Loading…
Type: IT/Technical clear filter
Tuesday, April 1
 

2:45pm CDT

Building A Cybersecurity Business Case
Tuesday April 1, 2025 2:45pm - 3:45pm CDT
In today's digital landscape, cybersecurity has become a top priority.  The growing frequency and sophistication of cyber threats, such as ransomware attacks, data breaches, and phishing schemes, present significant challenges. These incidents not only threaten sensitive data, undermine public trust and monetary loss but potentially can threaten public safety and infrastructure.

Critical to combat these ever-increasing risks, having the knowledge and the skill to clearly articulate and defend cybersecurity needs by building solid business cases in this session we will focus on:

Assessing and prioritizing Vulnerabilities and Potential Consequences: This involves identifying critical assets, assessing current security measures, and modeling the consequences of an incident—both immediate and long-term.

Understanding and Prioritizing Purchasing Criteria: When selecting cybersecurity solutions, decision-makers should align their criteria with the organization's unique needs.

Review an example of Business case framework: Demonstrating the return on investment or risk avoidance is crucial to gaining stakeholder approval. A strong business case quantifies the financial benefits of preventing costly incidents, minimizing downtime, and complying with regulatory requirements.
Speakers
avatar for Stacey Smith

Stacey Smith

Cybersecurity Adjunct Instructor, Texas A&M Engineering Extension Service
Stacey is a seasoned leader with a history of driving operational and strategic impact in the telecommunications,  technology and SAAS industries. Through leadership roles at Verizon and NICE Systems, Stacey has played a key role in the development and implementation of integrated... Read More →
Tuesday April 1, 2025 2:45pm - 3:45pm CDT
Spring Lake B 1001 E McCarty Ln, San Marcos, TX 78666

2:45pm CDT

Using Cyber Standards to Drive Risk Reduction
Tuesday April 1, 2025 2:45pm - 3:45pm CDT
Cybersecurity Standards, Policies, Directives, Rules, Orders, Compliance Regulations and other types of mandatory and best practice guidance can be overwhelming… With limited budget and time, learn from the speakers with high audience collaboration how many organizations handle the wide range of cyber and related areas to control. We cover: prioritizing which standards to concentrate on, how to quickly adapt template and other publicly available examples to your unique situations, and successful socialization strategies and techniques.

Attendees come away with actionable steps to better set, socialize and effectively manage the ever-growing array of needed technology and cybersecurity standards and directives.

Provide your contact information if you want access to a growing list of government provided free and reasonably priced services from the likes of TEEX, TxDIR, CISA, CIS and others.
Speakers
avatar for Darrel Raynor

Darrel Raynor

Director, Cybersecurity Business Integration, Lower Colorado River Authority
Darrel serves as Cybersecurity Director, Business Integration for LCRA. Here, he increases organization efficiency, decreases friction and works with all business units, using clear communications internally, with customers, vendors, and partners to increase overall Cyber posture... Read More →
avatar for Scott Karr

Scott Karr

Senior Cybersecurity Analyst, Lower Colorado River Authority
Scott serves as a Senior Cybersecurity Analyst, Business Integration for LCRA. He specializes in vulnerability management and engagement, integrates and socializes standards and polices with business units, and drives overall Cyber process improvement. A US Army veteran, Scott has... Read More →
Tuesday April 1, 2025 2:45pm - 3:45pm CDT
Spring Lake C 1001 E McCarty Ln, San Marcos, TX 78666

4:00pm CDT

Building A Cybersecurity Business Case
Tuesday April 1, 2025 4:00pm - 5:00pm CDT
In today's digital landscape, cybersecurity has become a top priority.  The growing frequency and sophistication of cyber threats, such as ransomware attacks, data breaches, and phishing schemes, present significant challenges. These incidents not only threaten sensitive data, undermine public trust and monetary loss but potentially can threaten public safety and infrastructure.

Critical to combat these ever-increasing risks, having the knowledge and the skill to clearly articulate and defend cybersecurity needs by building solid business cases in this session we will focus on:

Assessing and prioritizing Vulnerabilities and Potential Consequences: This involves identifying critical assets, assessing current security measures, and modeling the consequences of an incident—both immediate and long-term.

Understanding and Prioritizing Purchasing Criteria: When selecting cybersecurity solutions, decision-makers should align their criteria with the organization's unique needs.

Review an example of Business case framework: Demonstrating the return on investment or risk avoidance is crucial to gaining stakeholder approval. A strong business case quantifies the financial benefits of preventing costly incidents, minimizing downtime, and complying with regulatory requirements.
Speakers
avatar for Stacey Smith

Stacey Smith

Cybersecurity Adjunct Instructor, Texas A&M Engineering Extension Service
Stacey is a seasoned leader with a history of driving operational and strategic impact in the telecommunications,  technology and SAAS industries. Through leadership roles at Verizon and NICE Systems, Stacey has played a key role in the development and implementation of integrated... Read More →
Tuesday April 1, 2025 4:00pm - 5:00pm CDT
Spring Lake B 1001 E McCarty Ln, San Marcos, TX 78666

4:00pm CDT

Using Cyber Standards to Drive Risk Reduction
Tuesday April 1, 2025 4:00pm - 5:00pm CDT
Cybersecurity Standards, Policies, Directives, Rules, Orders, Compliance Regulations and other types of mandatory and best practice guidance can be overwhelming… With limited budget and time, learn from the speakers with high audience collaboration how many organizations handle the wide range of cyber and related areas to control. We cover: prioritizing which standards to concentrate on, how to quickly adapt template and other publicly available examples to your unique situations, and successful socialization strategies and techniques.

Attendees come away with actionable steps to better set, socialize and effectively manage the ever-growing array of needed technology and cybersecurity standards and directives.

Provide your contact information if you want access to a growing list of government provided free and reasonably priced services from the likes of TEEX, TxDIR, CISA, CIS and others.
Speakers
avatar for Darrel Raynor

Darrel Raynor

Director, Cybersecurity Business Integration, Lower Colorado River Authority
Darrel serves as Cybersecurity Director, Business Integration for LCRA. Here, he increases organization efficiency, decreases friction and works with all business units, using clear communications internally, with customers, vendors, and partners to increase overall Cyber posture... Read More →
avatar for Scott Karr

Scott Karr

Senior Cybersecurity Analyst, Lower Colorado River Authority
Scott serves as a Senior Cybersecurity Analyst, Business Integration for LCRA. He specializes in vulnerability management and engagement, integrates and socializes standards and polices with business units, and drives overall Cyber process improvement. A US Army veteran, Scott has... Read More →
Tuesday April 1, 2025 4:00pm - 5:00pm CDT
Spring Lake C 1001 E McCarty Ln, San Marcos, TX 78666
 
Wednesday, April 2
 

9:45am CDT

Blackout Warfare
Wednesday April 2, 2025 9:45am - 10:45am CDT
Blackout Warfare represents a major shift in the landscape of cyber threats, focusing on the disruption and destruction of critical infrastructure. As cybersecurity professionals, it is imperative to understand this emerging concept, which combines traditional cyber warfare tactics with targeted attacks.
Speakers
avatar for Rob Dodson

Rob Dodson

Executive Director, Cyber Ops Academy
Rob is a 27-year US Army veteran who retired as a Chief Warrant Officer 3 in 2004. During his service, Rob was a Communications Intelligence Analyst conducting network exploitation. In 1993, after being assigned to San Antonio, Rob began working in computer network operations, focusing... Read More →
Wednesday April 2, 2025 9:45am - 10:45am CDT
Spring Lake B 1001 E McCarty Ln, San Marcos, TX 78666

9:45am CDT

Securing the Future: Expert Strategies from Leading CISOs
Wednesday April 2, 2025 9:45am - 10:45am CDT
Join us for an insightful panel discussion with seasoned Chief Information Security Officers (CISOs) as they share their expertise on safeguarding organizations in an increasingly complex digital landscape. This session will explore critical cybersecurity challenges and actionable solutions including identifying and mitigating today’s biggest threats, avoiding common pitfalls in cybersecurity implementation, best practices for incident response, and fostering a robust security culture. Don’t miss this opportunity to gain expert insights and practical strategies to secure your organization’s future.
Speakers
avatar for Casey Bryan

Casey Bryan

Chief Information Officer, Texas A&M Engineering Experiment Station
Coming Soon!
avatar for Paul Price

Paul Price

Chief Information Security Officer, Texas A&M University Engineering
Coming Soon!
Wednesday April 2, 2025 9:45am - 10:45am CDT
Spring Lake C 1001 E McCarty Ln, San Marcos, TX 78666

11:00am CDT

Blackout Warfare
Wednesday April 2, 2025 11:00am - 12:00pm CDT
Blackout Warfare represents a major shift in the landscape of cyber threats, focusing on the disruption and destruction of critical infrastructure. As cybersecurity professionals, it is imperative to understand this emerging concept, which combines traditional cyber warfare tactics with targeted attacks.
Speakers
avatar for Rob Dodson

Rob Dodson

Executive Director, Cyber Ops Academy
Rob is a 27-year US Army veteran who retired as a Chief Warrant Officer 3 in 2004. During his service, Rob was a Communications Intelligence Analyst conducting network exploitation. In 1993, after being assigned to San Antonio, Rob began working in computer network operations, focusing... Read More →
Wednesday April 2, 2025 11:00am - 12:00pm CDT
Spring Lake B 1001 E McCarty Ln, San Marcos, TX 78666

11:00am CDT

Securing the Future: Expert Strategies from Leading CISOs
Wednesday April 2, 2025 11:00am - 12:00pm CDT
Join us for an insightful panel discussion with seasoned Chief Information Security Officers (CISOs) as they share their expertise on safeguarding organizations in an increasingly complex digital landscape. This session will explore critical cybersecurity challenges and actionable solutions including identifying and mitigating today’s biggest threats, avoiding common pitfalls in cybersecurity implementation, best practices for incident response, and fostering a robust security culture. Don’t miss this opportunity to gain expert insights and practical strategies to secure your organization’s future.
Speakers
avatar for Casey Bryan

Casey Bryan

Chief Information Officer, Texas A&M Engineering Experiment Station
Coming Soon!
avatar for Paul Price

Paul Price

Chief Information Security Officer, Texas A&M University Engineering
Coming Soon!
Wednesday April 2, 2025 11:00am - 12:00pm CDT
Spring Lake C 1001 E McCarty Ln, San Marcos, TX 78666

2:45pm CDT

Agent vs Agent: The Asymmetry of Agentic Cyber Warfare
Wednesday April 2, 2025 2:45pm - 3:45pm CDT
As cyber warfare advances, attackers and defenders are increasingly relying on autonomous systems. This agentic warfare is asymmetric and favors the attackers. This presentation will propose strategies to help defenders keep up in this high-paced and increasingly robotic battlefield.
Speakers
avatar for Justin Hutchens

Justin Hutchens

Innovation Principal, Trace3
Justin “Hutch” Hutchens is an Innovation Principal at Trace3 and a leading voice in cybersecurity, risk management, and artificial intelligence. He is the author of “The Language of Deception: Weaponizing Next Generation AI,” a book focused on the adversarial risks of emerging... Read More →
Wednesday April 2, 2025 2:45pm - 3:45pm CDT
Spring Lake B 1001 E McCarty Ln, San Marcos, TX 78666

4:00pm CDT

Agent vs Agent: The Asymmetry of Agentic Cyber Warfare
Wednesday April 2, 2025 4:00pm - 5:00pm CDT
As cyber warfare advances, attackers and defenders are increasingly relying on autonomous systems. This agentic warfare is asymmetric and favors the attackers. This presentation will propose strategies to help defenders keep up in this high-paced and increasingly robotic battlefield.

Speakers
avatar for Justin Hutchens

Justin Hutchens

Innovation Principal, Trace3
Justin “Hutch” Hutchens is an Innovation Principal at Trace3 and a leading voice in cybersecurity, risk management, and artificial intelligence. He is the author of “The Language of Deception: Weaponizing Next Generation AI,” a book focused on the adversarial risks of emerging... Read More →
Wednesday April 2, 2025 4:00pm - 5:00pm CDT
Spring Lake B 1001 E McCarty Ln, San Marcos, TX 78666
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.