For State and Local Government Employees
Together We SECURE MO!
October 10, 2024
9:00 A.M. – 4:30 P.M.
Harry S. Truman Building
Conf. Rm 490/492
301 W. High Street
Jefferson City, MO 65101
Registration has closed
SERVING STATE OF MISSOURI CITIZENS THROUGH CYBER SECURITY
Security Infrastructure
Security Operation Center
Risk Management
Cloud Security
Identity Access Management
Agenda
9:00-9:05
Welcome And Housekeeping
Presenter:
9:05-9:20
Leadership Kickoff
Presenter:
9:20-10:05
Keynote – Threat Landscape
Presenter:
10:05-10:15
Break
10:15-11:15
3rd Party Risk Panel Discussion
Presenters:
11:15-12:00
Making the case for more logs
Presenter:
This session will explore some obvious and some less obvious reasons one might employ when making the case for onboarding more logs into your SIEM solution. We will explore some common log onboarding objections and challenges, such as cost and alert fatigue. And we will consider log quality such as field validation, and business context enrichment; to best inform an analyst during a security incident. At the end of the session an attendee should consider that more logs results in greater visibility, which inherently improves the overall security posture.
12:00-1:00
Break For Lunch
1:00-1:45
Building the Six Million Dollar Analyst: Better, Stronger, Faster from Pearl Harbor to Midway
Presenter:
In a world where intelligence analysis can mean the difference between victory and defeat, how do we become “better, stronger, faster”? This session draws on the intelligence failure at Pearl Harbor and the success at Midway to explore the critical importance of rapid and accurate data aggregation and correlation. By examining these historical cases, we will uncover the essential qualities needed to enhance today’s data and intelligence operations, echoing the iconic promise of rebuilding for superior performance. Join us as we discuss how to become equipped to turn fragmented data into decisive action.
1:45-2:30
Maintaining Security in a Business-Driven Data Governance Framework
Presenter:
Historically Data Governance has been all about control. This leads to agencies working to bypass policies and standards to avoid bottlenecks. This session will discuss how to align our data governance to drive business needs while maintaining security.
2:30-2:45
Break
2:45-3:30
Unveiling the Digital Shadows: OSINT Intelligence and Doxing
Presenter:
In today’s interconnected world, the ability to gather and analyze publicly available information, known as Open Source Intelligence (OSINT), has become a crucial skill for various fields including cybersecurity. This presentation will touch on the fundamentals of OSINT, exploring its lifecycle from data collection to actionable insights.
We will also address the darker side of OSINT: doxxing. Doxxing involves the malicious act of publicly revealing private information about an individual, often with the intent to harass or harm. Attendees will learn about the techniques used by threat actors to gather sensitive information, the risks posed by doxxing, and strategies to protect against such threats.
3:30-4:15
Generative AI Friend or Foe?
Presenter:
4:15-4:30
Closing Remarks
Presenter: