Below are events endorsed or hosted by the CISC.


Past Events


NIST: CYBERSECURITY FRAMEWORK WORKSHOP 2017

This workshop will offer participants the opportunity to: 

  • Share and learn about Cybersecurity Framework users’ experiences that will help others in making effective use of the Framework,
  • Discuss and share their views about proposed updates to the Framework to assist NIST in finalizing Version 1.1 later in 2017, and
  • Learn about new Framework-related policy issues and the progress of others' technical work.

It will include multiple plenary sessions as well as concurrent breakout sessions. There will be ample opportunity for networking. The current agenda is available here

The Framework has been available and used by many organizations across the nation’s critical infrastructure and other sectors since February 2014 when it was published. It also is being used in other countries. This workshop is designed for people who already have a foundational knowledge of Framework.  NIST recommends that registrants visit the Framework’s web page and the Framework Overview webcast  to gain foundational knowledge before the workshop.

Among other information, visitors to that web page will find videos on two webcasts held on March 1 that introduce and review the Framework and describe in detail the proposed changes. TO REGISTER FOR THE WEBCAST ONLY VISIT: https://appam.certain.com/profile/form/index.cfm?PKformID=0x35189774a

This is a non-fee conference.

For more information about the agenda, food, lodging, and security instructions visit: https://www.nist.gov/news-events/events/2017/05/cybersecurity-framework-workshop-2017


INFORMATION TECHNOLOGY EXECUTIVES COUNCIL MEETING

"Data Breaches Will Happen...How You Recover Defines Your Company"

Presented by Tony Rucci, Director of Information Security & Threat Intelligence at Information International Associates

This program is presented in partnership with the Cyber & Information Security Consortium

April 26, 2017|  11:30AM-1:00PM  |  Cost: $10

Reserve Now - Pay online - Calendar link included

Reserve Now - Pay at the door

Summary: You've heard it many times before and you'll continue to hear “it’s not a matter of if, but when” …Whether directly or indirectly, you will at some point experience a data breach. Your measure for success will be built around your ability and speed to respond, recover and restore operations, minimizing impact to your customers, employees, intellectual property, industry reputation and ultimately your ROI. During this talk, I’ll share with some insight, proactive administrative, technical, and security operations to consider as you build out your disaster recover planning strategies. Wait, What? You’re NOT building a D/R Strategy? I know, it’s usually an after-thought, but it’s much easier than you might think. I’ll walk you through some fairly straight-forward things to consider to help better prepare your organization for that late Friday afternoon when things begin going sideways. Ransomware can really take a toll on organizations when they are ill-prepared. Invest a little time to ensure you are able to recover from and reconstitute your data in the unfortunate event there is catastrophic failure. You’ll walk away with a wealth of resources and building blocks to give you and your company a leg up!

Location: Summit Medical Group; 
1225 E. Weisgarber Rd
Suite N-200
Knoxville, TN 37909

Google Maps location: https://goo.gl/maps/xtm9BwdmKrF2

Speaker: Antonio A. (Tony) Rucci - With more than 32 years of counterintelligence and security experience, a retired Counterintelligence Special Agent and US Army Warrant Officer, Tony Rucci followed his dream and as started his own company, /Root Technology, which was approached for acquisition after just 13 months! After serving as Chief Security Officer for two independent companies, today Tony is the Director of Information Security & Threat Intelligence for Information International Associates.


CISC/Baker Center - Brown Bag Cyber Lunch - APRIL at UT

“CYBER HYGIENE FOR INDIVIDUALS AND SMALL BUSINESSES”

CISC and the University of Tennessee's Howard H. Baker Jr. Center for Public Policy have partnered together to hold monthly brown bag lunches to hear talks on key topics regarding cybersecurity. Mark your calendars for...
Speaker: Scott Partelow, Managing Consultant for Enterprise Solutions at Sword & Shield Enterprise Security.

When: Thursday, April 13, 2017 from 12:00-1:00 p.m. 
Where: Toyota Auditorium in the Howard H. Baker Jr. Center for Public Policy, 1640 Cumberland Ave, Knoxville, TN 37996. For a detailed map and directions click here.)

Who: These meetings are free and open to the public. Reservations are not required.

Description: Scott will speak about Cyber Hygiene. This presentation will cover multiple timely security risks that we face both in our private lives as well as in our businesses. Recognizing these risks so that we as individuals can fend off those that would steal information is the key focus.
 
About the Speaker: As Managing Consultant for Enterprise Solutions at Sword & Shield Enterprise Security, Scott focuses on analysis and auditing customer security policies/procedures and overall IT security posture. This includes working with customers who need to validate their current solutions, as well as customers who need start at the beginning with designing the overall company’s security direction.
 
Scott has held multiple certifications over the years like CCNA, CNE and Microsoft Certified Systems Engineer. He is skilled in LAN and WAN technologies, including routers, switches, networking protocols, servers, wireless solutions and firewalls. Previously, he was the North American IT manager for a large plastics manufacturer, an IT consultant, and performed IT design and presales support for a systems integrator. Scott has two degrees from the University of Tennessee, one in Computer Science and one in Mathematics.


CISC/Baker Center - Brown Bag Cyber Lunch - APRIL iN Oak Ridge

“CYBER HYGIENE FOR INDIVIDUALS AND SMALL BUSINESSES”

CISC and the University of Tennessee's Howard H. Baker Jr. Center for Public Policy have partnered together to hold monthly brown bag lunches to hear talks on key topics regarding cybersecurity. Mark your calendars for...
Speaker: Scott Partelow, Managing Consultant for Enterprise Solutions at Sword & Shield Enterprise Security.

When: Monday, April 10, 2017 from 12:00-1:00 p.m. 
Where: UT Outreach Center, Oak Ridge. (1201 Oak Ridge Turnpike, entrance facing Applebee’s, closest to the Quality Inn. For a detailed map click here).

Who: These meetings are free and open to the public. Reservations are not required.

Description: Scott will speak about Cyber Hygiene. This presentation will cover multiple timely security risks that we face both in our private lives as well as in our businesses. Recognizing these risks so that we as individuals can fend off those that would steal information is the key focus.
 
About the Speaker: As Managing Consultant for Enterprise Solutions at Sword & Shield Enterprise Security, Scott focuses on analysis and auditing customer security policies/procedures and overall IT security posture. This includes working with customers who need to validate their current solutions, as well as customers who need start at the beginning with designing the overall company’s security direction.
 
Scott has held multiple certifications over the years like CCNA, CNE and Microsoft Certified Systems Engineer. He is skilled in LAN and WAN technologies, including routers, switches, networking protocols, servers, wireless solutions and firewalls. Previously, he was the North American IT manager for a large plastics manufacturer, an IT consultant, and performed IT design and presales support for a systems integrator. Scott has two degrees from the University of Tennessee, one in Computer Science and one in Mathematics.


EXECUTIVE SESSION ON CYBERSECURITY

Date: Tuesday, April 4, 2017
Time: 1:00-5:00 p.m.
Place: Conference Center at Oak Ridge National Laboratory
RSVP: Required with the form further down on this page

Description: The Cyber & Information Security Consortium's Spring Event for cybersecurity executives will be held on the registration day prior to the CISR Conference at Oak Ridge National Laboratory.

Audience: Executives and IT directors are invited to attend. While CISC plans to have small business and practitioner oriented events in the future, the agenda content has been created to add value to the c-suite level executives. 

Cost: There is no cost to attend but reservations are required due to security requirements to enter the national lab.

Registration: Please fill out the form below. Contact Nicole with questions.

CISR Conference Info: Optional: CISC meeting attendees are invited to attend ORNL’s 12th Annual CISR Conference that begins with an opening reception after the CISC workshop. It includes two full days of sessions, research paper presentations, a conference banquet, vendor interaction, and networking. The first full day features a technology showcase, while the second will include technology demonstrations of eight licensable technologies by the Department of Homeland Security. To register for the CISR conference, click here. Registration closes on March 31.

Reception Invite: While this meeting is separate from the CISR Conference, CISC event attendees are invited to attend the Conference Reception held from 6:00-8:00 p.m at the DoubleTree Hotel.

Agenda:

Peer Forum Cultivation / Structured Networking: An integral part of CISC's mission is to design, develop, and facilitate an Executive Peer Forum. Peer forum expert Bob Halperin will be facilitating a peer session via live video feed. You will hear about the value and process of peer forums as well as participate in a sample forum.

Corporate Governance and Cybersecurity: Stuart N. Brotman, distinguished endowed professor at the University of Tennessee and a senior fellow at The Brookings Institution will speak and lead a discussion on how to navigate the boardroom from a cyber perspective. 

Panel: Industry Strategic Attack Response & Defense Trends: Fred Cobb, Sword & Shield Enterprise Security – Healthcare; Travis Howerton, Consolidated Nuclear Security – Government; Tony Rucci,  Information International Associates – eCommerce/Cross Platform Vulnerabilities.


CISC/Baker Center - Brown Bag Cyber Lunch - February

To watch the video click here:: http://mediasite.utk.edu/UTK/Play/fbd6363345f44e388978baea886ecc561d

CISC and the University of Tennessee's Howard H. Baker Jr. Center for Public Policy have partnered together to hold monthly brown bag lunches to hear talks on key topics regarding cybersecurity. Mark your calendars for...

Friday, February 17th
Time: 12:00-1:00 p.m.
Speaker: Louis Kuykendall
, Tennessee Bureau of Investigation & The Tennessee Fusion Center
Location: Toyota Auditorium, at the Baker Center (1640 Cumberland Ave, Knoxville, TN 37996)

Topic: “The Tennessee Fusion Center – Technology, Law Enforcement, and East Tennessee”

Description: ASAC Kuykendall will speak about how the Tennessee Fusion Center fits into the state-wide law enforcement picture and specifically into situations in East Tennessee. (The Tennessee Fusion Center a team effort of local, state and federal law enforcement, in cooperation with the citizens of the State of Tennessee, for the timely receipt, analysis and dissemination of terrorism information and criminal activity to Tennessee.)

About the Speaker: Assistant Special Agent in Charge (ASAC) Louis Kuykendall has been with the Tennessee Bureau of Investigation (TBI) for over Twenty Nine years. He has worked as both a Forensic Scientist and a Criminal Investigator. In 2014, he began to manage a portion of the Tennessee Fusion Center, and is now overseeing the TBI Top Ten Fugitive program, TBI Gang Intelligence initiatives, Social Media Analysis, and the Consolidated Records Management System (CRMS) program. ASAC Kuykendall worked as a Special Deputy U.S. Marshal for over ten years on the U.S. Marshals Fugitive Task Force and supervises agents assigned to federal task forces as well.


CISC/Baker Center - Brown Bag Cyber Lunch - January

CISC and the University of Tennessee's Howard H. Baker Jr. Center for Public Policy have partnered together to hold monthly brown bag lunches to hear talks on key topics regarding cybersecurity. Mark your calendars for...

Tuesday, January 31st
Time: 12:00-1:00 p.m.
Speaker: Will Overstreet, 
GRIDSMART Technologies, Inc.
Location: UT Outreach Center (1201 Oak Ridge Turnpike, Oak Ridge, TN 37830)


STATE-OF-THE-ART CYBER SECURITY TRAINING

You are invited to participate in 5 days of intensive cybersecurity training in Nashville, Tennessee.

Comprehensive IT solutions require a comprehensive cyber security plan. The FedEx Institute’s foundational program covers the fundamentals of cyber security and cyber security vulnerabilities over a broad scope of topics. The week long certification course is comprised of multiple modules, each taught by an expert in the relevant subject area.

Certification Course Dates: 01/9/17 – 01/13/17

Registration Cost: $2,000/person (Group Discounts Available)

Location: FedEx Institute of Technology

Skill Level: No previous experience required

Full Details Are Available At: www.fedex.memphis.edu/cast/cast_certification.php


DHS LIVE INFORMATION SESSION: INTERDISCIPLINARY APPROACH TO CYBER LITERACY IN K-12 EDUCATION

DECEMBER 7 @ 1:45 PM - 3:00 PM

Our partners at the Department of Homeland Security are excited to inform you about an upcoming training opportunity!

Computer science and cybersecurity education is a growing priority among state departments of education and school districts across the county. Due to a high demand for cybersecurity professionals, the concepts and fundamentals of Computer Science and Cyber Literacy are being integrated into the K-12 classroom.

DHS sponsors middle and high school cyber-integrated curricula in subjects such as math, science, and even humanities to prepare the next generation of cybersecurity professionals. The curricula are flexible to adapt to any classroom need and are free to all K-12 teachers across the country.

Watch an exclusive live information session as we discuss the K-12 Computer Science education landscape as well as how we can take an interdisciplinary approach to Cyber Literacy in K-12 education. Join us on Wednesday, December 7, 2016 from 1:45 pm to 3:00 pm ET. The demo will take place using a cutting edge DHS virtual world training platform, FedVTE Live. Learn more by joining us on December 7.

To register and verify your access to the virtual world, follow the instructions in the attached Excel registration form and email the completed form to fedvtelive@hq.dhs.gov.  Registration is limited to the first 50 respondents.

Click here to download the Excel Registration Spreadsheet.

Please feel free to forward on to your state and local education partners.

We look forward to showing you how this resource can save your state time and money in its cybersecurity workforce development efforts.

From the Multi-State Information Sharing and Analysis Center


JOINT CISC, ETEC, BAKER CENTER MEETING: "CYBERSECURITY & THE C-SUITE": 11.11.16

Stuart Brotman, the inaugural Howard Distinguished Endowed Professor of Media Management and Law at UT-Knoxville, will speak at a joint meeting held by CISC, the East Tennessee Economic Council (ETEC) and the Howard H. Baker Jr. Center for Public Policy.

Presentation title: “Cybersecurity, Information Security and the C-Suite: Improving Corporate Governance by Boards of Directors at Publicly-Held Companies.”

The talk will focus on the critical role that corporate directors can and should play in overseeing the development of strategy and its implementation of a company’s cybersecurity and information security activities. 

 


EDGE2016 Conference: 10.18.16 & 10.19.16

Where complex business security problems meet real-world solutions.

AGENDA: Engaging keynotes from world-renowned visionaries, topical roundtables led by recognized technology industry leaders, training sessions, and industry-specific tracks. SEE SCHEDULE

SPEAKERS: Theresa Payton and Kevin Poulsen headline a celebrated lineup of experts in Healthcare, Retail, Legal, Banking and Finance, Manufacturing, and Government. VIEW LINEUP

REGISTRATION: Early Registration now through August 15th. Sign up now to Get The EdgeREGISTER NOW

Click here to download the brochure.

October 18-19, 2016

Crowne Plaza Hotel
401 West Summit Hill Drive
Knoxville, Tennessee 37902

For more information: https://edgesecurityconference.com/

 


INNOV865 WEEK - CISC MICRO EVENT:  9.22.16

An Innov865 Week Event, the Cyber & information Security Consortium, hosted by the Oak Ridge Associated Universities, invites you to attend a micro event on Friday, September 23, 9:00-11:00 a.m. at ORAU in the MC-100 Building Classroom, (100 ORAU Way, Oak Ridge, TN 37830).

Stacy Prowell and David Sims from the Oak Ridge National Laboratory will present an overview of available cybersecurity technologies and the licensing process. Then Travis Howerton the with CNS Y-12 National Security Complex will speak about emerging trends in cybersecurity that create small business opportunities.

Registration is not necessary, but if you would like to rsvp, please visit: https://www.eventbrite.com/e/cybersecurity-opportunities-for-the-entrepreneur-and-small-business-tickets-27176979076