Workshop: October 11th, 2019
The workshop features in-depth, hands-on, classroom-style educational courses to expand your knowledge and foster security discussions. Workshop Registration does not include the conference pass. The conference on Thursday October 10th is a separate registration.

Blockchain for IT Professionals
Instructor: Guy Hermann
Blockchain is poised to be one of the greatest IT disruptors since the internet, accelerating breakthrough applications in a wide range of industries. According to Wikipedia, Blockchain is "an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way". Simply stated: Blockchain gives you the ability to trust others. A Blockchain ensures the safety of business assets between member organizations. With the increase in business blockchains, blockchain professionals are now in high demand. They are accountable to develop, strategize and implement blockchain technologies for basic business operations. Come and learn what Blockchain is, and how you can get started with Blockchain technologies.
  • What is Blockchain? (Really, what exactly is it?)
  • Non-Technical Technology Overview (How does Blockchain work?)
  • Benefits of Blockchain (Why should anyone even consider using this?)
  • Use Cases (Where and for what applications is it appropriate?)
  • Adoption (Who is really using it and for what?)
  • Implementation (How do I get started?)
  • Costs (What are the costs of using this technology?)
  • Future of Blockchain (What is its future?)
  GSA Train
Cloud Security & Auditing the Cloud
Instructor: Jay Ferron
[TBD]
  GSA Train
Cybersecurity Blueprint for Digital Transformation / Industry 4.0
Instructor: Viral Trivedi
Overview of Digital Transformation and Industry 4.0 and need for cybersecurity
  • Industrial Cybersecurity Threat Landscape & Threat vectors
  • Key differences between Industrial OT & Enterprise IT Security methodologies
  • Use of security technical controls to detect and alert when anomalies arise, things like firewalls, intrusion systems and anti-ware.
  • The ability to respond to and recover from a cyber incident - this would include the ability to monitor through your corporate data center or security operations center.or that of a third party
  Sponsorships Still Available
Cybersecurity Fundamentals (for the Layperson)
Instructor: TBD
[TBD]
  Sponsorships Still Available
Responsible Automation
Instructor: John C. Checco
Automation (RPA/RDA) is proliferating as it is being used to optimize mundane tasks, cut costs and support Machine Learning and AI applications. Designing for automation is not as simple as record and play, there are several major areas for consideration to create robust but auditable RPAs.
  Checco Services

As part of our educational mission as a coalition of non-profit organizations, registration fees are only to cover the costs of the facility, food and refreshments.

[ Home ]