Sep 13, 2012

"A key element in defending cyber space is collaboration. Whether your role is that of security professional or managing executive, our organizations' cyber security posture depends on the ability to gather and share information, analysis, trends and incidents. Collaboration starts with awareness of who is out there - as a partner or as a threat - and what is their capability. As cyber defenders, we are called to develop the skills and lines of communication needed to provide coordinated assurance and resilience. The 2012 Illinois Cyber Security Forum is the perfect place to discuss challenges, strategies and trail-blazing solutions. I encourage you to join us and to be an active part of the discussion!"

- Rafael Diaz, Chief Information Security Officer, State of Illinois


Thursday Sep 13

Time Session
1:00 - 1:10PM

Opening Remarks

  • Rafael Diaz - Chief Information Security Officer, State of Illinois
1:10 - 1:40PM

Keynote - Winning the Battles

It is said that if you know your enemies and know yourself, you will not be imperiled in a hundred battles; if you do not... more

1:40 - 2:00PM

Evolving Cyber Threat Landscape

The landscape is changing fast, with new threats constantly emerging and old threats continuing to evolve. Nothing ever stays the same. This session takes a... more


Download Session Assets

2:00 - 2:20PM

BYOD and the Fear Factor

For a security official, the concept of allowing employee-owned devices at work is a recurring nightmare. But as one CIO reluctantly admitted, Resistance is futile.... more

  • Mark Brooks - Principal Advisor, Security and Compliance, EMC/RSA

Download Session Assets

2:20 - 2:40PM

Security in the Cloud

Sure the cloud is easier, cheaper, more accessible and ultra-scalable. But, therein lies the problem whats convenient for the user is pretty much the... more

  • Matt Dittoe - Account General Manager, HP Enterprise Group, HP

Download Session Assets

2:40 - 2:50PM


2:50 - 3:10PM

Mobile Workforce

Mobility is the dominant trend in IT today, and its forcing agencies to come up with security tactics that are effective but still give employees... more


Download Session Assets

3:10 - 3:30PM

Big Data The New Wave

Every day we create 2.5 quintillion bytes of data: videos, photos, sensors, social media, maps, transactions and GPS signals not to mention good old... more

3:30 - 3:50PM

Creating a Comprehensive Security Strategy

The previous sessions cover various aspects and components of cyber security. But how do you tie them together in a comprehensive way? This session looks... more

  • Peter Allor - Federal Security Strategist, Software Group, IBM
3:50 - 4:10PM

How Much of Your Personal Information Is Online?

Few people realize the sheer amount of personal information that is stored online, much of it in places you would never imagine. In an update... more

  • Jeff Thompson - Incident Response Analyst, Central Management Services, State of Illinois

Download Session Assets

4:10 PM

Networking Reception