POD Security Matters

Murray State University’s Program of Distinction in Cybersecurity and Network Management and Community Financial Services Bank (CFSB) began the annual Patterns of Distinction- Security Matters Conference in 2009 to create the largest technology security conference in the region.  The FREE security conference offers small business and security gurus the opportunity to hear from industry individuals about a variety of issues and topics.  Patterns of Distinction- Security Matters is a one day event held at Murray State University’s Curris Center.  TSM and CFSB hope to make the conference a two-day event as attendance and awareness of the conference continues to grow.

Register now

Speakers

Tonya McKinney - Chief Innovation Officer, TCS Salesforce Practice

Learning from Cybersecurity Breaches—Blockchain’s Role in Cybersecurity

Tonya McKinney will briefly visit the most publicized opportunities for Blockchain in Cybersecurity from data veracity/security and hardware provenance to software update validity and biometric private keys. Next, Tonya take a look at some recent cybersecurity fails and collaborate on how/where Blockchain could have prevented or mitigated these issues.

Finally, she'll discuss the challenges to Blockchain Cybersecurity from some old enemies: Fishing, Malware, Tech Attacks, User behavior, Dictionary Attacks…and Plain Old Theft.

Tyler Leet - Director of Risk and Compliance Services, Regulatory Compliance Group, Computer Services, Inc.

More Than a Checkbox: Changing Your Perspective on Risk Management

Does risk management seem like a chore? Are you bored thinking about compliance, assessments and audits? Well, it’s time to think differently! Risk management offers a strategic opportunity to understand your business from new vantage points.

That’s why today’s most sensible organizations leverage risk management as a key business strategy, not a mundane to-do. Join us for this session where we’ll talk about adding value to the risk management process and consider real-world examples of what worked best (and what didn’t) for businesses.

Lauren Proehl - Lead Information Security Engineer, CenturyLink Corporate Defense

Red vs Blue (and Purple too!)

There are many different branches of security that help secure organizations and individuals. Practitioners frequently feel torn between offensive and defensive career paths, but there is a blended track that is frequently overlooked.

The talk will cover the basics of red team, blue team, and purple team careers, and how to leverage purple teaming effectively to propel your career and security organizations.

 

Scott Ware - Great Lakes Regional Vice President of Sales, Great Lakes Case & Cabinet Co., Inc.

Physical Security at the Infrastructure Layer

The detrimental nature of recent cyberattacks and attacks against physical IT assets has prompted increased attention to standards compliance that govern how data should be properly protected. In response to more stringent standards, improved security is required at the enclosure layer.

This new layer includes security measures at the enclosure level are able to effectively detect, delay, and deter breaches within the data center.

Contact

Michael Ramage
Director, Center for TSM
Heritage Hall, Suite 110
Murray, KY 42071
Phone: (270) 809-3987
Email: mramage@murraystate.edu 
 

Jennifer Apple
Assistant VP Business Development
P.O. Box 467
Benton, KY 42025
Phone: (270) 527-4708
Email: jenniferk@cfsvcs.com
Website:  www.yourlifeyourbank.com

 

Take the next step

© Murray State University Department of Web ManagementWe Are Racers.