Log in


Join hundreds of Security & IT Professionals for our

19th annual Ohio Information Security Conference

March 9, 2022 at Sinclair Community College, Dayton, OH

Registration for attendees and sponsors is now OPEN!

Opening Keynote: Cybersecurity Briefing: 2022 State of the Threat

Terry McGraw, Senior Executive Incident Response Consultant, Dell Secureworks

Lunch Keynote: CISO Panel - details coming soon!

Sessions

(CEU Credits available)

7 Strategies for Securing Your Remote Workforce - Bryan Hogan, Afidence

Buzzword Bingo - Panel with Dan Wilkins, CareSource

Characterizing Data Breach Severity with a Breach Level Index Amir Zadeh, Wright State

Demonstration of Dayton Cyber Range Security Operations Center Simulator - John Wolfe, Dave Salisbury, and Rusty Baldwin, University of Dayton

DevSecOps - Panel Topic 

Digital Models of Small Enterprises for Cybersecurity Research Pradyumna Gampa, University of Cincinnati

How the DoD’s Cyber Security Maturity Model (CMMC) will impact your business & how to prepare for the audit Commander (CDR) Aaron McCray, CISSP, CISA, CRISC, AWS CP, HCISPP - Ignyte Assurance Platform

 Incorporating Live Bug Bounties in a Cybersecurity Class - Mike Libassi, Sinclair

Information is the game and how phishing attacks are coming more dangerous - Ty Braunwart, Nexigen

Insider threats- How to engage and investigative risk - Isaac Dunifon, Infinite Protection

iWars - A Networked Cyber Operations Competition - Hrishikesh Bhide, University of Cincinnati

Managed Detection and Response (MDR): What is it and Why is it so Important? - Louie Hollmeyer & Nick Enger, ATC

Modern Threats to Microsoft Office 365 Environments  Chaim Black, Intrust IT

Purple Teaming speaker TBA

Ransomware and Cyber Liability Insurance Expectations speaker TBA

Teaching Hacking in a Secure Environment - Kyle Jones, Sinclair

Teaching your cybersecurity team to run with scissors: The five principles that sustain success in high performing/ high risk operations Thomas Skill, University of Dayton

Threat Modeling Risk and Reducing Harm: An intersectional infosec approach Dr. Michael Loadenthal, Center for Cyber Strategy and Policy/Ohio Cyber Range Institute

What steps to take in the first 48 hours after a data breach - Shawn Waldman, Secure Cyber Defense

Work From Anywhere and Cybersecurity Landscape - Brian Proffit, Lumen Technologies


Thank you Sponsors:





ANNUAL PARTNERS

Our Annual Partners share a common goal; to connect, strengthen and champion the IT community in our region. A Technology First Annual Partner is an elite member leading the support, development and expansion of Technology First services. In return, Annual Partners improve community visibility and increase their revenue. Make a difference in our region and your business. Become a Technology First Annual Partner.  

Learn more about the benefits of being one of our Annual Partners.




Technology First

1435 Cincinnati St, Ste 300, Dayton Ohio 45402

Info@TechnologyFirst.org

© Technology First, All Rights Reserved