Loading…
OISC 2020 has ended
Resiliency [clear filter]
Wednesday, March 11
 

9:00am PDT

A methodology for cyber threat ranking integrating NIST and FAIR
NIST recommends that organizations perform cyber risk assessments regularly to identify security vulnerabilities and to control levels of exposure to threats. We discuss a method to customize the ranking of cyber threats based on the organization’s maturity level of implementing NIST controls. We use LEF as a measure of severity of cyber threats.  The methodology integrates NIST maturity levels to calculate the resistance strength component and produce the LEF values for each threat. The LEF value is then used to represent the severity level of the threat to the specific organization.

Speakers
avatar for Dr. Hazem Said

Dr. Hazem Said

University of Cincinnati
avatar for Adeyinka Bakare

Adeyinka Bakare

Research Assistant, University of Cincinnati
Yinka Bakare is a graduate student at the University of Cincinnati School of Information Technology and a research assistant with the UC Information Technology Solutions Center


Wednesday March 11, 2020 9:00am - 10:00am PDT
Room 119

10:30am PDT

Responding to Email Compromises in Office 365
With over $1.2 billion dollars lost in 2018 due to email compromises, it is one of the leading methods attackers use to launch cyber-attacks. Companies often don’t take the basic necessary precautions to prevent it, and don’t know how to respond to them when they occur. Learn how to secure your Office 365 tenant to reduce your risk of attack, the common methods attackers use to compromise email accounts, the proper response to an email compromise, and how to perform threat hunting. Also learn how to utilize PowerShell to provide deep insight into your tenant and perform incident response.

Speakers
avatar for Chaim Black

Chaim Black

Systems Engineer, Intrust IT
Chaim Black is a Systems Engineer at Intrust IT, providing a full scope of IT and cybersecurity services to a wide range of environments. Focused in reducing clients’ risk for cyber-attacks, and when necessary, perform incident response to cyber-attacks. Acts as the liaison for... Read More →


Wednesday March 11, 2020 10:30am - 11:30am PDT
Room 116

1:30pm PDT

Communication best practices during & after a cybersecurity attack: What the research suggests
You've been hit by a cyber-attack.  The calls from the media and your customers are coming fast and furious.  What will your team tell the media and your customers?  In this panel we will (1) discuss how organizations – both large and small – typically communicate about such incidents, (2) offer some critique about the strategies those organizations employed, and (3) demonstrate how you can use the Benoit model of image restoration to develop effective messaging strategies for your various publics or constituencies.

Speakers
avatar for Dr. James Robinson

Dr. James Robinson

University of Dayton
James Robinson is a professor of communication. Tom Skill is a professor of communication, CIO & Associate Provost at University of Dayton and Kimberly Conde is the Team Lead for IT Communications & Training and Messaging Czar for Cybersecurity
avatar for Kim Conde

Kim Conde

University of Dayton
avatar for Dr. Thomas Skill

Dr. Thomas Skill

University of Dayton


Wednesday March 11, 2020 1:30pm - 2:30pm PDT
Room 116

3:00pm PDT

System Resiliency: Continuing Business and Mission Operations on a Playground Full of Bullies
Our systems are operating in a contested environment, our enemies are playing on our playground. We are at the pinnacle in time where we must ensure our business and mission critical systems are resilient enough to fight through these attacks. This presentation introduces system cyber resiliency, how organizations can effectively play in the adversary's sandbox and the incorporation of adversarial assessments into your organization.

Speakers
avatar for Rebecca Onuskanich

Rebecca Onuskanich

Partner, International Cyber Institute
Becca is the founder of International Cyber Institute, LLC, a small business located in Dayton, Ohio. She has supported US Central Command, Veterans Administration, NASA, DoT and various other organizations as a cybersecurity engineer. She works to ensure systems and solutions are... Read More →


Wednesday March 11, 2020 3:00pm - 4:00pm PDT
Room 131
 
Filter sessions
Apply filters to sessions.