Events Calendar

Download as iCal file
2017 Ohio Information Security Conference
Wednesday 15 March 2017, 07:30am - 05:30pm

OISC 2017 logo#OISC17 
March 15, 2017
Sinclair College Ponitz Center | Dayton, Ohio

Technology First invites you to join us for our 14th Annual Ohio Information Security Conference.  The conference will focus in four areas/tracks: management, technical, implementation, and workforce development.  The audience will be managers responsible for security policy and administrative decisions and technicians responsible for security implementation and effectiveness.

Interested in becoming a Sponsor? Sponsorship Opportunities
Interested in Exhibiting?  Exhibitor Opportunities

Keynote Speakers:

Breakfast Keynote: The Worst Cyber Threat is often the most overlooked... the Malicious Insider
Robert Schuetter, CISO, VALVOLINE

Bob Schuetter  

Most cyber security teams are focused on the external threat actor and for good reasons.  But who owns the insider threat?  The physical security team, the cyber team, somewhere in the middle with little focus?  Mr. Schuetter will cover the success and failures of implementing insider threat programs in companies with high intellectual property value.  As a former CSO owning both the cyber and physical security teams, he will cover the gaps of these two security mindsets and provide some case file examples when things go right.

Lunch Keynote: Security Intelligence & Threat Analytics in the Energy Sector
Jeff Ochester, CISSP, Manager, Physical & Cyber Infrastructure Security, THE AES CORPORATION

Jeff Ochester    

Cyber and physical threats to the Energy Sector continue to evolve in their scope and ability. AES has responded by adopting compliance requirements and diligent intelligence-based threat analytics to recognize risk and deploy proper protection measures. This presentation will provide an outline of how intelligence and threat analytics are being performed to protect assets against cyber and physical threats within the Energy Sector. Gain learnings from our cyber-security program approach, which is based on protecting the confidentiality, integrity, and availability of data. And hear about how you can lower risk by monitoring and analyzing threats to better leverage your people and security architecture.


Thank you to our wonderful sponsors:

Title Sponsor:
GBS with Baracudda

 Spectrum Enterprise Logo RGB 2017 lightower logo 2016
Vambrace Secure Compass CinDayCyber Logo
CL H clr p 1405 white background SecureContent

logo w type on white

 Check out our fabulous agenda: 

7:30-8:00 Registration and Breakfast

Breakfast Keynote: The worst cyber threat is often the most overlooked…the malicious insider
Robert Schuetter, CISO, Valvoline

9:00-10:00 Transforming Your User Community from IT Security Adversaries to Cyber-Mindful Allies:  Strategies, Tactics & Lessons-learned from the UD’s Safe Computing Campaign
UD Panel of Experts


A Better Way of Managing Information Security Risk in Your Organization

Jay Schulman, Principal

Cybersecurity Economics: Are you throwing good security money after bad?

Jeff Hughes, President, Tenet3

Data protection with encryption, redaction &  masking.

Steve Woody, President, CommitDBA
& Scott Foulk

10:00-10:35 Networking and Exhibitor Time

The Cybersecurity Advisory Board of the Office of the Ohio Attorney General

 Kirk Herath and Craig Rapp

Business Impact & Risk Assessments – Where to Begin?

Jack Gerbs, CEO, CISSP, Quanexus

Making Cyber-Physical Organizations Work

Leo Cronin, CSO Cincinnati Bell

Securing the Internet of Things (IoT) - Through Security Research & Vulnerability Analysis

Deral Heiland, Research Lead (IoT)Rapid7


11:35-12:35 LUNCH / Networking / Exhibitor Time

Lunch Keynote Presentation from 12:35 to 1:35 pm
Cybersecurity and Cyber Intelligence in the World of Critical Infrastructure
Jeffrey J. Ochester, CISSP, Infrastructure Security, The AES Corporation, US


Cin-Day Cyber: A Regional Consortia Approach to Cybersecurity Education & Workforce Readiness 

Sean Creighton, President, SOCHE, will lead Panel of Experts

Security Maturity & Competencies Needed for Digital Transformation

Pete Lindstrom, VP of Enterprise & NextGen Security Research, IDC

5 Steps to meeting
NIST 800-171 without breaking the bank

Rebecca Onuskanich, Founder, International Cyber Institute & Cyber Warrior Princess

Purple Team: Greater than just Red and Blue!

Daniel Wilkins, Sr. Info Security Analyst, CareSource

2:45-3:25 Networking and Exhibitor Time

Vendor Management – A Cyber Security Perspective

Max Aulakh, President, MAFAZO & Shannon Glass Fisher, Practice Director, Afidence

The Big Risk Bubble

Leo Cronin, CSO, Cincinnati Bell

Preparing For & Responding To A Breach

Greg Kelley, CTO, Vestige Digital Investigations

Why Traditional Anti-virus just doesn't cut it anymore.

Karen Greer, CEO, Secure Content Technologies & Michael Drummond, Network Security Engineer, Carbon Black

3:25-4:25 Developing the Next Generation of Cyber Talent: Panel Discussion on Successful Internships
Charity Room
Networking Reception:  
 “Meet and Greet” with University Representatives Re: Internship Programs AND Door Prizes!


Secure Content Services Century Link Magnetic Mobile Spectrum
Warwick, Inc. BluVector Lightower Global Business Solutions, Inc.
Uptime Solutions Associates, Inc. CommitDBA RSM Afidence
 Sogeti  Roundtower Level3  Garber Connect 
ForeScout  Tenable Network Security Immedion  Copp Integrated Services
Security Compass   Wright State University Sinclair   


If you have any questions, or are interested in becoming a sponsor or an exhibitor,
please email This email address is being protected from spambots. You need JavaScript enabled to view it. or call 937.229.0054

Event Location

Sinclair College Ponitz Center
444 W 3rd St
Dayton, Ohio 45402

Registrations are now closed


© Technology First 2020. All rights reserved.