Securing the Edge Panel – Virtual Event

Details Price Qty
The Member is available to members only. On Sale
Virtual Non-Membershow details + $0.00 (USD)  

  • April 16, 2020
    2:00 pm - 6:00 pm

April 16th – Join the WTA for our Virtual Meeting.

Securing the Edge

As organizations see the need for more devices and compute at the edge of their networks, there is also a larger attack surface for the bad guys. Our panelists include end users and specialists in the security space that will answer questions and discuss the various aspects and solutions for the expanding network.

Perimeter security: Securing access to edge resources via encrypted tunnels, firewall and access control.

Application security: Beyond the network layer, edge devices run applications that must be secured.

Threat detection: It’s critically important for providers to employ proactive threat detection technologies to identify potential issues early.

Vulnerability management: There are both known and unknown vulnerabilities that need to be managed.

Patching cycles: Automated patching to keep devices up to date is important for reducing the potential attack surface.

Come and listen to what others are doing to for their environments and please bring questions to ask the panel. This is a great opportunity to walk away with ideas and a sense of direction in this very complex security world. If you don’t get a question in or wish to have a longer conversation with our panelists, be sure to stay for our networking after the session.

Panel:

Panel:
Mark Schafer, Chief Information Security Officer, SVA Consulting

Mark is a recognized consultant and leader in security program design and build, ensuring the security strategies he deploys are in alignment with his client’s business objectives. He is also experienced in risk assessment and management, compliance and security awareness training. Mark’s clients have been from a diverse group of organizations including healthcare, government agencies, manufacturing and nonprofit organizations

Russell From, Technical Account Manager, Tanium

Russell From is a Technical Account Manager for Tanium where he helps public and private organizations utilize Tanium’s platform for real-time visibility and control of their endpoints for IT operations and cybersecurity. Previously, Russ was a Senior Network Security Engineer for US Cellular where he defended customers and business partners by focusing on proactive network behavior analysis, network forensics, mobile malware identification and remediation, DDoS defense, and threat intelligence automation. Russ also defended the largest electronic medical records vendor in the United States as the Network Security lead on IPS, IDS, Network Decryption, Traffic Analysis, and Network Security Response on fully micro-segmented virtualized infrastructure. Before moving to the defensive side of cyber security, Russ had 8 years of networking experience including being the Principal Network Engineering for Global Cloud Deployments for the United States largest wireless carrier. Russ currently holds the CISSP, GPEN, GMON, GCIA, GCIH, and GSEC Gold certifications. Russ also has a Bachelors from UW-Madison in Computer Engineering, an MBA from Marquette University, and is working to complete the SANS Masters in Information Security Engineering program. Russ’s hobbies and interests include bass fishing, residential solar energy, electric vehicles, and aquaponics.

Mike Reineck, Sr Security Manager, Baird

Jason Phillips, Information Security Professional

As a technology industry professional with more than 25 years of hands-on technical and team leadership experience, Jason has successfully lead teams and organizations on their cyber security journeys. Most recent roles have found him working in executive level and thought leadership positions within regulated companies.

Working with businesses to raise cyber security awareness and build pragmatic, sustainable cyber security programs continues to be his passion through applying a balance of process, procedure, education and technology.

Jason was a co-founder of Proven Compliance Solutions, providing NERC Reliability Compliance consulting for both the Operations and Planning (O&P) Reliability Standards and the Critical Infrastructure Protection (CIP) Reliability Standards.

Jason is an active member of the ISC2 CISSP Exam Writing Team, has presented on cyber security at the Central Wisconsin Information Technology Alliance, served an adjunct professor, and is active in industry advisory groups.

Moderator:

Christina Ruth, CheckpointChristina Ruth

Christina Ruth is an Account Manager with Check Point Software Technologies. She works alongside customers ranging from small businesses to large enterprises to help them to better develop effective security posture and prevent cyber security threats. Prior to that she worked at TEKsystems in both the Milwaukee and Appleton markets and has spent the majority of her career learning about local trends in Cyber Security. Christina is a road warrior and travels throughout the Midwest working with her clients and attending various networking events. She enjoys going to User Groups throughout the state and is heavily involved with local security groups and is Vice President of the ISC(2) Northeast Wisconsin Chapter.

Christina grew up in the Upper Peninsula of Michigan where she graduated from Michigan Technological University with a Bachelor’s in Business. Christina resides in Appleton, Wisconsin with her two huskies and hobbies include kickboxing, reading murder mystery books, or listening to her favorite Security podcast -Darknet Diaries.