University of Wisconsin–Madison

2019 Presentations

Keynotes

Opening Keynote: The Digital Cage

Kashmir Hill, Technology Reporter, The New York Times

The Digital Cage slides (PDF)

Closing Keynote: You’re All a Bunch of Phonies! Imposter Syndrome and Information Security

Tara Hughes, Manager of Administrative Services, California State University Channel Islands

You’re All a Bunch of Phonies slides (PDF)

Cybersecurity Basics Track

How To Boost Your Productivity and Security Posture Password Managers and VPN

Ryan Leavitt, Student Information Systems Specialist, University of Wisconsin‌‌–‌‌Madison
John Nagler, Risk Analyst, University of Wisconsin‌–‌Madison

How To Boost Your Productivity and Security Posture Password Managers and VPN slides (PDF)

Women, elderly and children: Why cybersecurity and privacy hit some groups more

Heather Stratford, Founder and CEO, Stronger International, Inc.

Women, elderly and children – Why cybersecurity and privacy hit some groups more slides (PDF)

Cyberbullying: What We All Need to Know

Tim Bohn, Assistant Director for Common Systems Cybersecurity, University of Wisconsin‌–‌Madison

Cyberbullying slides (PDF)

Please note that the Cybersecurity Basics Track sessions were not recorded.

Strategic Track

Criminological Theories of Computer Crime

Chad R. Johnson, Information Security Officer and Professor of Sociology and Computer Science, University of Wisconsin‌–‌Stevens Point

Criminological Theories of Computer Crime slides (PDF)

Confronting Piracy in Academic Research, the Sci-Hub Story

Sari Frances, Director of Content Protection Services, Elsevier

Confronting Piracy in Academic Research, the SciHub Story slides (PDF)

You’ve Been Pwned…But Your Customers Are The Target. Lessons learned from attacks against the power grid.

Christopher Hickernell, Security Architect, MHI Shared Services Americas, Inc.

You’ve Been Pwned slides (PDF)

Privacy and Security Collide

Heather Stratford, Founder and CEO, Stronger International, Inc.

Privacy and Security Collide slides (PDF)

Big Data, Little Privacy

Lee Imrey, CISO Advisor, Splunk

Big Data Little Privacy slides (PDF)

Technical Track

PaIRS: Point of contact and Incident Response System – Finding bad actors without looking at content

Joel Rosenblatt, Director of Computer and Network Security, Columbia University

PaIRs: Point of contact and incident response system slides‍ (PDF)

Gray rectangle with text that reads, "Video not available"

Building Incident Response Scenarios for Insider Threats

Brian Reed, Senior Director Analyst, Gartner

Building Incident Response Scenarios for Insider Threats slides (PDF)

Next-Generation Risk Management: Achieving compliance with the NIST Cybersecurity Framework

Hunter Ely, SLED Security Strategist, Palo Alto Networks

Next-Generation Risk Management slides (PDF)

LastPass as a solution to Credential Stuffing attacks

John Nagler, Risk Analyst, University of Wisconsin‌–‌Madison
Jesse Thompson, Solutions Architect, University of Wisconsin–Madison

LastPass slides (PDF)

Crypto Hygiene 101 or: How I Learned to Stop Hoping for Security and Love Cryptography

Allan Konar, Solutions Architect, Unbound Tech
Alex Rabke, Sales Director, Unbound Tech

Crypto Hygiene 101 slides (PDF)