More than ever, cyber-thieves are targeting Ohio’s governments and tax dollars with great sophistication. Investigator Beckwith has a candid discussion about the preparedness of your staff for an attack, and the threats both seen and unseen that you may encounter daily. She will discuss how to prepare yourself for these attacks and more importantly how to prevent them. She will also be sharing what has learned while travelling the state speaking with agencies and responding to attacks.
Nicole Beckwith is a sworn investigator and digital forensic examiner for the Ohio Auditor of State’s Public Integrity Assurance Team. She is a recognized expert on cyber-security, policy, and cyber-terrorism, and has spoken throughout the country on many topics. She has worked with numerous Local, State and Federal Law Enforcement partners on criminal investigations including the FBI’s public corruption unit and Homeland Security investigations. She is a sworn Task Force Officer for the United Stated Secret Service’s Financial and Electronics Crimes Task Force, and has been trained in various specialized areas at the National Computer Forensics Institute in Hoover Alabama. She assists the task force and its members in recovering digital evidence.
Cyber hygiene is comparable to personal hygiene. Much like an individual engages in certain personal hygiene practices to maintain good health and well-being, cyber hygiene practices can help keep your data safe and well-protected. In this session, we will learn about cyber hygiene protection 101. Common everyday best practices that are logical and simple to apply in your day to day life. Whether at work or home, building routine Basic Cyber Hygiene into your daily habit will be worth a pound of cure.
Proficient Information Technology and Services Manager with over 37 years of results-focused leadership in a global manufacturing company. Experienced in ERP Master Data, IT Service Management, IT Security, IT Strategy, and IT Infrastructure. David, University of Findlay alumni, holds degrees in Computer Science, Business System Analysis, and an MBA. More information may be found at: https://www.linkedin.com/in/davidldrake/
Often, the term compliance is associated with a “check the box” mentality. The positive or negative impact may not be directly correlated to an effective cyber security posture. However, regulatory compliance and cyber security effectiveness are not mutually exclusive objectives. In fact, not being able to demonstrate cyber security effectiveness through a risk-based compliance framework may ultimately be more damaging, more costly, than the impact of a data breach alone! In this presentation we will discuss the relationship between compliance and effective cyber security practices. Provide an overview of major regulatory requirements for various industries. Why simply checking the box does not equal security.
A lifelong learner, Loren is an experienced information assurance executive with over 40 years of IT experience in a global manufacturing company. He is recognized for developing innovative IT solutions across a world-wide team environment. In addition, Loren has 20 years of course development and teaching experiences in information assurance, and he has demonstrated his passion and commitment to sharing through teaching and practice because learning and sharing form the essence of knowledge. More information may be found at: https://www.linkedin.com/in/lorenwwagner/
Associate Professor and Co-Chair of Computer Science
Office Location: 1104 Cory Street A