Keynote | Major General Lee E. Tafanelli

MG Lee Tafanelli.jpg

Major General Lee E. Tafanelli

The Adjutant General of Kansas

The Wichita Cyber Security Forum keynote is Major General Lee E. Tafanelli


Major General Lee E. Tafanelli was appointed The Adjutant General of Kansas on 8 January 2011.


As The Adjutant General, he oversees the activities of the Adjutant General’s Department providing personnel administration and training guidance for over 7,000 soldiers and airmen in the Kansas Army and Air National Guard as well as leadership to the full-time National Guard and State employees of the Adjutant General’s Department. He directs the Kansas Division of Emergency Management responsible for leading a core group of professionals tasked with preparing for and responding to emergency situations within the state of Kansas. This includes guidance and training to 105 county emergency managers and their staffs. As the Kansas Director of Homeland Security, Major General Tafanelli ensures security in the state is a top priority.


Major General Tafanelli has commanded at the Company, Battalion, Brigade, and State level with additional assignments in personnel, logistics, finance, mobilization readiness, and operations. During his career in the Kansas Army National Guard, Major General Tafanelli has been assigned to the 891st Engineer Battalion, 174th Service Support Battalion, 69th Troop Command, Headquarters Department of the Army and numerous assignments in the State Headquarters of the Kansas National Guard. During OPERATION IRAQI FREEDOM III, Major General Tafanelli commanded the 891st Combat Engineer Battalion in Iraq.

Prior to his appointment as Adjutant General, Major General Tafanelli was assigned as the Assistant Adjutant General and Commander, Land Component, Kansas Army National Guard. In addition, he served in the Kansas House of Representatives representing the 47th district from 2001-2011.

Major General Tafanelli received his commission from Pittsburg State University, Army Reserve Officer Training Corps on 17 December 1982 and holds master’s degrees from Kansas State University and the Army War College.

Speaker Spotlight | Dr. Randall K. Nichols, DTM

Randall Nichols.jpg

Professor Randall K Nichols

Kansas State University Polytechnic

 

Randall K Nichols

Randall K. Nichols, DTM, Associate Professor of Practice, Unmanned Aircraft Systems (UAS) - Cybersecurity, Kansas State University Polytechnic Campus & Professor Emeritus - Cybersecurity, Utica College. Nichols is internationally respected with experience in leadership roles in cryptography, counter-intelligence, INFOSEC, and sensitive computer applications and many published works focused on cybersecurity.

Master of Science, Chemical Engineering, Texas A & M, Kingsville, Texas, May 1991

Master of Business, Operations Research, University of Houston, Houston, Texas, August 1970

Bachelor of Science, Chemical Engineering, Tulane University, New Orleans, Louisiana, May 1967

 

Professional Speaking and Leadership Award

Distinguished Toastmaster (DTM), Toastmasters International, July 12, 2016. Awarded to only < 1% of Toastmasters Internationally.

Professional Teaching Experience

Associate Professor of Practice, UAS – Cybersecurity, Kansas State University Polytechnic Campus, Salina, Kansas, August 13, 2017 to Present.

Adjunct Faculty, UAS – Cybersecurity, Kansas State University Polytechnic Campus, Salina, Kansas, June 8, 2015 – August 13, 2017.

Professor Emeritus –Cybersecurity, Utica College, Utica, New York, Nominated October 17, 2014, Approved by President Todd Hutton and Board of Trustees on June 19, 2015.

Professor of Practice – Cybersecurity, Utica College, Utica, New York, March 2011 to June 2014.

Associate Professor, Utica College, Utica, New York, August 2006 to March 2011.

Professorial Lecturer, Towson University, Towson, Maryland, May 2005 to December 2006

Adjunct Professor, University of Maryland University College, College Park, Maryland, January 2004 to August 2005

Adjunct Professor, George Washington University, Washington, DC, June 1999 to December 2004

 

Managerial and Non-Teaching Experience

Chief Operating Officer, INFOSEC Technologies, LLC, Counter-Terrorism / Counter – Espionage, Information Assurance Firm, Carlisle, Pennsylvania, September 2001 to August 2006. Firm supported approximately 1700 government, corporate, and academic clients.

Vice President and Division Manager, TeleHublink Corporation, Advanced Embedded / Wireless Cryptographic Research, Andover, Massachusetts, March 2000 to September 2001

Chief Executive Officer, COMSEC Solutions, LLC, Cryptographic /Anti-Virus / Biometrics Countermeasures Firm, Carlisle, Pennsylvania, June 1998 to March 2000 [COMSEC Solutions, LLC was acquired by public firm in March 2000]

Technical Director for Cryptography and Biometrics, International Computer Security Association, Carlisle, Pennsylvania, October 1997 to June 1998

Alumina and Bauxite Raw Materials Division Superintendent, Reynolds Metals Company, Corpus Christi, Texas, September 1983 to October 1997

Senior Engineering Manager – Computer Applications and Information Security, United States Borax and Chemical Corporation, Boron, California, October 1977 to August 1983

 

Scholarly Accomplishments

Book for potential publication 2018

Editor / Author of new textbook entitled: Unmanned Aircraft Systems (UAS) In the Cyber Domain: Protecting USA’s Advanced Air Assets, for potential publication 2018, Copyright 2016-2018, All Rights Reserved. (Collaborators established /Work / Research in progress)

 

Books Published (6) – Subject Matter Expert (SME)

Nichols, R.K. & Lekkas, P. (2002) Wireless Security: Models, Threats, Solutions. New York: McGraw-Hill.

Nichols, R.K, Ryan, D. & Ryan, J. (2000) Defending Your Digital Assets Against Hackers, Crackers, Spies and Thieves. New York: McGraw-Hill.

Nichols, R K. (1998) the ICSA Guide to Cryptography. New York: McGraw-Hill.

Nichols, R.K. (1996) Classical Cryptography Course Volume II. Laguna Hills, California: Aegean Park Press.

Nichols, R.K. (1995) Classical Cryptography Course Volume I. Laguna Hills, California: Aegean Park Press.

Nichols, R.K. (1991) The Corporate Aluminum Model, Texas A & M University- Kingsville Press, Kingsville, TX.

Peer- Reviewed Publications

Nichols, R. K. (2006) Handbook of Information Security. Hossein Bidgoli, Editor in Chief. Chapter 74: Wireless Information Warfare in Volume II: Information Warfare: Social, Legal and International Issues; and Security Foundations. Hoboken, New Jersey: Wiley.

Nichols, R.K. & Serth, R. (March 1992) the Corporate Aluminum Model: A GAMS-Based Model for Optimal Long-Range Planning and Investment Analysis by Aluminum Companies in TMS Light Metals Journal Alumina and Bauxite Ii. TMS: San Diego, California.

Nichols, R.K. & Thatcher, C. (March 1991) the Reynolds Powerhouse Optimization Computer Model in TMS Light Metals Journal Alumina and Bauxite Ii. TMS: San Diego, California.

Speaking

Dr. Nichols will be presenting DRONE WARS: Threats, Vulnerabilities and Hostile Use of Unmanned Aircraft Systems (UAS) and Small UAS (sUAS) from 3:00 - 3:45 pm on October 4, 2017 at the Cyber Security Forum in Wichita, Kansas.

 

Speaker Spotlight | Dr. Janet Twomey

janet twomey cyber security forum.gif

Dr. Janet Twomey

 

Wichita State University

Dr. Janet Twomey is currently the Associate Dean for Graduate Education, Research and Faculty Success in the College of Engineering at Wichita State University in Wichita, Kansas, USA.  She is also a Professor of Industrial, Systems, and Manufacturing Engineering. 

Dr. Twomey holds a Ph.D., M.S. and B.S. from the University of Pittsburgh, Pittsburgh, PA, in Industrial Engineering.  She also holds a BA in Sociology from Duquesne University in Pittsburgh, PA.  Her areas of expertise are in sustainable engineered systems, environmental life cycle analysis, and machine learning.

She received a National Science Foundation (NSF) Faculty Early CAREER award for her work in neural networks and sparse data sets.  Dr. Twomey’s research funding totals over $5 mil.  The majority of which has come from NSF and the Department of Energy for work in sustainable manufacturing, green wind energy, and sustainable healthcare. 

Dr. Twomey has co-authored over 70 peer reviewed journal articles and conference proceedings. 

She was a Program Officer for Manufacturing Enterprise Systems at the National Science Foundation from 2001 to 2004.  In 1999 she was an A.D. Welliver Boeing Faculty Summer Fellow. Currently she is the Academic Vice President for Board of Trustees, Institute of Industrial Engineering. Prior to obtaining a PhD in engineering, Dr. Twomey worked for a number of years in psychiatric research at the University of Pittsburgh’s School of Medicine.

Dr. Twomey serves as a member of the Cyber Security Forum committee and will serve as a moderator for the panel "Wearables and Critical Infrastructure Research" from 2:00 - 2:45 pm on October 4, 2017 at the Cyber Security Forum, WSU Hughes Metroplex, Wichita, Kansas.

 

Ransomware Q & A

Attendees will have an opportunity to ask questions of field experts following a live ransomware attack. 

Moderator: Sam Alva, Director of Operations, TriCorps Security

Panelists: Benjamin Roe, Senior Red Team Penetration Tester, Booz Allen Hamilton; Tristan Fries, Flight Commander, CyberSpace Operations, 177th Information Aggressor Squadron, Kansas Air National Guard

Sam Alva

Sam Alva is the Regional Director of Operations for TriCorps Security. TriCorps Security performs multi-million dollar security projects including surveillance (CCTV), access control and IDS Systems as well as covert and overt risk and security assessments. Prior to his current role, Sam founded 3Delta Security in Wichita, Kansas. 3Delta provided security consultation and training to businesses in the Midwest. This small business grew rapidly and was acquired by TriCorps. It operates today and TriCorps Security – a sister company to TriCorps Cybersecurity.

Sam’s background includes 10 years of service in the United State Air Force as a Cyber Security Manager where he conducted numerous risk and security assessments for US Government and Department of Defense installations in various environments around the globe. He developed a unique and extensive skill set bridging the gap between cyber and physical security. Sam has a Master of Science in Security Administration from Southwestern College.

Benjamin Roe

Benjamin Roe is a senior red team penetration tester at Booz Allen Hamilton, and serves in this role as a contractor with the 177 Information Aggressor Squadron at McConnell AFB. In his full-time job, he participates in red team vulnerability assessments of U.S. Department of Defense assets and networks. Ben is a specialist in ransomware, having developed ransomware detection and mitigation strategies and techniques for his previous employer, and created custom ransomware for use in red team assessments with his current employer. He has a Bachelor’s degree in Information Assurance from Fort Hays State University and holds several industry certifications including Security+ and GCIA.

 

Tristan Fries

Tristan Fries, Flight Commander, CyberSpace Operations, 177th Information Aggressor Squadron, Kansas Air National Guard

 

Register Today

 

How to Ask the Right Questions to Select the Right Security Vendors

The purpose of this session is to provide small businesses with information on how to identify what security products and services they need to protect their facility and personal. The goal is to educate small businesses to empower them to ask the proper questions so that they receive the correct security equipment and services to protect their assets.

Topics include:

1.       Small business security self-assessment (What do I need vs what are my vulnerabilities?)

2.       Self-monitoring vs Monitoring (cost vs effectiveness)

3.       How to pick the right surveillance system 

4.       Smart business technology

 

Presenter: Sam Alva, Director of Operations, TriCorps Security

 

Sam Alva

Sam Alva is the Regional Director of Operations for TriCorps Security. TriCorps Security performs multi-million dollar security projects including surveillance (CCTV), access control and IDS Systems as well as covert and overt risk and security assessments. Prior to his current role, Sam founded 3Delta Security in Wichita, Kansas. 3Delta provided security consultation and training to businesses in the Midwest. This small business grew rapidly and was acquired by TriCorps. It operates today and TriCorps Security – a sister company to TriCorps Cybersecurity.

 

Sam’s background includes 10 years of service in the United State Air Force as a Cyber Security Manager where he conducted numerous risk and security assessments for US Government and Department of Defense installations in various environments around the globe. He developed a unique and extensive skill set bridging the gap between cyber and physical security. Sam has a Master of Science in Security Administration from Southwestern College.

 

Register today

Food Trucks

Food Trucks at the Cyber Security Forum

To provide you with some fun alternatives for lunch and keep event costs low, three food trucks will be located outside the event in the Metroplex parking lot. Most meals run to serve lunch for our event.

Please note that lunch is on your own. You can expect to spend $10 - $15 for lunch. 

Uno Mas | Uno Mas is a premier gourmet food truck serving fresh and delicious Mexican Antojitos “Street Cravings” with a modern twist.

Uno Mas reviews

Uno Mas menu

LoLo's Crepes | First Crepes specialty shop in Wichita, KS that provides variety of French/Japanese style crepes.

LoLo's Crepes reviews

LoLo's Crepes menu

The Kamayan Truck | {Ka-ma-yan} to eat with your hands. Our Kamayan Truck is an Asian inspired street food vendor with a rustic influence all around the world.

Kamayan reviews

Kamayan menu

 

Cyber Networking Event

Join us to continue the conversation at the Wichita Cyber Security Forum: Cyber Networking Event at the Wichita State Experiential Engineering Building. Learn more about this new addition to the Wichita State campus here (pdf) and here (Kansas.com article).

Interim Kansas Secretary of Commerce Nick Jordan will be kicking off the evening's event at 4:30pm. 

WHO: Everyone that attends the Wichita Cyber Security Forum is invited to the evening event. We encourage students, educators, and business professionals to attend.

Students, this is a great opportunity to connect with future employers. 

Employers, this is a great opportunity to connect with educators and students.

Business professionals, this is a great opportunity to connect with future employees and experts in the field.

Forum vendors and scholarship supporters, this is a great opportunity to network with all attendees.

WHEN: Immediately following the Wichita Cyber Security Forum. You must register for the forum to attend the networking event. You are not required to attend the day time event, but you are required to register to have access to the evening event. 

WHERE: Wichita State Experiential Engineering Building

You Can Pay Me Now or Pay Me Later

One of the many reasons I'm excited about our upcoming #cybersecurity conference #KSCyberForum.

 

Here are some comments from one of our speakers and panelists

@BrettEisenman

 

"I believe the Equifax breach illustrates that no matter how large or small, you can pay me now or pay me later. Information Security is not always free, but the results of even a minor breach can spell certain disaster to the financial health of any organization. There seems to be an attitude of apathy as well as a huge failure to manage and implement best practices in businesses large and small. We cannot assume as business owners/managers that our data is not at risk. We must assume a pro-active, defensive posture to minimize our risks. We must invest in security before it is needed, not after it’s too late.

 

Butler County (http://ksn.com/2017/09/11/ransomware-attack-hits-butler-county-computer-network/) is dealing right now with a Ransomware issue. Again, when the dust settles it will come down to a lack of resources, lack of training/education, lack of investment, lack of testing/preparation, or a combination of these elements that resulted in loss of information.

 

Currently much of the Texas, Florida, and eastern seaboard is dealing with major catastrophes. Many companies will not survive because they didn’t have basic disaster recovery processes in place. Data security can no longer be an afterthought in our “connected” society. We must all learn and implement strategies necessary to protect our information starting with the very foundation of best security practice."

 

Brett Eisenman | Department Chair | Cyber Security, Networking Management 

Butler Community College

 

Brett will be speaking on 

Top 5 Economic Ways to Protect Your Business

Threats Facing Small Business

Brett will be a panelist on 

Wichita Area Cyber Education Programs

 

Register for the Cyber Security Forum today.

 

Cyber Security Education Opportunities

Want to become a cyber security professional?  Enroll in classes at local colleges. In this session you will learn about the variety of cyber security educational opportunities in the Wichita area. 

Moderator: John Watkins, Professor and Chair, Department of Electrical Engineering and Computer Science, Wichita State University

Panelists: Kevin Lann-Teubner, Butler Community College, Jonathan Lanning, Friends University, Matt Forney, Ennovar at Wichita State University

Learn more

Wichita State University Cybersecurity programs

Butler Community College Cyber Security & Internetworking Management

Friends University Master of Science In Cyber Security (MSCS) 

Ennovar at Wichita State University

John Watkins

John Watkins, Professor and Chair, Department of Electrical Engineering and Computer Science, Wichita State University holds a B.S. in Electrical Engineering, University of Nebraska, M.S. in Electrical Engineering, The Ohio State University, and Ph.D. in Electrical Engineering, The Ohio State University

His research interests includes: Robust Control, Fault Detection and Isolation, Active Magnetic Bearings, Networked Control Systems, Time-Delay Systems, and Spacecraft Dynamics and Control.

Kevin Lann-Teubner

Kevin Lann-Teubner is an Assistant Professor - Computer Information Technology and Department Chair – Networking Management at Bulter Community College – STEM division.

 

Jonathan Lanning

Jonathan Lanning, Assistant Professor at Friends University is responsible for the Cyber Security program in the College of Graduate & Professional Studies. Jonathan provides program oversight and management for Master of Science in Cyber Security curriculum and courseware.  Highly skilled in Incident Response (GCIH), Cyber Threat Hunting (GCFA), Information / Computer & Network Security (GSEC), Government, Intelligence, Operational Planning, and Command & Control. Strong engineering professional with a Master of Science (M.S.) focused in Security Administration from Southwestern College.

Jonathan is also a Cyberspace Operations Officer with the Kansas Air National Guard. Jonathan previously served in our United States Air Force as a Defensive Cyberspace Operations Strategy Planner for the 624th Operations Center (AFCYBER), Chief of Operations Scheduling and Planning as well as a Flight Commander leading Intrusion Prevention and Response Flight and Mission Assurance Networks for the Air Force Computer Emergency Response Team (AFCERT).

Matt Forney

Matt Forney is the Co-Founder and Executive Director of Technology of Ennovar Technologies located on the campus of Wichita State University. He is recognized as an "out of the box" thinker with the ability to define and manage global strategies; ability to develop and hire high-end talent to collaborate and negotiate solutions with key investors/partners; analytical problem solver with the ability to drive strategic projects, deadlines, and financial goals; life-long learner, published and community speaker.  Matt is currently serving is seventh year on the Andover School Board.

 

Register for the Cyber Security Forum today.

Research in Securing Internet of Things (IoT): Wearable Devices and Cyber Physical Systems

By connecting everyday devices to the Internet, the IoT has enabled new applications, and improved existing ones. However, to enjoy the benefits of the IoT, users may need to allow remote monitoring and control of their devices, which raises serious privacy and security concerns. The IoT poses multifaceted challenges for security due to the variety and heterogeneity of connected devices: voice controls for home stereo systems, automobiles, digital factories, home health monitoring systems.  In this session research in securing connected wearable devices and cyber physical systems will be discussed by two faculty from the Electrical and Computer Science Department at Wichita State University.  Faculty acknowledge the support from the National Science Foundation and Wichita State University.

Moderator:  Janet Twomey, PhD, Associate Dean for Graduate Education, Research and Faculty Success in the College of Engineering at Wichita State University

Presenters: Dr. Murtuza Jadliwala, Assistant Professor in the Electrical Engineering and Computer Science Department at Wichita State University; Dr. Sergio Salinas, Assistant Professor in the Department of Electrical Engineering and Computer Science, Wichita State University

Dr. Janet Twomey

Dr. Janet Twomey is currently the Associate Dean for Graduate Education, Research and Faculty Success in the College of Engineering at Wichita State University in Wichita, Kansas, USA.  She is also a Professor of Industrial, Systems, and Manufacturing Engineering.  Dr. Twomey holds a Ph.D., M.S. and B.S. from the University of Pittsburgh, Pittsburgh, PA, in Industrial Engineering.  She also holds a BA in Sociology from Duquesne University in Pittsburgh, PA.  Her areas of expertise are in sustainable engineered systems, environmental life cycle analysis, and machine learning. She received a National Science Foundation (NSF) Faculty Early CAREER award for her work in neural networks and sparse data sets.  Dr. Twomey’s research funding totals over $5 mil.  The majority of which has come from NSF and the Department of Energy for work in sustainable manufacturing, green wind energy, and sustainable healthcare.  Dr. Twomey has co-authored over 70 peer reviewed journal articles and conference proceedings.  She was a Program Officer for Manufacturing Enterprise Systems at the National Science Foundation from 2001 to 2004.  In 1999 she was an A.D. Welliver Boeing Faculty Summer Fellow. Currently she is the Academic Vice President for Board of Trustees, Institute of Industrial Engineering. Prior to obtaining a PhD in engineering, Dr. Twomey worked for a number of years in psychiatric research at the University of Pittsburgh’s School of Medicine.

Dr. Murtuza Jadliwala

Dr. Murtuza Jadliwala is currently an Assistant Professor in the Electrical Engineering and Computer Science Department at Wichita State University where he directs the Security, Privacy, Trust and Ethics in Computing (SPriTE) Research Lab. Prior to that he was a Research Fellow with the Laboratory for computer Communications and Applications (LCA1) at the Swiss Federal Institute of Technology, Lausanne (EPFL). He obtained his Doctoral (Ph.D.) and Masters (M.S.) degree in Computer Science from the University at Buffalo, State University of New York in September 2008 and June 2004, respectively. His research interests are broadly in the area of systems and network security & privacy, where he is currently investigating security and user privacy threats in human-centered and mobile cyber-physical systems, such as wearable devices, and in socio-technical systems, such as online social networking and crowd-sourcing services (including, participatory sensing systems). His research is funded by the NSF, AFOSR and AFRL – Information Institute. He was selected as an AFOSR Summer Faculty Fellow in 2015.

 

Dr. Sergio Salinas

Dr. Sergio Salinas received the BS degree in Telecommunications Engineering from Jackson State University, Jackson, MS in 2010, and the PhD degree in Electrical and Computer Engineering from Mississippi State University, Starkville, MS, in 2015. He is currently an Assistant Professor in the Department of Electrical Engineering and Computer Science, Wichita State University, Wichita, KS. His research interests include security and privacy in cyberphysical systems (e.g., advanced manufacturing systems, power systems, etc.); cloud computing; and big data. He is a member of the IEEE and the ACM.

 

Register for the Cyber Security Forum today.

Sponsor Highlight | Ennovar Technology Solutions

Why does Ennovar Technology Solutions support the Wichita Cyber Security Forum?

“The Cyber Security Forum is an opportunity for higher education to be involved with the local business community and federal government to define a major footprint in this geographical area.
I believe it is extremely important for businesses and academia to join forces and communicate, understand and share knowledge around cybersecurity. This type of collaboration is priceless and best done in a forum where each area in their own expertise can meet face-to-face and discuss new ideas and techniques for educating Cyber Security Professionals of the future.”  
Matt Forney, Ennovar Technology Solutions

Learn more about Ennovar Technology Solutions

Check out this cool story about opportunities for students

Check out their website

Learn more about GoCreate

 

 

Register for the Cyber Security Forum today.

Sponsor Highlight | Greater Wichita Partnership

Why does the Greater Wichita Partnership support the Wichita Cyber Security Forum?

“Cyber is not only growing in importance across the country and globe, but becoming significantly important to our local economy here in Wichita.

The 184th Intelligence Wing at McConnell Air Force Base, expanding educational programs at Wichita State University, Friends University, Butler County Community College, and others are reinforcing this rapidly growing industry cluster that will drive job creation in our region for years to come.” – Andrew Nave, Greater Wichita Partnership

Learn more about Greater Wichita Partnership

Visit their website

Check out their Business assistance resources

Find quick access to data on key industries in the Wichita metro area

 

Register for the Cyber Security Forum today.

THE BREACH: UNDERSTANDING INSURING AGAINST CYBER RISK

Where's your risk? You make decisions about your business risk every day. Do you know how to insure against cyber risk?

Does My Business Need a Cybersecurity Pro?

Are you doing enough? Are you doing the right things? How do you decide what people resources you need to defend your business in the larger digital landscape?

Top 5 Economic Ways to Protect Your Business

Presenter: Brett Eisenman, Associate Professor, Butler Community College Cyber Security & Internetworking Management

Brett Eisenman

Brett Eisenman, Associate Professor serves as a lead instructor for Butler Community College’s Cyber Security & Internetworking Management program. He is currently involved in the Cyber Security Program teaching PC Repair (A+ Certification), Supporting Networked Computers (NET+ Certification), Principles of Information Assurance, Secure Electronic Commerce, Digital Forensics. In addition to his teaching, Eisenman consults in his focus areas including digital forensics. He is a former Forensic Investigator for the Sedgwick County Sheriff’s Office in Wichita, Kansas.

Register for the Cyber Security Forum today.

Threats Facing Small Business

Presenter: Brett Eisenman, Associate Professor Butler Community College Cyber Security & Internetworking Management

Brett Eisenman

Brett Eisenman, Associate Professor serves as a lead instructor for Butler Community College’s Cyber Security & Internetworking Management program. He is currently involved in the Cyber Security Program teaching PC Repair (A+ Certification), Supporting Networked Computers (NET+ Certification), Principles of Information Assurance, Secure Electronic Commerce, Digital Forensics. In addition to his teaching, Eisenman consults in his focus areas including digital forensics. He is a former Forensic Investigator for the Sedgwick County Sheriff’s Office in Wichita, Kansas.

 

Register for the Cyber Security Forum today.

Cyber Threat Intelligence: What it should mean to your business

This presentation will provide business Information Operations Leaders with critical insights on what types of information can be useful to help protect the organization from threats. What questions to ask in order to determine how your business may be targeted. How to use the information that is available to adjust your businesses cyber defense posture to help mitigate the threats you have identified. And finally, methods to determine if “all that information” is relevant to your organization in the first place.

Presenter: Jonathan Lanning, Assistant Professor at Friends University

Jonathan Lanning

Jonathan Lanning, Assistant Professor at Friends University is responsible for the Cyber Security program in the College of Graduate & Professional Studies. Jonathan provides program oversight and management for Master of Science in Cyber Security curriculum and courseware.  Highly skilled in Incident Response (GCIH), Cyber Threat Hunting (GCFA), Information / Computer & Network Security (GSEC), Government, Intelligence, Operational Planning, and Command & Control. Strong engineering professional with a Master of Science (M.S.) focused in Security Administration from Southwestern College.

Jonathan is also a Cyberspace Operations Officer with the Kansas Air National Guard. Jonathan previously served in our United States Air Force as a Defensive Cyberspace Operations Strategy Planner for the 624th Operations Center (AFCYBER), Chief of Operations Scheduling and Planning as well as a Flight Commander leading Intrusion Prevention and Response Flight and Mission Assurance Networks for the Air Force Computer Emergency Response Team (AFCERT).

 

Register for the Cyber Security Forum today.

WHEN THE IDEA OF A PLAN ISN’T GOOD ENOUGH

Is having an idea of a plan enough? Having a living document that reflects your goals for recovering from a business interruption will improve recovery time. Brian Dennis discusses critical elements surrounding a sharable policy and procedures manual for small business.

Presenter: Brian Dennis, Director of the Kansas SBDC Cybersecurity Center

Brian Dennis

Brian S. Dennis, Director of the Kansas SBDC Cybersecurity Center is an associate business continuity planner certified by Disaster Recovery Institute International. Brian gained experience in response and recovery to disasters on the ground during Hurricanes Katrina and Rita in 2005 and again with Hurricanes Gustav and Ike in 2008. Since joining the Kansas SBDC in 2013 Brian has worked to create a statewide culture focused on understanding and addressing disaster recovery before a problem occurs. Recently, the Kansas SBDC recognized Brian as the 2017 State Star. The recognition places him in an elite group of 63 business advisors from across the nation with special recognition from America’s SBDC. 

 

Register for the Cyber Security Forum today.

ETHICAL AND LEGAL ISSUES IN CYBER DEFENSE

In this lecture Michael Hoeflich, J.D. Ph.D, is the John H. and John M. Kane Distinguished Professor of Law at the University of Kansas School of Law, will discuss various approaches to constructing an analytical framework for cyber defense. Hoeflich will discuss both the criminal law model and the LOAC model as they apply to cyberattacks and cyber defense. He will also discuss the approach of the Tallinn Manual to cyber defense and as well as the legal and ethical constraints upon cyber defense in both the public and private sector, including such issues as the extent and timing of disclosure of cyber attacks, ethical and legal issues regarding the investigation and prosecution of cyber attacks, and the ethical and legal issues arising from the use of "preemptive" cyberattacks as a form of cyber defense.

Presenter: Michael Hoeflich, J.D. Ph.D, is the John H. and John M. Kane Distinguished Professor of Law at the University of Kansas School of Law

Michael Hoeflich

Michael Hoeflich, J.D. Ph.D, is the John H. and John M. Kane Distinguished Professor of Law at the University of Kansas School of Law.

He holds degrees from Haverford College, Cambridge University, and Yale Law School. Hoeflich earned both a bachelor’s and a master’s degree from Haverford College. He earned a juris doctor from Yale Law School in 1979. He completed a Ph.D from Cambridge University in 2001. 

Hoeflich is an expert on cyber law, policy and the integration of the private and public sector. He is the creator of the new Master of Science in Homeland Security: Law and Policy at the KU School of Law.

 

Register for the Cyber Security Forum today.