Event Calendar

Sep
20
Fri
iSymposium On Data Security & Privacy @ Adobe Systems
Sep 20 – Sep 21 all-day

The multi-page agenda flyer and speaker bios is 2013_i-symposium_agenda.

8:00 Check‐in, Breakfast

8:30 Welcome: Wade Sherman, VP – Lead Counsel, Digital Marketing, Adobe Systems

8:35 Keynote: CFAA: A Failed Experiment, Eric Goldman, Law Professor, Director, High Tech
Law Institute

9:30 Networking Break

10:00 Breakout: Suggestions for Accessible Documents, Hon. David Nuffer, U.S. District Court,
District of Utah

Breakout: The Surveillance State: From 9/11 to Snowden, Ben Stanley, Attorney,
TechLaw Ventures.

Breakout: Are Employees’ Smart Phones Safe Enough for Business? Scott Blackmer,
Founding Partner, InfoLawGroup LLP

11:00 Networking Break

11:15 Breakout: Exchanging Medical Records Online, Scott Rea, VP GOV/EDU Relations & Sr.
PKI Architect, Digicert

Breakout: EU Data Privacy Directive: Past, Present and Future. Lee Wright, Shareholder
Kirton & Mckonkie; Julie Park, Privacy Officer, Corp. of the Presiding Bishop

Breakout: Ethics CLE, The Cybersecurity Implications of Utah Rule of Professional
Responsibility 1.6: The Standard of Due Care Has Emerged, Matt Sorensen, TechLaw
Ventures

12:15 Lunch and State of the Net, Ben Holt, Attorney, Kilpatrick, Townsend & Stockton

12:30 Presentation of Utah Tech Pioneer Award

12:40 Lunch Keynote: Fast Failure, James Clarke, CEO & Managing Partner, Clarke Capital
Partners

1:30 Networking Break

1:45 Breakout: Getting More Security For Less with Managed Security Services, Eli J.
Martinez, IT Security Risk Manager, Corp. of the Presiding Bishop; Commander, Utah Air
National Guard

Breakout: Who Owns the Customer? James Harrison, CEO and Founder,
okcompare.com

Breakout: CLS Bank Decision, William B. Bunker, Partner, Knobbe Martens

2:45 Networking Break

3:00 Breakout: Consumer Privacy Communications – Practical Strategies for Educating
Consumers by Drafting Effective Policy Statements Across Digital Platforms, Panel,
Sharon Bertelsen, Of Counsel, Ballard Spahr, Mercedes Tunstall, Partner, Ballard Spahr

Breakout: Cloud Security and Managing Use Risks, Carl Allen, Director Information
Security, Intermountain Healthcare

Breakout: Individual Efforts to Maximize Privacy and Security of Data in an era of
Cyberstalking and NSA Surveillance. Charles L. Mudd Jr. Mudd Law Offices

4:00 After Conference Social

Nov
13
Wed
PFIC 2013 @ Snowbird
Nov 13 – Nov 16 all-day
PFIC 2013 @ Snowbird

Paraben’s PFIC Conference has been an annual event since 2008. Since that time it has rapidly evolved into a higher attended conference with a broader scope of topics reaching from deeply technical into the legal aspects of the forensics and eDiscovery industry. Those who attend PFIC are as diverse as our topics, from law enforcement and lawyers, to corporate entities, government agents, private investigators, and educational institutions. If you haven’t had the opportunity to attend, this is your chance to experience the fresh air and mountains of Utah as well as the fresh topics that will be the highlight of this year’s conference. If you’ve already attended, then you know what to expect and are as excited as we are about it!

Sep
16
Tue
CounterIntel Conference and Intel Analyst Training @ The Chateaux Deer Valley
Sep 16 – Sep 18 all-day

Conference, September 16th
Keynote – Mark Weatherford, Principal, The Chertoff Group
Why Targeted ICS Threats Call for Intelligence? – Michael Assante, Director, ICS & SCADA, SANS Institute
Counterintelligence: A Seat At The Table – Ray Batvinis, Professor, The George Washington Unviersity, FBI Supervisory Special Agent (Ret.)

Why Building An Intelligence Team Is Important For Critical Infrastructure Asset Owners – Kristan Wheaton, Associate Professor of Intelligence Studies, Mercyhurst University

Situation Awareness: From Zero To Sector Scale – Ben Miller, Senior Cyber Security Specialist, ES-ISAC
Building Intelligence Infrastructure To Protect Your Critical Infrastructure – Meredith Wilson, Principal Consultant and Advisor, Emergent Risk International

Developing An Internal Threat Intelligence Function – Darin Olton, Principal, Threat & Vulnerability Management

Intel Analyst training, September 17th and 18th:

  • Understanding the intelligence challenge for critical infrastructure
    • Real time risk management
    • Cyber defense competency model
  • Intelligence and Situational Awareness
    • Situational awareness and intelligence requirements generation and gap analysis
    • Situational awareness and threat intelligence tools
    • Using OSINT tools to satisfy intelligence requirements
    • Getting inside the OODA loop
  • Attack Planning and Targeting
    • Attacker characterization
    • Threat identification
    • High value target identification
    • OSINT targeting
    • Targeting countermeasures
  • Creating and Using Situational Awareness and Threat Intelligence
    • Attack scenario generation
    • Indicator list development
    • Review of intelligence management tools
    • Analyzing and actioning incoming intelligence
    • Review of cyber intelligence providers
    • Development of an internal security ontology
  • Industrial Control Systems Cyber Threat Environment
    • OSINT analysis using ICS knowledge
    • OSINT walk-down for ICS-related threat information
  • Information Sharing
    • Comparison of information received through info-sharing organizations/initiatives
    • Infrastructure I&A Competition