- Spears Home
- About CEPD
- Open Enrollment Programs
- Program Info
- Speaker Series
- Sponsorship Information
Cyber Security Conference
Check back for information on the 2018 Cyber Security Conference
April 28, 2017
COX Convention Center, Oklahoma City, Oklahoma
Pre-conference – 8-9 a.m. / Conference – 9:15 a.m.-4 p.m.
Featuring local and national experts on cyber security – one of the hot topics of 2017 in business.
With the increasing risk and sophistication of cyber attacks, there is a continuous need to adapt your business strategy to protect sensitive business and personal information. This inaugural Cyber Security Conference brings national and international experts to the state and is sponsored by the Management Science and Information Systems Department and the Center for Executive and Professional Development, Spears School of Business, Oklahoma State University.
Benefits to the participant
Learn from the experts and take advantage of questions and answers and networking to develop new ideas and get the information you need to address cyber security including how to:
- understand the risks your organization faces
- define the nature and motivation of different threats—fraud, theft,
- extortion, national security, terrorism
- develop a cyber security strategy for your business.
Pre-conference: Cyber Security Table Topic Discussions and Networking Breakfast
This pre-conference session will be hosting roundtable conversations on 10 cyber security topics. Discussions are meant to be open and candid exchanges where participants can ask questions and share experiences. Facilitators will guide discussions by presenting targeted issues and topics related to cyber security issues. During the session participants are invited to all table topics of interest. A breakfast buffet will also be available, and participants are encouraged to network with other pre-conference attendees and facilitators
Platinum Sponsor – $10,000
Includes being a premier sponsor of the pre-conference, morning break sponsorship,
10 registrations to the Cyber Security Conference, reserved table of 10 at lunch,
10 registrations to the Table Topics pre-conference, four invitations to a sponsor
and speaker dinner on April 27 in Oklahoma City, an exhibit booth at the conference,
logo and name listed on conference website, e-mail promotion, and a link from the
conference website to sponsor’s corporate website and prominent recognition in promotion
and materials at the conference.
(Deductible- $7,000; Non-deductible- $3,000)
Gold Sponsor – $3,500
Includes 8 registrations to the Cyber Security Conference, reserved table of 8 at lunch, and 8 tickets to the Cyber Security Conference Table Topics pre-conference, two invitations to a sponsor and speaker dinner on April 27 in Oklahoma City, an exhibit booth at the conference, logo and name listed on conference website, e-mail promotion, and a link from the conference website to sponsor’s corporate website, and prominent recognition in promotion and materials at the conference. (Deductible- $1,090; Non-deductible- $2,410)
Silver Sponsor – $2,000
Includes 4 registrations to the Cyber Security Conference, 4 tickets to the Cyber Security Conference Table Topics pre-conference, reserved seating for 4 at the luncheon, an exhibit booth at the conference, and logo and name listed on conference website, e-mail promotion, a link from the conference website to sponsor’s corporate website, and prominent recognition in promotion and materials at the conference. (Deductible- $500; Non-deductible- $1,500)
The Cloud Whisperer: What Security Secrets is your Cloud not Disclosing?
Tim Pierson, Cyber Security Speaker and Managing Partner, Data-Sentry, LLC, Dallas, TX
This segment describes all aspects of the cloud and how they will be used now and in the future.
Nine Years into Mobility, Has Security Caught Up?
Georgia Weidman, Founder and Chief Technology Officer, Shevirah, Inc., Ashburn, VA
Over the past nine years, mobility disrupted the Corporate Enterprise in a manner on the magnitude that PCs disrupted mini-computers and mainframes in the 1990s. Yet most corporations continue to approach security as if there is still a hard perimeter, corporate-owned end points, and internal corporate applications. But Mobility equals employee-owned endpoints, connecting over public carrier networks, to cloud-based applications. How does perimeter security address this?
The Concern of Ransomware and Other Threat Actors
Daniel Ford, Forensic Analyst and Security Engineer, Rook Security, Indianapolis, IN
In 2016, Ransomware ran wild and many were not prepared to handle the fallout after being infected. And while people were busy trying to prepare for Ransomware attacks, what else did they miss that could have been avoided?
Cyber Convergence 2025, NOW!
Nikk Gilbert, Director, Global Information Protection and Assurance, ConocoPhillips, Bartlesville, OK
Businesses are swiftly adopting a cloud first methodology. Security must adapt to this new reality by converging traditional security infrastructure with emerging cloud technologies. Explore the possibilities of reducing complexity, enhancing security while supporting the customer and business.
Panel: Cyber Security Considerations for Your Business and Incident Response
Ken Harmon, Chief Information Security Officer, KOCH Industries, Inc., Wichita, KS
Mark Davis, Vice President of Cyber Security and Enterprise Systems, Sonic Drive-In, Inc., Oklahoma City, OK
Lydia Hixon, Love’s Travel Stops and Country Stores, Oklahoma City, OK
This panel session will discuss what action plan your company should have in place should a cyber-attack become a reality, and how to communicate preparedness plans and risk factors with your administration.
Rick Wilson, Ph.D., has been a faculty member in OSU’s Spears School of Business for 25 years, presently serving as Chair of the Management Science and Information Systems Department. Prior to earning his Ph.D. from the University of Nebraska-Lincoln, Dr. Wilson worked for a number of years in industry as an IT professional in the telecommunications industry. He is most well-known in academia for his research in the data sciences, including sports analytics, and has won over a dozen teaching and leadership awards throughout his career.
Tim Pierson is a world-wide speaker and evangelist on security and secure development. As President of Data Sentry, Tim is a highly sought after authority and one of the world’s leading trainers in technology, networks, virtualization and, applications and application security. He is known for his comedic style when he speaks, always leaving the crowd entertained. Tim has appeared on The Early Show (CBS), Fox Live National News, NBC Today Show Miami and more. He’s spoken at security conferences worldwide and alongside international celebrities such as Ehud Barak, former Prime Minister of Israel and the First Lady of Nigeria. Tim will be speaking at Hacker Halted Europe in Iceland this month and at IT-Defense in Germany in February. Tim holds over 29 certifications including CISSP, MCSE, MCT, CCNP and CEH. In addition, he has been awarded the EC-Council Instructor of the Year, EC Council Circle of Excellence, and EC-Council Master Trainer titles. Tim teaches IT Security classes worldwide. He’s a contributing author of “VMware vSphere and Virtual Infrastructure Security: Securing ESX and the Virtual Environment” (Pearson Publishing) and the Technical Editor for CompTIA Cloud+ (McGraw-Hill). In addition to teaching, which he will admit is his first love; he conducts high-level security evaluations and delivers seminars and keynotes before professional conventions. He is endowed with exceptional skills in communicating highly technical information to technical and non-technical clientele.
Georgia Weidman is the Founder and CTO of Shevirah Inc. She is a penetration tester, security researcher, speaker, trainer, and author. Ms. Weidman holds a MS in computer science as well as CISSP, CEH, and OSCP certifications. Her work in mobile exploitation has been featured internationally in print and on television. She has presented and trained at venues such as the NSA, West Point, and Black Hat. Her DARPA Cyber Fast Track grant resulted in the release of the Smartphone Pentest Framework (SPF). She founded Shevirah Inc. to commercialize SPF for enterprise customers and is a graduate of the Mach37 accelerator. Georgia is the author of Penetration Testing: A Hands-On Introduction to Hacking (http://www.nostarch.com/pentesting) from No Starch Press. She was the recipient of the 2015 Women’s Society of CyberJutsu Pentest Ninja award.
Daniel Ford is a Forensic Analyst and Security Engineer at Rook Security. He graduated from Purdue University with a degree in Electrical and Computer Engineering Technology. He interned with Rook for two years before becoming full time. In those two years, he developed hacking hardware tools that give a unique experience for the client and Rook when on a penetration test. He has his obtained the GMOB certification, which gives him unique knowledge on mobile devices and how to secure them in a business environment. While working at Rook, Dan has been on many high profile Forensic and Incident Response cases.
Nikk Gilbert With 19 years of executive level experience in Information technology roles, Nikk Gilbert is a respected technology leader within the government & private sectors. His experience includes working as an information security executive & information technology leader for large multinational organizations such as the American Department of Defense, NATO, Alstom, ConocoPhillips and the U.S. Navy where he was awarded the Meritorious Civilian Service Medal. Nikk is a Distinguished Fellow of the Ponemon Institute, sits on the Board of Directors for the ONG-ISAC and has been a keynote speaker at technology events throughout the world.
Ken Harmon is the Chief Information Security Officer for Koch Industries, Inc., located in Wichita, Kansas. In this role, he works with business and IT leaders to help ensure that information security measures applied across Koch appropriately address the risks facing Koch companies today. Ken has been an employee with Koch since 1995 and has served in a variety of IT leadership roles with business units in multiple industries, including Oil and Gas, Fibers, Agriculture and others. Prior to his current role, Ken was the Sr. Vice President of Enterprise Technology Solutions, Koch’s IT shared services organization. He holds an Information Systems degree from Emporia State University and is a Certified Information Systems Security Professional (CISSP).
Mark Davis is vice president of cyber security and enterprise systems for the Oklahoma City-based national headquarters of SONIC®, America’s Drive-In®. His responsibilities include leading the information security, data center operations and enterprise networking for the brand, along with the support of all corporate and field based client systems. Prior to SONIC, Davis’ experience includes information technology development, infrastructure management, and medical research for public, private and nonprofit organizations. Davis graduated from LeTourneau University in Longview, Texas with a bachelor of science in computer science and engineering technology. He is actively involved in the community as an elder, of Legacy Family Church and works on various orphan initiatives such as Orphan Sunday, a work of the Christian Alliance for Orphans. In addition, he has served on the board of directors for the Limbs for Life Foundation.
Lydia Hixon has been working in the Information Security field for over 16 years. She is a Certified Information Security Manager, Certified Information Security Auditor, and has 2 PCI Security Standards Council certifications. Throughout her career, she has focused on information security strategy and operations, business continuity, disaster recovery, and incident response. She holds a Bachelor’s degree from Oklahoma State University.
Jim Burkman holds a Ph.D. in Management Information Systems from Indiana University and is currently a Clinical Associate Professor at Oklahoma State University. He teaches Information Assurance courses that are key to OSU earning the distinction of being a National Center of Academic Excellence in IA Education (CAE/IAE and CAE/R). Jim is the program coordinator for the Master of Science in Information Assurance degree and teaches applied and theory courses in information assurance, digital forensics and database. Dr. Burkman is also the founder and faculty advisor for the OSU Information Security and Assurance Club (ISAC). This student-driven club competes annually in the National Collegiate Cyber Defense Competition. His research focuses on the social psychology aspects of technology, to include issues of trust and expectations in the areas of secure computing and technology adoption. Additionally, Dr. Burkman studies the use of metaphors in the visual representations of complex data sets. His works have been published in various journals and conferences.
Mark Weiser, Regents Service Professor; Director, Center for Telecommunications and Network Security, Management Science and Information System
- The conference is designed for senior-level leaders, human resource and information technology management and professionals, operational technology specialists, systems and data administrators, and other business leaders involved in the decision-making process for cyber security strategy, implementation, and management.
- The conference will be beneficial to those in a range of industries including: legal practices, accounting firms, insurance brokers, personal information suppliers, wholesalers, public sector suppliers, schools, and colleges, and those involved in decision making on or delivery of cyber security in central government, local government, police and fire services, health services, and education.
- Program format
8am – 9am Pre-conference
9am – 4pm Conference
- CPE credits/CEU credits available
Location – COX Convention Center (Map), Oklahoma City, Oklahoma
Pre-conference registration with table topics and networking breakfast (Conference Registration required to attend pre-conference) – $25 per person
Cyber Security Conference only – $225 per person
- Multiple registration discount (8 or more people)
Cyber Security Conference only – $195 per person.
Pre-conference registration with table topics and networking breakfast (Conference registration required to attend pre-conference) $25 per person
- Conference Materials – Registration fee includes materials in electronic format, refreshments, and lunch. If you would prefer a hard copy of conference materials in a binder, please check the information below for an additional fee of $25 per binder.
- Multiple registration discount (8 or more people)
- Sponsorship Information:
Sponsorship opportunities are available. Become a Sponsor.
- Cancellation Policy:
If a participant would like to cancel her/his registration less than 10 days prior to the conference, you are welcome to send a substitute. All guarantees have been submitted to the hotel, so refunds are not attainable. A refund is available given notification no later than 11 days prior to the conference. If you are transferring your registration to a colleague, please contact the OSU Center for Executive and Professional Development at 405-744-5208 or firstname.lastname@example.org.
- For additional information or to sponsor:
Sarah Williams, Program Coordinator, Center for Executive and Professional Development
Oklahoma State University, 215 Business Building
Stillwater, OK 74078-4011 USA