Category: Events

June 29th, 2022 by John

CornCon “Quad Cities Cybersecurity Conference” is returning in person on September 30 & October 1, 2022. To be held at RiverCenter convention center in downtown Davenport, Iowa, this year’s conference will include a Thursday CISO summit (TBD), two days full of great speakers, tutorials, villages and expo, as well has K12 activities on both Friday and Saturday. More details can be found on the conference website: https://corncon.net. (note that early bird pricing has been extended to July 15th)

Posted in Community, Cybersecurity & Infosec, Education, Events, Kids

December 11th, 2018 by John

Equifax suffered huge damages after the well-publicized breach. Now, come to find attribution points to a culture of complacency. Executives should attend the The First Annual Atlanta Symposium on Cyber Culture and Team Building with others from their executive team. This event is intended to be cross-cultural and bring together the entire C-Suite. Learn more and register today! 

Posted in Cybersecurity & Infosec, Data Breaches, Events, Law and Regulations, Resiliency

November 7th, 2018 by John

Seeking 12 Innovative AI, Blockchain or IoT Solutions for Agriculture – RSVP by 21 Nov

The IEEE Blockchain for Agriculture Forum is seeking technologists to “wow” the
agriculture industry with Lightning Rounds Sessions at its upcoming “Roadmap to
Adoption” forum which will take place on 28-29 November 2018 in Honolulu, Hawaii.
The objective of this Forum is to design the roadmap to blockchain adoption. The forum
does not focus on why blockchain in combination with AI and IoT is right for the
agriculture value chain, but rather on how we will drive effective adoption of these
technologies. Learn more about the event at: https://blockchain.ieee.org/standards/agriforum18

If you have a POC or solution using IoTs, artificial intelligence, or blockchain that will
help optimize and secure the agriculture value chain while also enhancing consumer
safety and knowledge about the food they eat, then please submit your idea.

LIGHTNING ROUND SESSION FORMAT

• Presentations are limited to 15 minutes
• An overview of the POC or solution with the use of IoT, artificial intelligence (AI)
or blockchain in the agriculture value chain from the seed in the ground to the
food on the table.
• Presentations should be business technical in nature and focus on the
application and solution.

SUBMISSION GUIDELINES

There is no fee to participate. We are accepting 12 submissions based on relevancy
and first-come basis.

Deadline for submissions is Wednesday 21 November 2018. (Proposals received
after this date may be considered if there is still space available for participation.)

Your submission must include a one-page (maximum) synopsis on the POC application,
and the challenge it is trying to solve within the agriculture industry. If you have
available design graphics and whitepapers on your application, please include them in
your submission.

All submissions should be sent to Maria Palombini, forum project leader,
m.palombini@ieee.org.

Presenters will be notified of acceptance within 48 hours. Accepted submissions will
include full complimentary registration to the Forum.

Posted in AI & Machine Learning, Autonomous Vehicles, Blockchain, Events, IoT, IIoT, ICS-SCADA

October 16th, 2018 by John

I would like to encourage colleagues to join me for two exciting upcoming webinars, from Cybersecurity Collaborative:

  1. CISO Perspective – 36 Years in Information Security (RSVP)
    Howard Israel, CSO On-Demand, FireEye, Thursday, October 25th at 1pm ET. 
    Howard has an extensive cybersecurity background working with a range of organizations and industries such as the NSA, Telecom, Pharmaceutical, Finance and Consulting, from the product side, to the enterprise protection side. In this discussion, he will use his insights from these arenas to help strengthen you and your organization. Lastly, he will test your reaction IQ with real-life examples where Information Security was put to the test.
  2. Learn More About The Cybersecurity Collaborative and Why You Want to Join Us! (RSVP)
    Founding Members Discussion, Thursday, October 25th at 2:30pm ET.
    Learn why Cybersecurity Collaborative founders formed the organization and the actionable information they get from it on a daily basis. Ask questions about membership tiers, how you can benefit as a member and what sets this organization apart from others. Learn about the new Community Membership tier for smaller IT teams at a much smaller price point.

I met with Stuart Cohen (CEO) in September and I asked him to put together this founding member discussion webinar, because I believe in the mission and value of Cybersecurity Collaborative, and because colleagues have asked about the value proposition.

Why pay to be a member of a group, when you are already a member of other information sharing groups? Please join us on October 25th, and I think you will understand why I am a strong supporter. This group goes beyond a social network. You control what gets shared, you have access to member contact information, you decide what the roadmap should be, not a security vendor and not a logistics company like Gartner/CEB who want to sell to you or resell your intellectual property.

Founding members like Marc Varner, Steve Young, Tim Callahan, John Bingham, Malcolm Harkins and Jim O’Conner formed Cybersecurity Collaborative. One primary goal was to have this community be a  safe and secure, vendor-free/press-free enclave. These industry security leaders realized that they needed to deliver high quality and actionable content by CISO members, for CISO members.

Learn about the principles on which the Cybersecurity Collaborative is based.

Cybersecurity Collaborative Mission:

• Powered by passion to improve all CISOs
• A safe haven for all of our data
• A source of strength for the Cybersecurity community
• A confidential place where organizations can share skills and experiences
• A catalyst for peers of CISOs working with their peers in the community

The Collaborative is different from other organizations I have been a part of (Security Advisor Alliance, Gartner, CEB, FS-ISAC…) because members decide what is important and actively develop content that will immediately be valuable and actionable to other members. It actually executes on this, in a very intentional way. The CISO will not be the only individual to participate at an organization, while they are the point of contact and corporate member, they have the ability to delegate to team members who are subject matter experts when developing policies, playbooks and reports as a part of special Collaborative Task Forces, which the members will form to solve problems and address industry, technology and regulatory changes.

Cybersecurity Collaborative Deliverables:

• Public topical webinars
• Special member-only webinars
• Task forces to address industry, technology and regulatory changes led by SMEs
• Daily intelligence briefings
• Complementary Cybrary Training for you and your team
• Annual Meeting free and open to members and non-members
  Nov 7-8, 2018, Irvine CA (RSVP) Read More

Posted in Community, Cybersecurity & Infosec, Events, Presentations & Webinars

September 11th, 2018 by John

//cdn.iframe.ly/embed.js

 

Posted in Community, Cybersecurity & Infosec, Events, Hacking & Pen Testing, Kids

August 14th, 2018 by John

//cdn.iframe.ly/embed.js

 

Posted in Events, Exploits & Attacks, Hacking & Pen Testing

August 7th, 2018 by John

Black Hat Review Board Members give their picks for must see presentations this week at Black Hat USA 2018. They have broken down the 2018 cybersecurity exploit trends into 6 categories:

  1. Software Development
    1. Breaking Parser Logic, Lagoon JKL, WED 4PM
    2. AI & ML in Cybersecurity: Why Algorithms Are Dangerous, South Seas ABE, THU 11AM

    Policy

    1. Legal Liability for IoT Hacking, Lagoon JKL, THU 2:30PM

    Network Defenses

    1. ZEROing Trust: Do Zero Trust Models Provide Real Security, South Seas CDF, WED 4PM

    Hardware Platform Security

    1. Meltdown: Basics, Details, Consequences, South Pacific F, WED 2:40PM
    2. GOD Mode Unlocked: Hardware Backdoors in x86 CPUs, South Pacific F, THU 11AM

    Web Application Security

    1. Practical Web Cache Poisoning: Redefining ‘Unexploitable’, South Seas CDF, THU 3PM

    Human Factor

    1. Infosec Philosophies for a Corrupt Economy, Islander EI, WED 5:05PM
    2. Demystifying PTSD in the Cybersecurity Environment, South Seas ABE, THU 9AM

    For more details, visit the Black Hat Briefings 2018 agenda here: https://www.blackhat.com/us-18/briefings.html

Posted in Events, Exploits & Attacks, Hacking & Pen Testing, Presentations & Webinars

June 4th, 2018 by John

CornCon Kids’ Hacker Camp was held on May 19, 2018 at St. Ambrose University. Over 40 kids of all ages showed up for the event, which included electronics, games, coding, lockpicking and the tools and methods of hackers and the importance of the ethical ‘white hat’ use and protection of technology. For photos from the May 19 event, visit: https://www.flickr.com/photos/nullsession/albums/72157697084279585

This is the first mid-year hacker camp held for The Children of the CornCon, which is run alongside the CornCon (Quad Cities Cybersecurity Conference) each Fall. On September 8, 2018, the fourth annual CornCon conference will be held at SAU Rogalski Center for both kids and adults, with world-class speakers, vendors, an expanded hacker village and competitions. For more information, and to register, visit www.corncon.net.

Posted in Community, Events, Kids