Event Calendar

Sep
20
Fri
iSymposium On Data Security & Privacy @ Adobe Systems
Sep 20 – Sep 21 all-day

The multi-page agenda flyer and speaker bios is 2013_i-symposium_agenda.

8:00 Check‐in, Breakfast

8:30 Welcome: Wade Sherman, VP – Lead Counsel, Digital Marketing, Adobe Systems

8:35 Keynote: CFAA: A Failed Experiment, Eric Goldman, Law Professor, Director, High Tech
Law Institute

9:30 Networking Break

10:00 Breakout: Suggestions for Accessible Documents, Hon. David Nuffer, U.S. District Court,
District of Utah

Breakout: The Surveillance State: From 9/11 to Snowden, Ben Stanley, Attorney,
TechLaw Ventures.

Breakout: Are Employees’ Smart Phones Safe Enough for Business? Scott Blackmer,
Founding Partner, InfoLawGroup LLP

11:00 Networking Break

11:15 Breakout: Exchanging Medical Records Online, Scott Rea, VP GOV/EDU Relations & Sr.
PKI Architect, Digicert

Breakout: EU Data Privacy Directive: Past, Present and Future. Lee Wright, Shareholder
Kirton & Mckonkie; Julie Park, Privacy Officer, Corp. of the Presiding Bishop

Breakout: Ethics CLE, The Cybersecurity Implications of Utah Rule of Professional
Responsibility 1.6: The Standard of Due Care Has Emerged, Matt Sorensen, TechLaw
Ventures

12:15 Lunch and State of the Net, Ben Holt, Attorney, Kilpatrick, Townsend & Stockton

12:30 Presentation of Utah Tech Pioneer Award

12:40 Lunch Keynote: Fast Failure, James Clarke, CEO & Managing Partner, Clarke Capital
Partners

1:30 Networking Break

1:45 Breakout: Getting More Security For Less with Managed Security Services, Eli J.
Martinez, IT Security Risk Manager, Corp. of the Presiding Bishop; Commander, Utah Air
National Guard

Breakout: Who Owns the Customer? James Harrison, CEO and Founder,
okcompare.com

Breakout: CLS Bank Decision, William B. Bunker, Partner, Knobbe Martens

2:45 Networking Break

3:00 Breakout: Consumer Privacy Communications – Practical Strategies for Educating
Consumers by Drafting Effective Policy Statements Across Digital Platforms, Panel,
Sharon Bertelsen, Of Counsel, Ballard Spahr, Mercedes Tunstall, Partner, Ballard Spahr

Breakout: Cloud Security and Managing Use Risks, Carl Allen, Director Information
Security, Intermountain Healthcare

Breakout: Individual Efforts to Maximize Privacy and Security of Data in an era of
Cyberstalking and NSA Surveillance. Charles L. Mudd Jr. Mudd Law Offices

4:00 After Conference Social

Sep
16
Tue
CounterIntel Conference and Intel Analyst Training @ The Chateaux Deer Valley
Sep 16 – Sep 18 all-day

Conference, September 16th
Keynote – Mark Weatherford, Principal, The Chertoff Group
Why Targeted ICS Threats Call for Intelligence? – Michael Assante, Director, ICS & SCADA, SANS Institute
Counterintelligence: A Seat At The Table – Ray Batvinis, Professor, The George Washington Unviersity, FBI Supervisory Special Agent (Ret.)

Why Building An Intelligence Team Is Important For Critical Infrastructure Asset Owners – Kristan Wheaton, Associate Professor of Intelligence Studies, Mercyhurst University

Situation Awareness: From Zero To Sector Scale – Ben Miller, Senior Cyber Security Specialist, ES-ISAC
Building Intelligence Infrastructure To Protect Your Critical Infrastructure – Meredith Wilson, Principal Consultant and Advisor, Emergent Risk International

Developing An Internal Threat Intelligence Function – Darin Olton, Principal, Threat & Vulnerability Management

Intel Analyst training, September 17th and 18th:

  • Understanding the intelligence challenge for critical infrastructure
    • Real time risk management
    • Cyber defense competency model
  • Intelligence and Situational Awareness
    • Situational awareness and intelligence requirements generation and gap analysis
    • Situational awareness and threat intelligence tools
    • Using OSINT tools to satisfy intelligence requirements
    • Getting inside the OODA loop
  • Attack Planning and Targeting
    • Attacker characterization
    • Threat identification
    • High value target identification
    • OSINT targeting
    • Targeting countermeasures
  • Creating and Using Situational Awareness and Threat Intelligence
    • Attack scenario generation
    • Indicator list development
    • Review of intelligence management tools
    • Analyzing and actioning incoming intelligence
    • Review of cyber intelligence providers
    • Development of an internal security ontology
  • Industrial Control Systems Cyber Threat Environment
    • OSINT analysis using ICS knowledge
    • OSINT walk-down for ICS-related threat information
  • Information Sharing
    • Comparison of information received through info-sharing organizations/initiatives
    • Infrastructure I&A Competition