University of Wisconsin–Madison

Sessions

Loading Sessions

Upcoming Sessions

July 2019

Check-In

July 17 @ 7:00 am - 8:00 am

Come check-in and pick up your gift bags.

Find out more »

Breakfast

July 17 @ 7:00 am - 8:00 am

Breakfast will be served in the far right area of Exhibition Hall A.

Find out more »

Welcome and Introduction

July 17 @ 8:00 am - 8:15 am
Find out more »

Lock Pick Village

July 17 @ 8:00 am - 5:00 pm

This interactive display invites all attendees to test their security hacking knowledge with a variety of physical security measures. This all-day activity is a popular attraction for sleuths to go old-school and see if their…

Find out more »

Opening Keynote: The Digital Cage

July 17 @ 8:15 am - 9:15 am

Amazon, Google, Facebook, Apple, and Microsoft have been called the "frightful five" of the technology industry. They are among the most valuable and powerful companies in the world, and we all rely on them each…

Find out more »

Break

July 17 @ 9:15 am - 9:25 am
Find out more »

Building Incident Response Scenarios for Insider Threats

July 17 @ 9:25 am - 10:10 am

This session will cover the different types of insider threat scenarios and how you should incorporate these scenarios in your incident response plan and processes. We will define insider threat personas, explain how to begin…

Find out more »

Criminological Theories of Computer Crime

July 17 @ 9:25 am - 10:10 am

Traditional criminological theories applicable to offline crimes do not often translate well to computer crimes. Over the past few decades, criminologists specializing in the world of cyber-crime have developed theories to explain and predict the…

Find out more »

How To Boost Your Productivity and Security Posture: Password Mangers and VPN

July 17 @ 9:25 am - 10:10 am

Securely managing accounts for all the sites that we use in our day to day life is a challenge, doing that for all the sites we ever use is impossible. This presentation will talk about…

Find out more »

Break

July 17 @ 10:10 am - 10:20 am
Find out more »

PaIRS: Point of contact and Incident Response System – Finding bad actors without looking at content

July 17 @ 10:20 am - 11:05 am

The PaIRS system uses Netflow data to discover compromised machines on the University network without looking at packet content. It looks at the behavior of the systems and can determine if a machine has been…

Find out more »

Confronting Piracy in Academic Research, the Sci-Hub Story

July 17 @ 10:20 am - 11:05 am

Sci-Hub obtains content by accessing the secure computer networks of major universities by, among other methods, hijacking “proxy” credentials through phishing attacks and other means to facilitate off-campus remote access to university computer systems and…

Find out more »

Women, elderly and children: Why cybersecurity and privacy hit some groups more

July 17 @ 10:20 am - 11:05 am

Cybersecurity is a uniform problem that is affecting all people in our society, but some people are being affected more than others because of the lack of education and training that they generally have. This…

Find out more »

Break

July 17 @ 11:05 am - 11:15 am
Find out more »

Next-Generation Risk Management: Achieving compliance with the NIST Cybersecurity Framework

July 17 @ 11:15 am - 12:00 pm

Colleges and universities host a myriad of technologies that must be secured.  Whether it is grant-funded research data, FERPA data, payment card information, or other confidential or sensitive information, universities are responsible for managing and…

Find out more »

You’ve Been Pwned…But Your Customers Are The Target. Lessons learned from attacks against the power grid.

July 17 @ 11:15 am - 12:00 pm

In January 2019, the Wall Street Journal published an article that reconstructs what it called “the worst known hack into the nation’s power system.” The article tells the story of how a foreign government used…

Find out more »

Cyberbullying: What We All Need to Know

July 17 @ 11:15 am - 12:00 pm

As adults, we all have kids in our lives (whether they are our own children or our sisters, brothers, cousins, nieces and nephews) that we want to protect online.  With the help of The Center…

Find out more »

Lunch

July 17 @ 12:00 pm - 1:00 pm

Lunch will be served in the far right area of Exhibition Hall A and is available to full-day ticket holders.

Find out more »

Addressing Cyber Security Threats with a Constantly Evolving Threat Landscape

July 17 @ 1:00 pm - 1:45 pm

Recent high-profile cyberattacks have prompted education institutions and enterprises alike to enhance their security network. Threat intelligence data threaded into your expansive network security solution can make the difference between preemptively taking meaningful action to…

Find out more »

Cybersecurity Training Lab

July 17 @ 1:00 pm - 4:50 pm

The Mobile Cyber Lab provides a platform for private/public organizations and individuals to learn and/or sharpen their cyber warfare skills on real-world targets. Each lab hosts modules designed to challenge a wide range of skill…

Find out more »

Break

July 17 @ 1:45 pm - 1:55 pm
Find out more »

LastPass as a solution to Credential Stuffing attacks

July 17 @ 1:55 pm - 2:40 pm

Phishing is not the primary driver behind the epidemic of compromised credentials being used to exploit email accounts. That may seem counterintuitive because the most noticeable result of compromised email accounts is that they're used…

Find out more »

Privacy and Security Collide

July 17 @ 1:55 pm - 2:40 pm

Cybersecurity is one of the great threats to our current way of life and future. Privacy is what we risk as we interact with technology and IoT takes over our everyday world. Cybersecurity is how…

Find out more »

Break

July 17 @ 2:40 pm - 2:50 pm
Find out more »

Crypto Hygiene 101 or: How I Learned to Stop Hoping for Security and Love Cryptography

July 17 @ 2:50 pm - 3:35 pm

What does ‘secure’ even mean??? In cryptology, security is a function of time relative to your acceptable threshold for data loss or theft prevention. And cryptography itself is the absolute foundation to WHAT you’re protecting…

Find out more »

Big Data, Little Privacy

July 17 @ 2:50 pm - 3:35 pm

As our relationship with technology evolves, our computers, phones, and other devices make our lives easier, more convenient, and more fun. We are more productive and can have greater impact on our world. Mankind is…

Find out more »

Break

July 17 @ 3:35 pm - 3:45 pm
Find out more »

Closing Keynote: You’re All a Bunch of Phonies! Imposter Syndrome and Information Security

July 17 @ 3:45 pm - 4:45 pm

Imposter Syndrome can cause outwardly successful individuals to be riddled with self-doubt. In the fast-paced world of information security, it can be easy for individuals to second-guess their abilities and attribute success to sheer luck.…

Find out more »

Closing Remarks

July 17 @ 4:45 pm - 4:50 pm
Find out more »
+ Export Events