• No results found

CYBER SECURITY FOR SMALL BUSINESS CONFERENCE. Co-Sponsored by Sam s Club and SCORE

N/A
N/A
Protected

Academic year: 2021

Share "CYBER SECURITY FOR SMALL BUSINESS CONFERENCE. Co-Sponsored by Sam s Club and SCORE"

Copied!
10
0
0

Loading.... (view fulltext now)

Full text

(1)

________________________________________________________

Co-Sponsored by Sam’s Club and SCORE

When:

Saturday, October 31, 2015, 8:00 AM–2:00 PM

Where:

The Elliott University Center at UNC-Greensboro,

Cone Ballroom, 507 Stirling Street, Greensboro, NC 27412

FREE covered parking in the Walker Parking Deck directly across from main entrance to the Elliott University Center.

__________________________________

Conference Agenda

COURTESY REMINDER & REQUEST: Before we begin today’s program, we kindly ask that you take a moment to silence all mobile devices. Thank you!

8:00 AM REGISTRATION, NETWORKING & CONTINENTAL BREAKFAST

∎ Fresh fruit, assorted pastries and bagels; regular and decaf coffee, water and other assorted beverages will be available.

8:45 AM WELCOME & OPENING REMARKS

UNCGJustin Streuli, Director, North Carolina Entrepreneurship Center  SCOREJack Mergner, Chapter Chair, SCORE Greensboro

SAM’S CLUBThomas Manning, Manager 8:55 AM INTRODUCTION OF CONFERENCE EMCEE

Dave Aiken – Emcee 9:00 AM UNC – GREENSBORO (UNCG)

Dr. Stephen Tate, Ph.D., Head of UNCG's Dept. of Computer Science

Discussion Topic: The importance of software security.

9:25 AM NC ATTORNEY GENERAL’S OFFICE – “KEYNOTE SPEAKER”

Kim D’Arruda, Esq., Special Attorney General

Discussion Topics: Current cyber threats, crimes and the impact of both today on small businesses from a State law enforcement level perspective.

9:50 AM SHORT BREAK [20 minutes]

Assorted beverages and snacks available.

(2)

__________________________________________________________________________________

10:10 AM FEDERAL BUREAU OF INVESTIGATION (FBI)

Jessica Nye, FBI Supervisory Special Agent

Discussion Topics: Current cyber security threats, crimes and the impact of

both today on small businesses from a Federal law enforcement level perspective.

10:35 AM WELLS FARGO BANK, N.A.

Darrell Ambro, Information Security Specialist

Discussion Topics: Cyber threats and crimes at the banking credit card and debit

card level. Why and how small businesses are being targeted and some examples of the most common cyber attacks and crimes. What business owners and its

employees need to be aware of and some precautions that can be taken to proactively mitigate some of the risks of being a cyber crime target or victim.

11:00 AM LUNCH

∎ Italian Pasta Buffet (Choice #1), or Baked Potato Bar (Choice #2) with water

and assorted beverages available. 12:00 PM TECHTRIAD, INC.

Dr. Sue Polinsky, Ph.D., Founder and President

Discussion Topic: Website and mobile device security. 12:25 PM SECURE DESIGNS, INC.

Ron Culler, Chief Technology Officer & Executive Vice President

Discussion Topic: Small business cybersecurity threats.

12:50 PM PANEL DISCUSSION– Led & moderated by Ron Culler, Secure Designs, Inc. 1:35 PM CLOSING REMARKS – John Kiley, SCORE’s NC District Director

1:45 PM END OF CONFERENCE

_______________________________________

Sam’s Club and SCOREsincerely hope you enjoy and benefit significantly

from this “Cyber Security for Small Business Conference”

_______________________________________

(3)

________________________________________________________

Co-Sponsored by Sam’s Club and SCORE

When:

Saturday, October 31, 2015, 8:00 AM–2:00 PM

Where:

The Elliott University Center at UNC-Greensboro,

Cone Ballroom, 507 Stirling Street, Greensboro, NC 27412

FREE covered parking in the Walker Parking Deck directly across from main entrance to the Elliott University Center.

__________________________________

Event Presenters, Bios and Discussion Topics

EMCEE

Dave Aiken

Emcee’s Bio: Dave Aiken is better known as “Weather Dave” to listeners of WKRR-FM (Rock 92), a morning radio show he co-hosts. He also hosts his own afternoon radio show on Rock 92, which is owned by parent company Dick Broadcasting Co., Inc.

Mr. Aiken has been with Dick Broadcasting since 2003 and served in a various capacities including Radio Host, Broadcaster, Assistant Program Director, and Co-Executive Producer. He is the current Chairman for the Summertime Brews Festival, and is a visiting speaker annually at the Kellar Radio Talent Institute at Appalachian State University.

Prior to associating with Dick Broadcasting, Mr. Aiken was a staff meteorologist in Greensboro at WFMY-TV (a CBS affiliate), a freelance meteorologist in Winston-Salem at WXII-TV (an NBC affiliate), and a member and broadcast seal holder of the National Weather Association.

He is a North Carolina native, graduate of the Broadcast Meteorology Program at Mississippi State University, and holds a BA degree from the University of North Carolina – Greensboro (UNCG) where he double majored with concentrations in National Security Policy and Radio/Television Broadcasting.

________________________

PRESENTER & PANELIST

University of North Carolina – Greensboro (UNCG)

Speaker:Dr. Stephen Tate, Ph.D., Head of UNCG's Department of Computer Science 166 Petty Building, Greensboro, NC 27402

(4)

__________________________________________________________________________________ 2015, UNCG enrolled 481 Computer Science majors at the undergraduate and graduate levels, and has the fastest 5-year growth rate of any department at UNCG. Dr. Tate is an expert in

cryptography and computer security, with current projects focused on tools and techniques for development of highly reliable and secure software, and he has produced over 50 peer-reviewed publications of original research. Before coming to UNCG to start the Department of Computer Science, Dr. Tate created the Center for Information and Computer Security at the University of North Texas, which won recognition from the National Security Agency and Department of Homeland Security as a Center of Academic Excellence in Information Assurance Education. Dr. Tate received his Ph.D. in Computer Science from Duke University in 1991.

Discussion Topic(s): “The importance of software security”– Dr. Tate’s presentation will provide conference attendees with a non-technical introduction to a topic that is usually discussed only in technical meetings (i.e., “software security”).

"Software Security" refers to ways in which bugs in software leave computer systems vulnerable to cyber attacks. After a brief description of the challenge of software security, Dr. Tate will talk about trends in software security vulnerabilities in desktop, server, and mobile platforms,

highlighted with stories of actual attacks that have taken place in the past couple of years. Given this background, the presentation will then focus on the risks that poor quality software pose to small business owners, and close with some take-away tips on how to reduce your risks. Key considerations include trustworthiness of both software producers and distributors, patching software to keep it up to date, and ensuring that custom software is produced by people that understand software security fundamentals.

________________________

PRESENTER & PANELIST

***

KEYNOTE SPEAKER

***

North Carolina Attorney General’s Office

Speaker: Kim D’Arruda, Esq., Deputy Attorney General North Carolina Department of Justice

Raleigh, NC

http://www.ncdoj.gov/Top-Issues/Internet-Safety.aspx

Speaker’s Bio: Kim D’Arruda is a North Carolina Deputy Attorney General (AG) who worked in private practice for almost six years before joining the NC AG’s office in April 2006 as Assistant Attorney General in the Consumer Protection/Antitrust Division. Her primary areas of responsibility involve enforcing the Identity Theft Protection Act and working on health care competition issues and nonprofit transfer of assets and mergers.

(5)

________________________________________________________

In June 2007, Ms. D’Arruda received the Charles F. Blanchard Outstanding Young Lawyer Award from the Young Lawyers Division of the NC Bar Association. In the ID Theft enforcement area, she reviews all security breaches reported to the NC Attorney General’s office for compliance with the Act, investigates breaches that have not been reported to the NC AG’s office, educates businesses on how to comply with the security breach requirements of the Act as well as other requirements of the ID Theft Protection Act, and educates consumers on what to do if their information was involved in a security breach. Ms. D’Arruda graduated from the University of North Carolina – Chapel Hill with a BS in business administration. Thereafter, she graduated from Campbell

University School of Law and received an MBA from Campbell University. Following law school, Ms. D’Arruda clerked at the NC Supreme Court for two years. (2010)

Discussion Topic(s): Current cyber threats, crimes and the impact of both today on small businesses from a State law enforcement level perspective.

The Attorney General (AG) is elected by the people of North Carolina every four years as the state’s top law enforcement officer and top lawyer. The AG is the head of the NC Department of Justice (DOJ). The DOJ has several primary functions including protecting NC consumers and assisting local law enforcement in fighting crime and prosecuting cases.

________________________

PRESENTER & PANELIST

Federal Bureau of Investigation (FBI)

Speaker:Jessica Nye, FBI Supervisory Special Agent Raleigh, NC

Speaker’s Bio: Supervisory Special Agent Jessica Nye is the current Supervisor of the FBI Cyber Squad in Raleigh, NC. Ms. Nye spent eight years working in the Baltimore Field Office on their Cyber Squad and most recently two years at FBI Cyber Division Headquarters in Washington DC. She has a significant experience working cyber-related matters including computer intrusion investigations, intellectual property (IP) rights violations, theft of trade secrets, economic

espionage and other investigations. Ms. Nye earned a BS degree in Information Technology from Villanova University and followed by a MS degree in Information Systems from Pace University. Discussion Topic(s): Current cyber security threats, crimes and the impact of both today on small businesses from a Federal law enforcement level perspective.

(6)

__________________________________________________________________________________ Wells Fargo Bank, N.A.

Speaker:Darrell Ambro, Information Security Specialist 100 N. Main Street

Winston-Salem, NC 27101

(336) 732-5391

https://www.wellsfargo.com/biz/

Speaker’s Bio: For over 12 years, Mr. Darrell Ambro has been an Information Security Specialist with Wells Fargo Bank. He has 20 years of diverse experience in the Computer & Network Security Industry where he’s held various positions including 6 years with Bell Labs Lucent Technologies as a Distinguished Technical Staff Member where he served as the technical lead and security expert for contracts with U.S. military and U.S. government civilian agencies including the U.S. Army Security

Improvement Program, firewall/DNS projects for the U.S. Naval Surface Warfare Center (NSWC) and general computing projects for the U.S. Department of Agriculture. Mr. Ambro holds a Bachelor of Science degree from Missouri Institute of Technology.

Discussion Topic(s): Small business banking in general, including the use of debit and credit cards, and what types of cyber threats and crimes business owners are experiencing; what they and their employees need to be aware of, and some precautions that can be taken to proactively mitigate some of the risks of being a target or victim of cyber attacks and crimes.

________________________

PRESENTER & PANELIST

TechTriad, Inc.

Speaker: Dr. Sue Polinsky, Ph.D., President

P.O. Box 41163

Greensboro, NC 27404-1163

(336) 852-4321

http://techtriad.com/

About TechTriad, Inc.: TechTriad, founded in 1998, is a Greensboro-based full-service technology firm that specializes in creating fabulous websites, complex database-driven sites, growing WordPress technology, security solutions and online activity for small-to-medium sized businesses, entrepreneurs and nonprofits. One of North Carolina’s oldest woman-owned

technology firms, TechTriad focuses on website development and Internet strategy for its clients. TechTriad operates Designs 123 for nonprofits and is a full-service technology, web, Internet strategy and social marketing firm. Each year, TechTriad assists a Triad nonprofit with an “Extreme Nonprofit Makeover,” that includes a new website, technology upgrades and a social media strategy.

(7)

________________________________________________________ Speaker’s Bio: Dr. Sue Polinsky is President of TechTriad, Inc., a technology business she started in 1998 and grew in the Triad. In addition to being recognized nationally as one of the original Internet strategists and WordPress experts in the area, she is a community advocate dedicated to improving the Triad. Dr. Polinsky is an Action Greensboro Groundbreaker, serves on the boards of several nonprofits and civic organizations and helped conceptualize and deliver area economic development opportunities through showcasing area technology talent. She founded and recently retired as the volunteer Chair of ConvergeSouth (for ten years), the Triad’s first

technology and innovation conference that draws a national attendance. Dr. Polinsky was

instrumental in bringing the globe’s first Red Hat Academy to Guilford County Schools in her role as volunteer Chair of the IT Business Council.

Her past and present memberships include The Internet Society (ISOC), Guilford Information and Technology Center Board, Leadership Greensboro Advisory Board, Workforce Development member, Triad Internet Users Group Organizer, American Society for Training and Development, NCCJ, HTML Writers Guild, International Web Association, Mentor/Sponsor of Team Prion

(Grimsley Robotics Team), Rotary Open Democracy Volunteer, Council on Aging Speaker and presenter for countless arts and human services nonprofit group workshops.

Discussion Topic(s): “Website/mobile device security” –Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, software, and the information on them, as well as from disruption or misdirection of the services they provide. Website/mobile device security is critical to the process of applying security measures to ensure confidentiality, integrity, and availability of data both in transit and at rest. Computers today go far beyond traditional desktops and laptops, and include a very wide variety of hand held mobile and other “smart”devices.

PRESENTER, PANELIST & PANEL

MODERATOR

Secure Designs, Inc.

Speaker:Ron Culler, Chief Technology Officer and Executive Vice President 301 North Elm Street, Suite 550

Greensboro, NC 27401

(336) 232-5990

http://www.securedesigns.com/

About Secure Designs, Inc.: Secure Designs was founded in 2001 and is headquartered in downtown Greensboro, NC. The company specializes in providing Internet Security Solutions for the small and medium-sized enterprise (SME) market (i.e., 5 to 500 employees per location). Secure Designs currently provides managed security services to thousands of locations across 29 states.

Speaker’s Bio: Mr. Ron Culler is co-founder of Secure Designs, a premier Managed Internet Security Provider to small and mid-sized businesses. He currently serves as the CTO, technology

(8)

__________________________________________________________________________________ thinker actively engaged in expanding the understanding of security and technology for businesses of all sizes. His expertise as a security consultant, technology innovator and industry thought leader is in high demand with companies, business councils and technology associations. A regular speaker and writer on channel issues, technology legislation, cloud and internet security, Mr. Culler is particularly known for his thought leadership role in encouraging small and mid-sized businesses to protect their data and personal assets from the growing body of IT threats and breaches. He is an active member of multiple industry advisory councils and boards and provides mentorship to several entrepreneurial organizations.

Discussion Topic(s): “Small Business CyberSecurity Threats” – CyberSecurity threats are everywhere but still small businesses are in denial about just how real they are to their business. In this session Mr. Culler will explain just how real these threats are, why small businesses especially are a favorite target, as well as what cyber criminals are looking for. He will also

provide some simple steps that any business can start to take in an effort to secure their company.

___________________________

Following the individual presentations by each of the speakers listed above, there may be a brief opportunity for Q&A. The conference will conclude with a PANEL DISCUSSION to allow attendees some time to ask panelists specific questions.

___________________________

Sam’s ClubandSCORE sincerely hope you enjoy and benefit significantly from this “Cyber Security for Small Business Conference”!

(9)

________________________________________________________

(10)

__________________________________________________________________________________

Trifold Brochure – Side 2 of 2

References

Related documents

PM686B Knowledge Area mastery narrative for Andrew Wareham The knowledge areas selected for the Crystal River Properties Rental property Acquisition Guide project included

In vitro expression of the mutations Y493F, A429P and del234-241 KCNH2 showed a loss of hERG potassium channel function by reduction of the current, suggesting a

Pollution Prevention & Waste Reduction for Wood Furniture Manufactures!. Some Waste Reduction Practices to Consider An Overriding Principle: Reduce Waste, Don’t

We  first  distinguish  structures,  transport  equipment  and  machinery...  For  illustration  purposes,  consider

(3) a statement of owner equity which shows the sources of the change in owner equity during the year; (4) a cash flow statement and debt repayment ability analysis;.. (5)

based on the intentions of the Nitrate Directive, the Polish legal regula- tions – including especially the Act of Fertilizers and Fertilization (2000), the Act on

( 2018 ) highlight the importance of logistics in disaster relief operations. While this study provides an excellent overview, their discourse on such a matter is primarily focused

Cloud Mgmt SW Enterprise Mgmt SW Other Mgmt SW Nova drivers Server Cinder drivers Storage Network AMQP DBMS Infrastructure Mgmt Capabilities Image Management. Virtual