2016 Agenda

Thursday, October 13, 2016

 7:00 – 7:45

Registration & Networking

Exhibitor Booths Open

 7:45 – 8:45

Breakfast and Opening Keynote

Welcome and Orientation: Paul Carney, Master of Ceremonies

Cyber Military/Defense

Cathleen C. Lilli, Opening Keynote Speaker

Sponsored by Konica Minolta Business Solutions

 9:00 – 5:30

Cyber Competition Events

ITEN Wired is pleased to announce the 1st Annual ITEN Wired Cyber Competition.

The competition will consist of three concurrent tracks provided by our Cyber Range Sponsor, Metova CyberCENTS. More Details…

 

White Sands Room

Sponsored by CSRA

Aquamarine Room

Sponsored by IT Gulf Coast

Emerald Coast Room

Sponsored by AppRiver

Coral Reef Room

Sponsored by ARMA Global

 9:00 – 10:00

White Sands

Job Wars in Cybersecurity

Understanding and becoming cyber-centric for competing in today's workforce. HR and industry leaders team up to provide insights for success.

 

Details…

Job Wars in Cybersecurity

Job Wars in Cybersecurity:  Draw your light sabers! During this session we'll investigate the current cyber career warfare facing workforce and economic development!   Learn how to become cyber-centric in developing and honing your skills for competing in today's workforce.   Additionally, hear from a panel of industry leaders, security professionals, educators, and the next-generation of cyber professionals facing these very challenges.  May the force be with you and our panelist: Randy Ramos, CEO of Global Business Solutions, Inc.; Doug Underhill, Escambia County Commissioner; Tim White, Project Manager for Northrop Grumman; TBD, TBD.

Speakers:
Ronda F. Rotelli
Human Resources/Safety Officer
Global Business Solutions, Inc.
Gretchen Clarke
Strategic Accounts Executive
AppRiver

Aquamarine

Edugames and the Revolution in Worldwide Education

Properly designed Edugames will successfully change the “Instructional Paradigm” in future K-12 Education 

Details…

Edugames and the Revolution in Worldwide Education

 

 In key findings published by the Federation of American Scientists from the Summit On Educational Games, researchers concluded there needs to be a change in the current “Instructional Paradigm” in order to take advantage of educational games. In addition, studies indicate a fundamental difference between games and the prevalent paradigm. Specifically, it has been suggested that game-based learning is designed to take into consideration the elements of “challenge, reward [and] learning through doing and guided discovery;” whereas, traditional instruction is more heavily focused on the “tell and test” methods of instruction (“Harnessing the power of video games for learning”, Summit On Educational Games Key Findings 2006). It was further suggested that the No Child Left Behind Act along with its educational and testing standards are more closely aligned with the traditional “tell and test methods” of instruction which could potentially stifle creativity during the learning process (“Harnessing the power of video games for learning”, Summit On Educational Games Key Findings 2006). 

Speakers:
Joseph H. Caruth Jr.
Founder
GR77 Solutions LLC

Emerald Coast

Cyber Crime and Social Engineering

Cyber Crime & Social Engineering: dissection of real-world data breach examples 

Details…

Cyber Crime and Social Engineering

 As the stakes have increased (cyber crime is now more profitable than the drug trade worldwide!), so has the investment criminal gangs are making -- and Social Engineering is now the hot ticket for easy cyber heists. From whaling to typosquatting and Man in the Middle attacks, come explore successful strategies 

for social engineering with real-world examples of data breaches we've investigated.

Speakers:
Glenda R. Snodgrass
President
The Net Effect

Coral Reef

Protecting your Most Valuable Assets: An Introduction to Intellectual Property IP Protection

IP Protection will focus on introducing companies to the various types of intellectual property and explaining strategies companies may take when building an IP portfolio

Details…

Protecting your Most Valuable Assets: An Introduction to Intellectual Property IP Protection

Intellectual property industries account for 40 million jobs and 38 percent of GDP in the U.S. High-profile litigation and mergers and acquisitions have thrust intellectual property (IP) into an increasingly critical position in global economics. However, many organizations fail to understand the value of and the risks to their IP, even when that IP accounts for a high percentage of the company’s value.  
 
IP Protection will focus on introducing companies to the various types of intellectual property and explaining strategies companies may take when building an IP portfolio.  IP Protection will additionally provide real world issue spotting examples to actively engage the audience to spot IP assets that may warrant protection.  Time for questions and answers will be provided.

 

Speakers:
Hunter Adams
Registered Patent Attorney
AdamsIP, LLC

 10:00 – 10:30

Morning Break

Exhibitor Booths Open
Sponsored By Cox Business Solutions

 10:30 – 11:30

White Sands

It’s Time to ditch the “techlish”

It’s time to ditch the “Techlish” & start speaking human in your tech #content.

Details…

It’s Time to ditch the “techlish”

Developing content for technical industries that your audience actually needs for stronger relationships, better results and Proven ROI

Tt's essential to explain complicated concepts in ways others can understand to have a hope of connecting with people through content marketing. People don’t want to feel left in the dark. Especially, potential customers. So, keep the jargon and acronyms behind the scenes with your programmers and developers and use English to explain your products and services, even if they are part of a technical conversation. We’ll talk about the importance of buyer personas as a starting point to best understand the humans you’re hoping to connect with through content marketing.  This session would be beneficials to start-ups, managers, C-Suite, marketers, and tech professionals who want to better understand how to effectively communicate with their audience.

Speakers:
Debbie Williams
Co-Founder/Chief Content Officer
Sprout Content

Aquamarine

The Drones are Coming

Chris and Alan from Pelican Drones talking to ITEN Wired on how to launch your tech startup with elevated media.

Details…

The Drones are Coming

Pelican Drones was the first FAA Licensed drone company on the Gulf Coast between New Orleans and Tallahassee. Chris and Alan of Pelican Drones will highlight the current and likely future regulations for the Unmanned Aerial Systems (UAS), or drones. They will also discuss how this technological marketplace void is rapidly being filled with various levels of licensed and unlicensed UAS operators. They will have a short demonstration of their equipment and as they speak will roll footage they have been capturing over the last year and a half their tech start-up has been in operation.

Speakers:
Alan Gray
Director Sales and Advancement
Pelican Drones
Chris Tonn
CEO
Pelican Drones

Emerald Coast

The First Rule of Cyberwar

Today we look “under the hoodie” and into the machinery known as the hacking mind. Defeating this ruthless, relentless, and nimble foe demands a change in how we approach training and education. Beating a hacker means being a hacker and that goal shifts what we need to know and what me must be able to do.

 

Speakers:
Guy Garrett
Associate Professor
Gulf State College

Coral Reef

Public Cloud and your Datacenter

Learn how to expand your IT Investments to the Cloud securely.

Details…

Public Cloud and your Datacenter

It doesn't matter where your business currently is with It investments you need to understand the fundamentals around cloud adoption. Best practices for adoption and how to prevent security vulnerabilities with cloud technologies are two of the top concerns addressed in this session. We will also cover the different models available for cloud adoption and how hybrid cloud adoption fits 99% of business use cases. This is the session you are looking for to gain insight into real-world examples of cloud adoption. 

Speakers:
Jeffrey Mitchell
Director of Information
Bit-Wizards

 11:45 – 12:45

Lunch Keynote

Innovation, Aviation Technology Management
Steven West - Senior Director Network Operations Control-Bridge, Southwest Airlines

Sponsored by - Pensacola International Airport/Southwest Airlines

 

 1:00 – 2:00

White Sands

The Crooked Road

 

An IT executive’s guiding principles for career success, including a network infrastructure evolution case study that illustrates the opportunity to balance often conflicting requirements

Speakers:
Cathleen C. Lilli
IT Leadership-Director of IT Infrastructure
Konica Minolta Business Solutions U.S.A., Inc.

Aquamarine

If Spartans defended computer networks they would use Security Onion.

A quick look at Security Onion from the fighting pits to the Battle of Thermopylae.

Details…

If Spartans defended computer networks they would use Security Onion.

Do you conduct Network Security Monitoring, “hunting” operations, offline analysis of malicious traffic or just like to look at PCAPS for fun.  Security Onion is your toolbox for all of that and more.  Come learn how this suite of tools must become part of your day to day as a Cybersecurity professional.  Best thing is its free…so you should already have it.

Speakers:
Josh Wilson
Security Engineer
AFCEA/GBSI

Emerald Coast

Halting the Hack: A Review of Today's Threat Landscape and How to Avoid it

This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security engineer. Once you have seen what the bad guys have been up to today, you will be exposed to a crash course of security policy management and network security architecture design that will help avoid the breach of tomorrow.

Speakers:
Rob Krug
Senior Systems Engineer
Dell SonicWALL

Coral Reef

Securing Your Users

 Security awareness on a budget! Create an awareness and training program in-house to reduce risk to your data, systems, and brand. 

Details…

Securing Your Users

Ask any IT administrator what their biggest security problems are and they’re likely to mention their users. This isn’t the user’s fault. If you’re not making employees aware of how everyday actions like checking e-mail or visiting websites can be risky and then training them on security policies and procedures, you’re missing an opportunity to reduce risk to your data, systems, and reputation. Learn how to do security awareness in-house on a budget.
•View security awareness and training as a lifecycle activity.
•Identify and articulate desired goals.
•Create a curriculum based on best practices, internal policies, and recurring supportissues.
•Create a plan to deliver awareness and training.
•Measure awareness and training outcomes.
•Use feedback to update program materials.

Speakers:
Michelle Ward
CEO and Founder
Cyber Safe Workforce LLC

 2:00 – 2:30

Afternoon Break

Exhibitor Booths Open
Sponsored By Presidio

 2:30 – 3:30

White Sands

Moving from Code Monkey to Leading Humans

Moving from developer to manager is a delicate journey. Come listen to Daniel Judge provide insight on avoiding the common pitfalls.

Details…

Moving from Code Monkey to Leading Humans

Eventually, someone is going to ask you to take a leadership role in your career. When you make that transition, there are some important items that will help you succeed. There's also many items to avoid. This session will identify the best track to help you succeed as a leader. Most importantly, it will help you avoid becoming the leader that nobody wants to work for.

 

Speakers:
Daniel Judge
Technical Project Manager
Studer Group

Aquamarine

Robotics Revolution

Robots have been a reality on factory assembly lines for over twenty years. But now the technology has become advanced enough to penetrate into home and office settings.

Details…

Robotics Revolution

Robots have been a reality on factory assembly lines for over twenty years. But now the technology has become advanced enough to penetrate into home and office settings. As a total solutions provider, Konica Minolta is installing and servicing the most innovative robots around the world in the security and hotel industry. In the session today, you will see and hear how robots are making parking lots and malls more secure, assisting the hotel industry to become more customer service friendly and how robots are turning the document imaging industry into a manufacturing style environment of back file conversion.

Speakers:
TJ Edwards
Named Account Executive
Konica Minolta Business Solutions U.S.A., Inc.

Emerald Coast

Network Security Isn’t Red or Blue – It’s Purple!

Red Team meets Blue Team. Together they make Purple - the ideal combination for max cooperation, max learning & max security! 

Details…

Network Security Isn’t Red or Blue – It’s Purple!

Securing your organization means protecting people, securing physical and network assets, safeguarding intellectual property and restoring your organization to a working state in the event of a breach, disaster or catastrophe. In a typical organization, blue teams defend the enterprise and red teams work to break those defenses before the bad guys do. Unfortunately, these teams often work independently and without insight into what the other is doing. This separation isn’t always the best or most effective way to provide the highest level of security possible.
 
This talk examines the roles of the blue and red teams, uncovers how they work, discusses practical strategies for developing a purple team mentality and reviews some examples of how better cooperation between teams leads to greater understanding of attack profiles and ultimately, better responses combined and a higher overall level of security.

Speakers:
Jim Nitterauer
Senior Security Specialist
AppRiver, LLC

Coral Reef

A Practical Security Guide

This presentation will provide a set of security best practices and serve as a guide for the implementation and continued management of a solid and well-rounded security program. 

Learn how to incorporate a well balanced security program into your already over taxed IT management platform

Details…

A Practical Security Guide

As we know, the ramifications of a security breach can result in devastating consequences for an organization, including unfavorable media coverage, unexpected costs, litigation, resource drains, and loss of trust.  Therefore, it is critical that a security program be implemented based not only on protection but also on limiting liability. A successful IT program must be organizational wide reaching beyond IT and the technical infrastructure.  This presentation will define key aspects of a successful organization-wide security program.  Presentation topics include::

  • Creating and maintaining senior leadership engagement.
  • Governance – what is it and how do I make it happen?
  • Creating a security based strategic plan
  • Maturity levels defined
  • Lessons learned – what are the organizations that have had a breach doing different?
  • Reducing personal and organizational liability
  • The three tiers of a solid security program
  • Risk assessments,  prioritization and mitigation
  • The importance of documentation
  • Security best practices

Speakers:
Paul Jones
Chief Information Officer
Clerk & Comptroller, Palm Beach County

 3:45 – 4:30

Closing Keynote

Cyberspace simulation: An emulated, realistic and risk-free environment for advanced learning

Kevin Hofstra

Metova CyberCENTS CTO brings Advanced Cyber Emulation to DOD.

Details…

Closing Keynote

In a field as dynamic as cybersecurity students learn best through doing, rather than observing, which is why it is critical to provide hands-on practical experience. Fortunately, the cyberspace domain provides a unique opportunity to create an emulated, realistic and risk-free environment for learning. This discussion will cover advanced techniques being used to emulate the underlying dynamic network protocols and events necessary to accurately reflect the indicators of compromise (IOCs) associated with advanced persistent threats (APTs) while seeking to reduce complexity through automation, reduce costs through open source & virtualization, and increase repeatability through lesson plans, exercises and scenarios.

 4:30 – 4:45

Closing Remarks

Paul Carney, Master of Ceremonies

 5:00 – 7:00

Evening Reception

White Sands Room

Sponsored by vTECH io

 5:30 – 6:00

Cyber Competition Debrief

Debrief and Results

Sponsored by Metova CyberCENTS


Friday, October 14, 2016

 7:30 – 8:00

Registration & Networking

Exhibitor Booths Open

 8:00 – 8:15

 8:15 – 9:00

Breakfast and Opening Keynote

Minimum Viable Government in Startups

Rep. Jamie Grant

Sponsored by - Northrop Grumman

Details…

Breakfast and Opening Keynote

How government legislature and policy at the state level can assist the entrepreneur of a startup and/or technology companies foster and flourish in Florida. Representative Grant will also speak to some of the disruptive technologies service providers such as Uber, Lyft, AirBNB and their effects on the state’s economy.

 9:00 – 9:45

Women in Tech Panel Discussion

Michelle Horton, Michelle Ward, Eman El-Sheikh

Sponsored by Innovation Coast

Details…

Women in Tech Panel Discussion

The mission of Innovation Coast is to grow, sustain and showcase the successful, vibrant community of technology companies and professionals in Pensacola, Florida, and along the Northern Gulf Coast. Innovation Coast is a business community serving entrepreneurial garage start-ups, established leaders, and everyone in between. 

The Women in Technology Committee’s mission is to develop an alliance to advance, advocate and support women in technology.  The committee focuses on providing women across the Panhandle with resources and tools that will enable them to succeed in their technology-related career field. As women are an important part of the growing demand of workforce in technology industries, this committee strives to establish a forum that promotes networking opportunities and career exploration. This vision also aligns with Innovation Coast’s mission to grow and showcase the region’s vibrant ecosystem of technology companies, professionals, and investment opportunities.

Innovation Coast and the Women in Technology Committee is pleased to participate in the ITEN Wired Summit.  We will conduct a panel discussion with women who have successful careers in the field of Cyber Security.  The discussion will focus on the experiences, challenges, and opportunities associated with the field of Information Technology and Cyber Security.

 9:45 – 10:15

Morning Break

Exhibitor Booths Open
Sponsored By Southern Light

 10:15 – 11:00

Ignite ITEN

Ignite® ITEN presenters will share their personal and professional passions, using 20 slides that auto-advance every 15 seconds for a total of just five minutes.

Sponsored by Mediacom Business

 11:00 – 11:45

Closing Keynote

Leveraging Technology Assets & Opportunities in Northwest Florida

Kim WilmesTim White, Steve Millaway, Donald Robinson

Sponsored by - Gulf Power

 11:45 – 12:00

Closing Remarks/Grand Prize Giveaway

Paul Carney - Master of Ceremonies

Grand Prizes:

Drawing: Dell Inspiron 23824 Touchscreen All-In-One Computer 

Capture the Flag Competition: Microsoft Surface Pro 4 

You must be a registered attendee and be present to win.