Information Technology Services IT Security Office
VASCAN 2018: PROGRAM

VASCAN 2018 will feature a keynote address by Rick Howard, the Chief Security Officer (CSO) for Palo Alto Networks, sessions focused on ways to mature your cyber security and information from vendors about products and services they provide to enhance cyber security. Registration opens for the conference at 7:15 a.m. Tuesday, October 16, 2018. Breakfast also begins at 7:15 a.m., and the keynote address is at 9 a.m. The first day closes with presentation of the Shirley Payne Award during the conference reception at 5 p.m.

The second day, breakfast begins at 7:30 a.m. The final session ends at 12:20 p.m. and participants can pick up their box lunches in Dewberry Hall. Those participating in the second-day training will get a lunch break and have their lunches delivered to The George, where the day-long training will take place. The two-part training will focus on identifying data sources and tools that map to industry standards and prioritized security controls in the context of SIEM technology and a Boss of the SOC competition that will help increase incident response and hunting skill sets.

This is a list of expected topics

  • The Domain Name Service (DNS) Firewall Architecture of Virginia Tech
  • How to build a solid foundation for effective cyber defense operations
  • Utilizing Open-source intelligence (OSINT) in Threat Analytics and Incident Response
  • Managing Risk by Improving Processes
  •  Thinking Differently:  Protecting the Public, Faculty, Students, Alumni and the Supply Chain through Domain-based Message Authentication, Reporting and Conformance (DMARC) Enforcement
  • Automating IT Security - Letting Security Analysts be Analysts
  • Climbing Survey Platforms to Elevate Policy and Compliance Programs
  • Controlled Unclassified Information (CUI) compliance for Researchers
  • Transforming Security via Data Center Architecture
  • Virginia Cyber Range:  Cloud-based resources for Hands-on Cybersecurity Education and Training
  • Complying with NIST-800-63-3b Password Checking Guidelines
  • Artificial Intelligence vs Malware
  • The Human Element of Security Assessment
  • Using Student Interns to augment your Security Program
  • IT Governance Risk and Compliance of University Servers
  • Revisiting the CAN-SPAM law
  • Assessing 3rd Party Risk
  • Risk-Based, Data-Driven Audit Preparation

 

Day One: Tuesday, October 16, 2018

Note: Sponsor move is from 7-9 a.m.

Time Event Location
7:15-8:45 a.m.
Registration Opens and Breakfast Main sessions
will be held
in Dewberry Hall
8:45-10 a.m.
Opening and Keynote Address
10:15-11:05 a.m.
First Session
11:20-12:10 p.m.
Second Session
12:15-1:30 p.m.
Lunch
1:45-2:35 p.m.
Third Session
2:50-3:40 p.m.
Fourth Session
3:55-4:45 p.m.
Fifth Session
5-7 p.m.
Reception and Presentation of Shirley Payne Award
The Bistro

Day Two: Wednesday, October 17, 2018


Note: for those attending the all day training seminar, class will begin at 8:15 a.m. in The George and will end at 5 p.m.

Time Event Location
7:15-8:30 a.m.
Registration Opens and Breakfast
Main sessions
will be held
in Dewberry Hall
8:15-9:05 a.m.
Sixth Session
9:20-10:10 a.m.
Seventh Session
10:25-11:15 p.m.
Eighth Session
11:30-12:20 p.m.
Final Session
12:25 p.m.
Box Lunch Served and Conference Ends