intermediate
                                Innovation

                      And the Clouds Break: Modernizing
   WACONIA I                                                   Wolfgang Goerlich      BCDR        Intermediate
                           Continuity and Recovery

  WACONIA II         How to Secure Complex Environments           Evan Francen        GRC         Intermediate

                   Post-COVID Physical Penetration Testing
  WACONIA III                                                     Brian Halbach     Physical      Intermediate
                                 Threats

  WACONIA IV           Becoming a Person of Influence              Jason Hunt       Prof Dev      Intermediate

                  How Machine Learning Models Can Uncover
  WACONIA V                                                     Michael Roytman       BCDR        Intermediate
                      the True Causes Behind Breaches

  WACONIA VI           CNAPP: Finding the Worst Risks              Ken Perkins       Sponsor      Intermediate

12:15PM - 12:35PM: Prevention First Cyber Approach, Demo Stage
                   David Crosser & Gregg Yurchak, Blackberry Cylance

12:45PM - 1:05PM: Powering Security Operations with context-aware detections, alert prioritization, Demo Stage
                  Anthony Guida, Google Cloud Security

1:15PM - 2:15PM: Breakout Sessions (continued on next page)

     ROOM                        TITLE                         SPEAKER(S)            TRACK           LEVEL

                    Purple Haze: Turning Network             Chris Hernandez,
    ANOKA                                                                             Cyber       Intermediate
                   Defenders into Network Attackers           Laura Farvour

                      Advice for IoT Use in a Post-
  OWATONNA                                                    Brian Halbach           Cyber       Intermediate
                           Pandemic World

                                                                                                                 10
FBI Crime Scene Collection: How to Play
    ISANTI                                                       Lizabeth Lehrkamp    Spotlight      Basic
                               with Luminol

  WACONIA I           Adopting a Zero trust Framework             James Ringold         BCDR      Intermediate

                 Sharing Is Caring - How Responsible Public
  WACONIA II       Disclosure Can Help Clients With Third          Daniel Sandau        GRC       Intermediate
                                 Party Risks

                 Bringing Security from the Basement to the
  WACONIA IV                                                       Kurt Kapsner       Prof Dev       Basic
                                 Boardroom

  WACONIA V       Risk Mitigation through Cloud Adoption            David Stone       Sponsor     Intermediate

                  The Importance of Engaging Developers
  WACONIA VI     with Software Security, & How to Get Better       Nick Saunders      Sponsor     Intermediate
                                   At It

2:45PM - 3:45PM: Breakout Sessions

    ROOM                            TITLE                           SPEAKER(S)        TRACK         LEVEL

                How to Build and Validate Ransomware Attack
    ANOKA                                                          Scott Sutherland    Cyber      Intermediate
                                 Detections

 OWATONNA             Zero Trust: A Story of Growing Up            Aaron Wampach       Cyber      Intermediate

    ISANTI           Defending against Advanced Threats             Tim Crothers      Spotlight   Intermediate

                Strengthening Your Program Through Strategic
  WACONIA I                                                          Kathy Davis       BCDR          Basic
                              Communications

                Data Management to Reduce Risk and Comply
  WACONIA II                                                        Heather Engel       GRC       Intermediate
                            With Mandates

                 The Hand that Rocks the Cradle: Why HR is
  WACONIA III    your Best and Worst Advocate in Workplace         Carrie Ackerman    Physical    Intermediate
                             Violence Prevention

 WACONIA IV     A Non-techie Thriving in a Cybersecurity World      Lauren Rudek      Prof Dev    Intermediate

                                                                                                                 11
The Data-First Approach; Managing the
  WACONIA V                                                          Brian Vecci      Sponsor     Intermediate
                   Tension between Security and Product

                  2022 Threat Landscape, An Overview and
 WACONIA VI        Strategic Considerations based on Real          Duke McDonald      Sponsor     Intermediate
                                  Attacks

4:15PM - 5:15PM: Breakout Sessions

    ROOM                           TITLE                           SPEAKER(S)         TRACK         LEVEL

   ANOKA                All Speed and No Security                  Aakash Shah         Cyber      Intermediate

                   Lessons Learned from an Important
 OWATONNA        Vulnerability Disclosure: Kerberos Bronze         Jake Karnes         Cyber         Basic
                                  Bit Attack

                                                                Benjamin Edwards,
   ISANTI          A Data-Driven Story on Vulnerabilities                             Spotlight   Intermediate
                                                                   Jay Jacobs

                Disaster Fatigue - It's real! So what will we
  WACONIA I                                                       Fred Klaptezky       BCDR       Intermediate
                               do about it?

                                                                 Art Cooper, Ben
                 The PCI Dream Team: Solving the biggest
 WACONIA II                                                       Rothke, David         GRC       Intermediate
                           PCI DSS nightmares
                                                                Mundhenk, Jeff Hall

                One Hop from the Heart - Securing Cardiac
 WACONIA III                                                       Kyle Erickson      Physical    Intermediate
                          Implantable Devices

                 Managing Stress and Building Resilience
 WACONIA IV                                                       Cindy Edwards       Prof Dev       Basic
                   using the 7 Levels of Effectiveness

 WACONIA V                What XDR Is And Isn't                    Bryan Flores       Sponsor     Intermediate

                   Fast and Furious Attacks: Using AI to
 WACONIA VI                                                        Connor Lind        Sponsor     Intermediate
                           Surgically-Respond

                   DON'T MISS IT!
                   TUESDAY HAPPY HOUR FROM 5PM - 7PM
                   MINNETONKA BALLROOM & GAMES OUTSIDE

                                                                                                                 12
CONFERENCE SCHEDULE                              DAY 2 - WEDNESDAY, MAY 11TH

7AM - 8AM: Registration & Refreshments
7:45AM - 8AM: Welcome & Scholarship Awards Ceremony
8AM - 9AM: Tyler Cohen Wood Keynote: Redefining Cyber Security by Employing a New Paradigm
           Mystic Lake Showroom

9AM: Tradeshow Opens, Minnetonka Ballroom

9:15AM - 9:35AM: Saving Resources With Managed Detection and Response, Demo Stage
                 Tim Otis, Check Point Software Technologies

9:45AM - 10:45AM: Breakout Sessions

     ROOM                           TITLE                          SPEAKER(S)        TRACK         LEVEL

                    What Safety Science taught me about
     ANOKA                                                       John Benninghoff     Cyber      Intermediate
                             Information Risk

                   Recovery Amid Threat Innovation: How
  OWATONNA          the Lasting Impact of COVID-19 Has          Christopher Conrad    Cyber       Advanced
                       Altered the Threat Landscape

                   Easiest Catch: Don’t Be Another Fish in
     ISANTI                                                      Mark Lanterman      Spotlight   Intermediate
                               the Dark ‘Net

   WACONIA I        Metrics To Energize the BCP Lifecycle          Kathy Davis        BCDR       Intermediate

   WACONIA II        GRC Potpourri: Past, Present, Future       Kathy Washenberger     GRC       Intermediate

                  Understanding Invisible Disabilities in the
  WACONIA IV                                                      Cindy Edwards      Prof Dev    Intermediate
                                Workplace

                  Seize The Breach: Why Breaches Occur &
   WACONIA V                                                       Jim Chrisos       Sponsor     Intermediate
                           How to Mitigate Them

  WACONIA VI       Learn How to Safeguard the Enterprise           Mark Buvari       Sponsor     Intermediate

10:50AM - 11:10AM: What does it mean to have “Good Visibility”?, Demo Stage
                   Steve Goers, Crowdstrike

                                                                                                                13
11:15AM - 12:15 PM: Breakout Sessions

     ROOM                             TITLE                          SPEAKER(S)        TRACK          LEVEL

                   Knowing What Risks Matter--And Don't--In
    ANOKA                                                            David Lindner      Cyber      Intermediate
                            Your Open Source

                   Into the Abyss: Evaluating Active Directory
  OWATONNA                                                          Scott Sutherland    Cyber      Intermediate
                              SMB Shares on Scale

                        Crypto Crime - Recent Trends in
    ISANTI                                                           Jacob Iverson     Spotlight   Intermediate
                        Cryptocurrency and Cyber Crime

                    Navigating the Ransomware Challenge:
   WACONIA I       Lessons in continuity, crisis, cybersecurity,    Bryan Strawser       GRC       Intermediate
                                and leadership

  WACONIA II               Think Like a Jazz Musician                  Ty Collins        GRC       Intermediate

                   Contrary to Hollywood belief - information
  WACONIA IV       security is more than firewalls (and dark lit    Aaron Wampach      Prof Dev       Basic
                                     rooms)

  WACONIA V             Ransomware: The New Cold War                 Jamison Utter     Sponsor        Basic

                  Blast Radius & Active Attack Paths: The Keys
  WACONIA VI                                                         Jeff Moncrief     Sponsor     Intermediate
                   to Securing Your Cloud with Agility & Speed

12:15PM - 12:35PM: Cloud Security Demo for Trending Security Features: CSPM, CIEM, CWPP, Identity Security and
                   Data Security, Demo Stage
                   Jeff Moncrief, Sonrai Security
12:45PM - 1:05PM: Automation & Advanced Analytics, Demo Stage
                  Jim Chrisos, Exabeam

1:15PM - 2:15PM: Breakout Sessions (continued on next page)

     ROOM                               TITLE                          SPEAKER(S)      TRACK         LEVEL

                  Incident Response In The Wild: Three Real World
    ANOKA                                                              John Harmon      Cyber      Intermediate
                                Incident Autopsies

                  Value Control: Optimizing Data Management and
  OWATONNA                                                             Kyle Schiemo     Cyber      Intermediate
                                  Business Value

                                                                                                                  14
2022, the Year the SEC Changed the Rules
    ISANTI                                                            Chris Veltsos     GRC       Intermediate
                                about Cyber Risk

                   Stump the Stumper : Foundations for Building        Karl Krug,
  WACONIA II                                                                            GRC       Intermediate
                               an InfoSec Program                     Ken Shaurette

                    Communicating the Business Value of Your
  WACONIA IV                                                           Adam Stone      Prof Dev   Intermediate
                        Information Security Program

  WACONIA V       Dwell Time - The Consequence of Not Watching           Tim Otis      Sponsor    Intermediate

                   Supercharging Microsoft Sentinel with Cribl +        Alex Volk,
  WACONIA VI                                                                           Sponsor       Basic
                                  ReliaQuest                            Bill Larsen

2:45PM - 3:45PM: Breakout Sessions, Exhibit Hall closes at 2:45pm

     ROOM                            TITLE                           SPEAKER(S)        TRACK        LEVEL

                      World of Modern Apps: Dissecting
    ANOKA          Ransomware and Botnet Threats in Cloud            Aditya K Sood      Cyber     Intermediate
                                 Databases

                        Street Cred: Increasing Trust in
  OWATONNA                                                         Wolfgang Goerlich    Cyber     Intermediate
                         Passwordless Authentication

                     Exercising Resilience: Lessons for the
   WACONIA I                                                          John Blood        BCDR         Basic
                                 Private Sector

                    Open-Source Software as a Double-Edge
  WACONIA II                                                       Hannah Connolly       TBA          TBA
                                   Sword

                   The Singularity Has Happened, Not with a
  WACONIA IV                                                        Richard Thieme     Prof Dev   Intermediate
                           Bang but with a Whimper

                     Beyond Advanced Persistent Threats:
  WACONIA V           Common Tradecraft and High Value              Lauren Podber      Sponsor     Advanced
                           Detection Opportunities

                     Solving for X with XDR: Widening the
  WACONIA VI       Aperture for Rapid Detection, Investigation        Ken Westin       Sponsor       Basic
                                 and Response

                                                                                                                 15
The Demo Stage is located across from the
DON'T MISS THE DEMO STAGE!                      attendee registration desk, see the map on the
                                                next page!
TUESDAY, MAY 10TH

       TIME                       TITLE                    SPEAKER(S)            COMPANY

                         Risk Based Vulnerability
  9:15AM - 9:35AM                                          Alex Crepas
                              Management

                     Machine Identity Management -
 10:50AM - 11:10AM                                        Tim Connolly
                      Going Fast & Staying Secure

                                                       David Crosser & Gregg
 12:15PM - 12:35PM   Prevention First Cyber Approach
                                                              Yurchak

                      Powering Security Operations
 12:45PM - 1:05PM     with context-aware detections,      Anthony Guida
                            alert prioritization

WEDNESDAY, MAY 11TH

       TIME                       TITLE                    SPEAKER(S)            COMPANY

                     Saving Resources With Managed
  9:15AM - 9:35AM                                            Tim Otis
                         Detection and Response

                       What does it mean to have
 10:50AM - 11:10AM                                         Steve Goers
                          “Good Visibility”?

                        Cloud Security Demo for
                       Trending Security Features:
 12:15PM - 12:35PM                                         Jeff Moncrief
                       CSPM, CIEM, CWPP, Identity
                              Security and

 12:45PM - 1:05PM             Data Security                Jim Chrisos

                                                                                                 16
MYSTIC LAKE CENTER MAPS

2022 CAMPUS MAP

    KEYNOTES                             TRADESHOW
    Mystic Lake Showroom (Upper Level)   Minnetonka Ballroom
    GENERAL SESSIONS
    Isanti                               DIAMOND SPONSOR
    Anoka                                Booth #101 - Cisco Secure
    Owatonna
    Waconia I
    Waconia II
    Waconia III
    Waconia IV                           PLATINUM SPONSORS
    Waconia V                            Booth #102 - Google Cloud Security
    Waconia VI                           Booth #103 - Check Point Midpoint
    Chaska 1 & 2 : Lunch & Lounge        Booth #104 - Crowdstrike
    Winona 1 & 2: Lunch & Lounge         Booth #307 - Exabeam

                                                                              17
MYSTIC LAKE CENTER MAPS

2022 TRADESHOW MAP - MINNETONKA BALLROOM

                                           18
THANK YOU TO OUR DIAMOND SPONSOR!

         co
 Find Cis
  in Booth
    #101!

It’s time to put security above everything. With our integrated portfolio and industry-leading
threat intelligence, only Cisco gives you the scope, scale, and capabilities to attain effective
security in a world of evolving threats. Click on the logo or button below to learn more!

      YOUR EXPERIENCE                    YOUR SUCCESS                YOUR FUTURE SECURED
         SIMPLIFIED                      ACCELERATED
                                                                       Security that helps you
  Security that takes you from     Security that fuels progress.    breathe easier. Prepare your
 overwhelmed to empowered.         Champion innovation with a         security strategy for the
   Reduce complexity with an       powerful, pervasive platform      future with a platform you
 integrated and open platform      that keeps you safe as your         can rely on, backed by
  that strengthens operations,       business pursues what's        unparalleled resources and
 gets out of the way, and gives                next.                         expertise.
     your team time back.

        /CiscoSecure                     /ciscosecure                          /cisco

                                      LEARN MORE!

                                                                                                   19
THANK YOU TO OUR PLATINUM SPONSORS!

                           Exabeam is a global cybersecurity leader that adds
                           intelligence to every IT and security stack. We are
                           reinventing the way security teams use analytics and
                           automation to solve threat detection, investigation, and
 Booth #307 - Minnetonka   response (TDIR), from common security threats to the
                           most critical that are difficult to identify.
 Learn More!

                           Protect your organization with Google Cloud security
                           solutions: Apply the best of Google to your security in
                           the cloud, on-premises, or in hybrid deployments.
                           Detect, investigate, and help stop cyber threats that
                           target your business and users before attacks result in
 Booth #103 - Main Hall
                           damage or loss.
 Learn More!

                           Check Point is a leading provider of cyber security
                           solutions globally, protecting customers from 5th
                           generation attacks with an industry leading catch rate
                           of malware, ransomware and other types of attacks. We
                           offer multilevel security architecture, “Infinity” Total
                           Protection with Gen V advanced threat prevention,
 Booth #104 - Main Hall    which defends enterprises’ cloud, network and mobile
 Learn More!               device held information.

                           CrowdStrike, a global cybersecurity leader, has
                           redefined modern security with one of the world’s
                           most advanced cloud-native platforms for protecting
                           critical areas of enterprise risk – endpoints and
                           cloud workloads, identity and data.
 Booth #105 - Main Hall
 Learn More!               CrowdStrike: We stop breaches.

                                                                                      20
THANK YOU, SPONSORS!

GOLD SPONSORS

     Booth #411                       Booth #407
                                                                Booth #500

        Booth #400                        Booth #207              Booth #300

        Booth #600                          Booth #100           Booth #511

        Booth #211                        Booth #507            Booth #311

SILVER SPONSORS

    Booth #403               Booth #402            Booth #305      Booth #517
BRONZE SPONSORS

ProcessBolt - #404                  DirSec, Inc. - #504
Cylance; Blackberry - #405          Cloudflare - #505
PlexTrac - #302                     Cequence Security - #304
BeyondTrust - #303                  SentinelOne - #205
Arista Networks - #502              Zimperium - #513

                                                                                21
Metropolitan State University - T12
THANK YOU, EXHIBITORS!
                                        St. Mary’s University - T13
                                        Gigamon - #514
Start-Up Corner: Vigilant Tech - #416
                                        Netspi - #412
ProCircular - #213
                                        Armis - #515
Arctic Wolf - #203
                                        NaviLogic, Inc. - #612
Keysight - #413
                                        Protiviti - #604
A10 Networks - #312
                                        Endace - #614
Data Theorem - #313
                                        Critical Start - #314
White Oak Security - #512
                                        SafeBreach - #315
ExtraHop Networks, Inc. - #415
                                        Cycode - #516
Expel - #215
                                        Western Telematic - #417
Trellix - #317
Orca Security - #503

              get to
    Don't for
             m in the
    visit the
                nka
       Minneto
                   !
         Ballroom

                                                                              22
CONGRATULATIONS, SCHOLARSHIP RECIPIENTS!

The UMSA Foundation offers a scholarship program with four (4) $3,000
scholarships and eight (8) $1,000 scholarships for undergraduate, graduate
or continuing education programs.

In addition to the winners you see below, watch for others around the conference! UMSA awarded
scholarships to a total of 12 students thanks to your continued generosity.

                         OLIVIA ALBERTS
                         University of Minnesota Twin Cities, Junior, Cybersecurity Major
                         “Being recognized by UMSA (a pillar of this community) gives me confidence
                         in my future and makes me feel accepted into this thriving group of security
                         thought leaders.”

                                                    YONA ABALIWANO
                  University of Minnesota Twin Cities, Sophomore,
                                              Cybersecurity Major

          “The scholarship for me is not just about receiving money but also
            the acknowledgment of my potential as a future security leader.”

                         HUNTER SQUIRES
                         University of Idaho, Sophomore, Cybersecurity Major

                         “By contributing to a scholarship for those gaining an education in security you
                         are contributing to the next generation of security experts.”

Help us reach our $10,000 goal for 2023 recipients!
Donating is easy, tax deductible and any amount is welcome. Please visit             DONATE!
the UMSA Scholarship Donation Page and make your donation today!

                                                                                                            23
UMSA BOARD NOMINATIONS

Nominations are now open for the 2022-2023 UMSA board of directors. Online nominations will be open
until June 30, 2022. At that time, nominations will close and will be reviewed by the current UMSA board
of directors. The official board vote will be held in mid-July.

The following positions are currently open for 2022-2023. Please visit the website to learn more about
each position including duties, expectations and time commitment.

   Vice President
   Secretary
   Student360 Director

               LEARN MORE!

                                   SEE YOU NEXT YEAR!

  Secure360 will be back at Mystic Lake                  Don't forget about Student360 this Fall!
  Center on May 9-10, 2023! Stay tuned                   Date & venue details are coming soon!
         for more information.

                                                                                                           24
BINGO IS BACK!
                               Now is the time to harness all your Secure360 knowledge for a chance to win!

NAME:                                            COMPANY:

PHONE:                                          EMAIL:

             Solve the clues below, retrieve stickers to complete a BLACK OUT on your card.
                Once you are finished turn it in at the UMSA Booth to enter to win a prize!

         B                            A                          C                            K
 Do you know which                                      What do you find at          This Platinum
                             Is your phone low on
 organization puts on                                      the end of the         sponsor is made up
                             battery life? Might be
   Secure360 Twin                                      rainbow? Go visit one      of 2 companies that
                                 good to visit a
   Cities? Visit their                                   of these sponsor          both end in point.
                               Charging Station!
         booth.                                               booths!                    Say hi!

                            Do you know what Ag
 What did you think of                                                            Our top sponsor is a
                              represents on the            Have you been to
     our Keynote                                                                 diamond in the rough!
                             periodic table? Stop        the Demo Stage yet?
 speaker? Stop by the                                                            Do you know who our
                              by an Ag sponsor            Check out a demo!
 stage to fill this spot!                                                        Diamond sponsor is?
                                    table!

                                                                                  Where do you go to
   Find the Start Up
                             This UMSA affiliate                                 search for info on the
    Corner booth!
   You'll need to be          is new this year!                   FREE                 internet?
                                                                                 Stop by this Platinum
       Vigilant...
                                                                                        sponsor.

                                                            This Platinum          Go find an UMSA
                                   With this                sponsors' logo          affiliate table.
     Checkmarx                Platinum sponsor,              represents a          Hint: Head to the
      this spot!              you can Seize the           falcon. Go visit to        Minnetonka
                                    Breach.                  get a sticker.           Ballroom.

 Have you downloaded         We awarded 12 of
                                                           Their logo is an
  the Secure360 app           these this year!
                                                            owl and with            Go to lunch... get
   yet? Show a staff         Make a donation to
                                                            good reason.             your sticker!
     member at the               the UMSA
                                                             Find them!
   registration table.       Scholarship Fund.
You can also read