2021 CyberCon

Page 1

M M A A R R G G O O R R P P K K O O O B BO

OCTOBER

In partnership with:

5-6,

2021

A CYBERSECURITY AND CRITICAL INFRASTRUCTURE CONFERENCE


WELCOME Teddy Roosevelt famously said, “Far and away the best prize that life has to offer is the chance to work hard at work worth doing.” Whether you are a student preparing to embark on your career or a seasoned professional, the efforts you put forth to protect our most important networks and our most critical of infrastructure is certainly work worth doing.

As we embark on our fourth annual conference, we can reflect on the challenges that the past three years have presented as well as marvel at the many innovative ways we’ve adapted. With change comes opportunity, and continuous learning from events like CyberCon place us in the best position to take advantage of the opportunities. Darin Hanson, ND DES ND State and Local

Take a few moments to review the agenda in this brochure or online (www.cyberconbsc.com).

Intelligence Center

We have an agenda full of topics in both cybersecurity and critical infrastructure protection for you to choose from. Soak up the information, network with your peers, and enjoy the conference.

Thank you for the work you do. Thank you to our sponsors, thank you to our attendees, and thank you Bismarck State College for your hospitality. With great gratitude, I want to welcome you to the Bismarck State College National Energy Center of Excellence and to CyberCon, 2021.

2020 CyberCon Planning Committee

Thank you to our 2021 Planning Committee: Karen Arlien Tony Aukland NDIT Tony Aukland Art Bakke Starion Bank Art Bakke Kevin Fishbeck Bismarck State College (student rep.) Cole Craven Matt Frohlich University of Mary Kevin Fishbeck Col. Dave Hall MDU Resources Matt Frohlich Darin Hanson ND National Guard Col. Dave Hall Tammy Heick NDSLIC (2021 Chair) Darin Hanson Bill Heinzen NISC (2022 Chair) Bill Heinzen Jason Herner High Point Networks, LLC Jason Herner Donna Hogue CyberNet Security John Nagel Ray Knutson Matthew Norton Bismarck State College (student rep.) Dave Landsiedel Bismarck State College Nick See Riley Mueller ND Air National Guard Maj. Dan Sly John Nagel TechND John Suter Nick See CISA - US Dept. of Homeland Security Tanya Taplin Mari Volk Bismarck State College Mari Volk Sara Vollmer Dakota Carrier Network Troy Walker Troy Walker Basin Electric Power Coop. Mike Wanzek Mike Wanzek

Sean Wiese

Coordinated by Bismarck State College

Continuing Education & TrainND

Alison Zarr, Program Manager Sara Vollmer, Dean

Darin Hanson


KEYNOTE SPEAKERS John Strand Black Hills Information Security Tuesday Opening Keynote

Clouds...Clouds and Clowns Are Evil. Tuesday, October 5 12:30 pm - 1:30 pm

John has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing. He is a coveted speaker and much loved SANS teacher. John is a contributor to the industry shaping Penetration Testing Execution Standard and 20 Critical Controls frameworks.

Craig Bowman is the Sr. Director of National Security at VMWARE and previously served as the Vice President of Verizon’s Advanced Solutions Division; providing strategy and engineering support for cyber initiatives in the Public Sector. Craig speaks internationally on the subject of cyber security, zero-trust, and softwaredefined networks and has briefed congressional offices, senators, Olympic Committees and international defense leaders. He has keynoted at Qatar’s CERT conference, a variety of university security conferences, Amazon’s Public Sector Summit, and has appeared on Federal News Network.

Prior to these roles, Craig led the Defense and International Security Division of

Craig Bowman VM Ware

Wednesday Morning Keynote

Securing the Supply Chain Wednesday, October 6 8:35 am - 9:35 am

Adobe Systems, a Fortune 500 software and cloud software provider. In that capacity, Craig helped to engineer secure content delivery systems for the most rugged security environments. In his earlier years, Craig was a software cyber security engineer for the Defense and National Security Industry where he penetrated, tested, built and deployed secure software applications, remotely managed secure IT environments, and deployed and managed secure telecommunication solutions.

Page 3

Page 3


Dr. Doug Jensen became the seventh president of Bismarck State College on July 1, 2020. Prior to BSC he served as president at Rock Valley Community College in Illinois and before that as the president of the Alabama Technology Network (ATN) in the Alabama Community College System.

He has more than 25 years of experience in higher education and is a proud community college graduate, earning an Associate of Science degree from Community College of Allegheny County in Pittsburgh, PA, his Master of Science and Bachelor of Science from Geneva College in Beaver Falls, PA, and his Doctorate of Education from Edgewood College

Dr. Douglas Jensen

in Madison, WI.

Bismarck State College

He and his wife, Karen, have two grown sons, and enjoy exploring the

Wednesday Lunch Speaker:

region with their dog, Oliver.

Bismarck State College's Transition to a Polytechnic Wednesday, October 6 12:15 pm - 12:45 pm

Regina Phelps is an internationally recognized expert in the field of crisis management, exercise design and business continuity and pandemic planning. Since 1982, she has provided consultation and speaking services to clients in four continents. She is the founder of Emergency Management & Safety Solutions (EMS Solutions), a consulting company specializing in crisis management and business continuity planning.

A partial list of clients includes: Bank of Canada, Bank of Colombia, Bank of Peru, Graduate Institute of Geneva, IMF, Microsoft, Northern Trust, VISA, Ellie Mae, LabCorp, Levi Stauss & Co., Gilead, Merck, Whole Foods Market, Salt River Project,

Regina Phelps Emergency Management & Safety Solutions

Closing Keynote:

The Golden Hour In an Emergency Wednesday, October 6 3:15 pm - 4:00 pm

Stanford University, Caltech Institute, Nike and the World Bank. Ms. Phelps conducts over 100 exercises per year for her large multi-national clients. She has lectured extensively at international disaster and business continuity conferences, including DRJ, Continuity Insights, WCDM and IAEM.

Ms. Phelps is the author of three exercise design books: Emergency Management Exercises: Exercise Design, From Response to Recovery, Everything You Need to Know to Create a Great Exercise; Emergency Management Exercises: The Instructor’s Guide; and Cyber Breach. Her fourth book, Crisis Management – How to Develop a Powerful Program, was released September 2018. She has also designed college-level courses in exercise design and has written numerous papers and has given hundreds of lectures on the topic.

Ms. Phelps has received numerous honors and awards, including the Business Recovery Managers Association Award for Excellence in Business Recovery Planning, College of the Sequoias’ Hall of Fame, ARC’s Outstanding Employer, San Francisco Chamber of Commerce’s Women Entrepreneur of the Year and the Small Business Administration’s Champion of Small Business. Ms. Phelps was the 1991 Chairman of the Board of the San Francisco Chamber of Commerce.

Page 4


AGENDA

Tuesday, October 5, 2021 11:00 – 12:00 pm 12:00 pm

12:15 pm

12:30 pm

1:45 pm – 2:30 pm

1A

2A

3A

Registration & Lunch - sponsored by MDU Resources Group

Conference Opening Chairman Darin Hanson, NDDES

Welcome

Bavendick Stateroom

Dr. Doug Jensen, President, BSC

Opening Keynote: Clouds...Clouds and Clowns are Evil (virtual)

Bavendick Stateroom

John Strand, Black Hills Information Security

(set A) State of North Dakota Cybersecurity

Breakout Sessions

Bavendick Stateroom

Shawn Riley, State of North Dakota

Governance and Security Considerations when Building in The Cloud

Rooms 431/433

Rav Salgado & Ben Morrison, MDU Resources

Cybersecurity: Do Something!

Basin Auditorium (304)

John Mess, Network Center, Inc. and Nick Prince, Artic Wolf 2:30 pm – 3:00 pm

Break with sponsors

3:00 pm – 3:45 pm

Breakout Sessions

1B

2B

3B

(set B)

Interface of Cyber and Infrastructure (virtual)

Bavendick Stateroom

Rodrigo Nieto-Gomez, Naval Postgraduate School

Social Engineering and Malware - A Technical Perspective

Rooms 431/433

Josh Stroschein, Dakota State University

NDSLIC Cyber Desk Capabilities

Basin Auditorium (304)

James Hudler and Jon Heard, ND State & Local Intelligence Center

4:00 pm – 4:45 pm

1C

2C

3C

(set C) Nashville Bombing (virtual)

Breakout Sessions

Bavendick Stateroom

Chegameh Gethers, FBI

DigForCE Lab - Digital Forensics for Cyber Enforcement

Rooms 431/433

Dr. Ashley Podhrasdsky, Dakota State University

Training & Certifications in Cybersecurity

Basin Auditorium (304)

Dr. Kevin Fishbeck, University of Mary 4:45pm - 5:00 pm

TechND Awards and Day 1 Closing Announcements

Bavendick Stateroom


Wednesday, October 6, 2021 7:30 am – 8:15 am

Continental Breakfast

8:15 am – 8:35 am

Welcome

8:35 am – 9:35 am

Sue Bradley, Palo Alto Networks

Wednesday Morning Keynote: Securing the Supply Chain

1D

Bavendick Stateroom

Craig Bowman, VMware

9:45 am – 10:30 am

Bavendick Stateroom

Peggy Link, MDU Resources

(set D) Vantis: North Dakota's Statewide UAS Radar Breakout Sessions

Bavendick Stateroom

Nicholas Flom, Northern Plains UAS Test Site

Defending Today with No Cost Cyber Resources for a More Secure Tomorrow

2D

Rooms 431/433

Tanya Taplin, CISA

Day in the Life

3D

Basin Auditorium (304)

Moderator: Lucas Pippenger, NDIT

10:30 am - 11:00 am

Break with Sponsors

Bavendick Stateroom

Breakout Sessions (set E) Organizational Risk Management: Measuring Privacy Risk

11:00 am - 11:45 am

1E

Bavendick Stateroom

Lisa McKee, Protiviti

ND Volunteer Cyber Corps

2E

Rooms 431/433

Darin Hanson, ND Dept of Emergency Services

Navigating the Changes in the Electric Grid in ND

3E

Basin Auditorium (304)

John Weeda, ND Transmission Authority 11:45 am – 1:15 pm 12:15 pm – 12:45 pm

Lunch - Sponsored by Dakota Carrier Network

Bavendick Stateroom

BSC’s Transition to a Polytechnic

Bavendick Stateroom

Dr. Douglas Jensen, Bismarck State College

Chairman's Award & Scholarship Recognition

12:45 pm – 1:15 pm

Bavendick Stateroom

Darin Hanson, CyberCon Chair

Breakout Sessions (set F) Building a Better Cybersecurity Program

1:15 pm – 2:00 pm

1F

Bavendick Stateroom

Michael Gregg, NDIT

An Overview of FirstNet for Critical Infrastructure

2F

Rooms 431/433

Travis Rich & Larry Ewert, FirstNet Built with AT&T

Women in STEM

3F

Basin Auditorium (304)

Jill Baird, EduTech

Breakout Sessions (set G) International Threat Landscape

2:15 pm – 3:00 pm

1G

Bavendick Stateroom

Emily Harding, Center for Strategic and International Studies

Grand Farm: An Overview

2G

Basin Auditorium (304)

Brian Carroll, Grand Farm

Rethink Cybersecurity Workforce Strategies

3G

Rooms 431/433

Moderator - Melana Howe, Lake Region State College Michelle Rakoczy, PhD, North Dakota University Core Technology Services Michael Roue, North Dakota University System Katie Adams, Safal Partners 3:00 pm - 3:30 pm

Final Break - Sponsored by North River IT Co.

3:15 pm – 4:00 pm

Page 6

4:00 – 4:15 pm

Closing Keynote: The Golden Hour in an Emergency Regina Phelps, EM & Safety Solutions Closing Remarks – Vice Chair Bill Heinzen, NISC

Bavendick Stateroom


2021 CyberCon Scholarships In 2021, the CyberCon planning committee was able to make the first contribution to Bismarck State College-College Advancement for student scholarships. The contribution was possible due to company and participant support of the conference since it's inception. CyberCon Financial sub-committee member Colonel Dave Hall, ND National Guard, said "We are excited to start giving back to our students and the future of Cybersecurity here at Bismarck State College. Scholarships are the first step toward supporting the bright future of these students learning the skills they need for future careers.” The recipients for 2021 are:

Payton Mueller Rylan Sago

Tyler Tibke

CyberCon Endowment The CyberCon planning committee was also able to gift funds to Bismarck State College-College Advancement for an endowment, which will continue to gift students in cybersecurity well into the future. The endowment interest will be used toward additional scholarships in the near future.

If you are interested in contributing to the endowment, College Advancement has a website set up for that purpose. Scanning the QR code at right will take you to the college Donor Perfect site. Simply indicate at the time of donation that the funds are for the CyberCon Scholarship Endowment.


SESSION DETAILS

Tuesday, October 5, 2021

Tuesday Opening Keynote Clouds...Clouds and Clowns are Evil

12:30 pm - 1:30 pm

John Strand, Black Hills Information Security In this keynote, John Strand will talk about how Black Hills Information Security (BHIS) is attacking cloud technologies. He will also share what your organization can do to defend itself from a technology and training perspective against both clouds and clowns.

Breakout Sessions (set A) 1A) State of ND Cybersecurity

1:45 pm - 2:30 pm

Shawn Riley, State of North Dakota The ever changing world of Cybersecurity has a large impact in North Dakota. North Dakota is changing the world in the realm of IT and Cybersecurity. Shawn Riley, a member of Governor Burgum’s cabinet, and a renowned leader in Information Technology and Cybersecurity, will discuss this landscape in North Dakota, how we keep our citizens and state resources safe, while preparing the next generation of Information Technology and Cybersecurity professionals. Join us as we discover how North Dakota has become a leader in these efforts on a national and global level.

2A) Governance and Security Considerations When Building in The Cloud Rau Salgado & Ben Morrison, MDU Resources In this session we will walk through a few key concepts to consider when building a cloud strategy, from an administrative and technical standpoint. We will specifically focus on key architectural considerations for the cloud in general. We will share our own experiences with administering and securing our Azure environment, using tools and features available in Azure, and governance steps that we have taken to have oversight and security in the administration of our cloud environment.

3A) Cybersecurity: Do Something!

Exhibit Sponsor

John Mess, Network Center, Inc. and Nick Prince, Artic Wolf Join Network Center, Inc. and Arctic Wolf for an in-depth discussion on Cybersecurity. Gain a better understanding on proactive security policies, establishing your baseline security posture, instilling a security-first culture, and the importance of managed detection and response.

Breakout Sessions (set B) 1B) Interface of Cyber and Infrastructure (virtual)

3:00 pm - 3:45 pm

Rodrigo Nieto-Gomez, Naval Postgraduate School In this presentation, Professor Rodrigo Nieto from the Center for Homeland Security and Defense at the Naval Postgraduate School will discuss the future of communications and the potential impacts of technologies like StarLink for crisis response.

2B) Social Engineering and Malware - A Technical Perspective Josh Stroschein, Dakota State University Malware authors go to great lengths to bypass enterprise security to deliver malware, avoid detection after the initial intrusion and maintain persistence to compromise an organization. To achieve this, malware authors must first obtain a foothold into an organization. Often, this is accomplished by attacking the users directly through a variety of effective social engineering techniques as well as the abuse of emails, office documents and other common office productivity tools. In this presentation we will get hands-on with real-world malware and learn how malware authors leverage social engineering to trick users into running their malware, what impact this has in an enterprise environment and for at-home users, and techniques to help you identify these malicious tricks. By the end of this presentation you will have greater insight into how social engineering impacts you, how you can better identify it to stay safe and how you contribute to the overall safety of your organization.

Page 8


3B) NDSLIC Cyber Desk Capabilities James Hudler and Jon Heard, NDSLIC The North Dakota State & Local Intelligence Center (NDSLIC) cyber analysts highlight the capabilities of the SLIC Cyber Desk and describe the benefits of becoming an intelligence partner with North Dakota’s fusion center. Topics include tools at their disposal, intelligence products, and sneak peeks of things to come from the SLIC.

Breakout Sessions (set C)

4:00 pm - 4:45 pm

1C) Nashville Bombing Chegameh Gethers, FBI (virtual) On 25 December 2020, Anthony Warner detonated his Vehicle-Borne Improvised Explosive Device in downtown Nashville, Tennessee. This explosion crippled critical infrastructure, damaged historical buildings, and disrupted law enforcement and business activities. Experts have labeled this explosion the fourth largest in U.S. history leaving evidence scattered over 36 city blocks covering 25+ buildings.

2C) DigForCE Lab - Digital Forensics for Cyber Enforcement

Dr. Ashley Podhrasdsky, Dakota State University DigForCE Lab is a collaborative relationship between DSU, the South Dakota Division of Criminal Investigation and the South Dakota Attorney General’s Office to conduct examinations on digital evidence that is part of a criminal investigation with a South Dakota nexus. Mobile phones, computers, removable media, digital video recorders, IoT devices, and drones have all been examined in the DigForCE Lab. DigForCE works with more than 30 local, state, and federal agencies throughout the state on crimes of all types. A case submitted in 2021 examined 2 laptops and a phone revealing multiple documents related to vehicle title fraud, vehicle insurance fraud, and multiple identities used by the suspect who was linked to 3 different counties in South Dakota. The DigForCE Lab is funded through grants and contracts from both public and private partnerships including the SD Attorney General’s Office, National Science Foundation, National Security Administration, Homeland Security, and others. One of the lab’s specialties is host-based dark web artifact investigations.

3C) Training & Certifications in Cybersecurity Dr. Kevin Fishbeck, University of Mary This presentation will focus on the types of training that are available for the cyber security workforce. Certifications and their sponsors will be presented along with options for obtaining a college degree at the associate, bachelors, masters, or doctoral level. Different delivery methods of training will be discussed along with the advantages and disadvantages of the different delivery methods. Examples of these delivery methods will be synchronous verses asynchronous training as well as online training verses the traditional classroom or workshop setting. Accreditations of colleges and certifications offering the appropriate training will also be discussed. Page 9


Wednesday, October 6, 2021 Wednesday Opening Keynote Securing the Supply Chain

8:35 am - 9:35 am

Craig Bowman, VMware This session will discuss supply chain from a traditional perspective (sourcing, assembly shipping and onboarding), and will also dive into an area not typically covered in supply chain ; software, integration, operations, and disposal. It will be supplemented with stories centered around worst case and best case scenarios.

Breakout Sessions (set D)

9:45 am - 10:30 am

1D) Vantis: North Dakota’s Statewide UAS Network Nicholas Flom, Northern Plains UAS Test Site A single network can redefine how we integrate UAS into the NAS. Our country’s road infrastructure is set up for multiple users to have access. Manned aviation uses shared airports and navigation systems to fly across the country. But for UAS, each user has to build their own network. By permanently installing remote infrastructure such as command and control (C2), surveillance, and a backhaul network that feeds into a mission and network operations center, UAS users will be able to fly advanced operations such as beyond visual line of sight on a single shared network. Having a shared network will lower the barrier of entry for UAS operators and will also help scale operations across the county. With the onset of certified UAS meeting type certification, there needs to be a network they can fly on that meets the same FAA rigor for streamlined approvals.


2D) Defending Today with No Cost Cyber Resources for a More Secure Tomorrow Tanya Taplin, CISA Are you concerned if your organization would be able to withstand a cyber-attack? Cyber awareness bolsters an organization’s ability to defend against these attacks. How can you better protect yourself and your organization? First, you need to understand what specific cybersecurity risks your organization faces. Let’s explore CISA’s cyber resources, available to you at no cost, to help identify and mitigate these risks. Together,

Day in the Life Presentations Lucas Pippenger, NDIT

we can defend today for a more secure tomorrow.

3D) Day In the Life Moderator: Lucas Pippinger, NDIT

James Hudler, Joshua Jenkins, and Luke Schander, NDIT In this presentation, IT and Cybersecurity professionals will give you the inside scoop on what a day in their lives is really like. Learn about the ups and downs of life as an IT or cyber professional!

Breakout Sessions (set E) 1E) Organizational Risk Management: Measuring Privacy Risk

11:00 am - 11:45 am

Lisa McKee, Protiviti Organizations globally are obligated under legal, regulatory, and industry standards to manage risk. There are many facets at risk that organizations must manage, such as financial, security and privacy risks. Organizations are currently able to prioritize security risk by conducting qualitative and quantitative security risk assessments based on the threat, likelihood, and impact on an organization’s ability to continue business operations. However, privacy risk assessments currently lack a clear calculation for identifying and prioritizing privacy risk. Key Points: a. Understand the different risk domains, specifically, what is privacy risk b. Learn methods to identify privacy risks and minimize privacy harms to individuals c. Develop techniques for conducting a privacy risk assessment. d. Identify approaches to include privacy in organizational risk management programs.

2E) ND Volunteer Cyber Corps Darin Hanson, ND Dept. of Emergency Services

Much like any other disaster we may face in this state, a significant cyber incident may require a

response beyond the capability of the local resources. In this presentation, you’ll learn about a

new initiative to develop a volunteer civilian cyber response capability to provide assistance

when it is needed most.

3E) Navigating the Changes in the Electric Grid in ND

Silver Sponsor

John Weeda, North Dakota Transmission Authority Resources attached to the grid are increasing in numbers and at diverse locations. The grid additions that are needed will increase the miles of transmission to connect additional resources and increase vulnerability from physical security. In addition, multiple resources require more complex controls and more vulnerability to cyber attacks.

Wednesday Lunch Speaker BSC's Polytechnic Designation and Pathways to the Future

12:15 pm - 12:45 pm

Dr. Douglas Jensen, Bismarck State College Through a collection of vibrant graphics, BSC will define what it means to be North Dakota’s Polytechnic Institution and the role education plays in building sustainable communities. At BSC, North Dakota’s Polytechnic Institution, learning is hands-on and grounded in the principles of project-based learning. BSC’s programs focus on high-priority occupations that are designed in collaboration with business and industry. Through flexible guided pathway options, students engage in hands-on practical and purposeful learning to ensure they graduate workforce ready.

Page 11


Conference Awards and Recognition Chairman's Award Announcement & Scholarship Recipients

12:45 pm - 1:15 pm

The Chairman’s Award for Excellence recognizes organizations, teams or individuals that have significantly contributed to the overall physical or cyber security of the region’s critical infrastructure or citizens. As part of the 2021 conference, we are recognizing our first ever Chairman's Award recipient.

In addition, the CyberCon planning committee is pleased to announce that funding from the first three years of the conference has been reinvested into Bismarck State College, in the form of student scholarships and an endowment.

Breakout Sessions (set G) 1F) Building a Better Cybersecurity Program

1:15 pm - 2:00 pm

Michael Gregg, NDIT One must only look in the news on any particular day to see examples of security gone wrong from ransomware, supply chain attacks, to breaches of large amounts of PII. Have you ever wondered what it takes to build a successful cyber security program? This session will explore some of the key factors of success. Items such as leadership buy-in, determining threats, tracking progress and the maintaining continuous monitoring will be discussed. Participants will leave with a set of easy-to-use tips and techniques to build a better cyber security program. It will also provide actionable items that can be used to “bake-in” security in any project you may be working on.

2F) An Overview of FirstNet for Critical Infrastructure Travis Rich & Larry Ewert, FirstNet Build with AT&T FirstNet is the nations only purpose built mobile broadband network for first responders and those who support them. An overview of FirstNet for Critical Infrastructure will focus on what FirstNet is, why it is being built in ND, who can use it, solutions that can be used on it and the benefits it provides. We will offer use cases and an opportunity for Q&A with attendees.

3F) Women in STEM Jill Baird, EduTech Women in STEM have been historically overlooked, but the opportunities for women and girls to break into STEM fields are now greater than ever. Let’s dive into the profiles of women who have made an impact on STEM fields to investigate how they have overcome challenges in the past. Then we will explore how bright the future is for our female students with programs and activities to peak their interests. Finally, who doesn’t enjoy a good story? Sparking interest in STEM can also happen in the library with a wide variety of books for students to discover.

Page 12


Breakout Sessions (set G)

2:15 pm - 3:00 pm

IG) International Threat Landscape Emily Harding, Center for Strategic and International Studies Espionage and warfare were once assumed to be nation-state vs. nation-state activities. However, state, local, territorial, and tribal entities, industry, and critical infrastructure providers are now targets of nation-state cyberattacks. All of these groups must be keenly aware of the international threat landscape to mount an effective defense and create resiliency. This talk will address the goals and intentions of the primary threat actors on the international stage and address why industry and local government alike must consider themselves targets.

2G) Grand Farm: Energizing Agtech Through Collaboration and Innovation Brian Carroll, Grand Farm The Grand Farm Education and Research Initiative, powered by Emerging Prairie, capitalizes on the region’s potential and expertise in the agriculture and technology industries. The Grand Farm Initiative is designed to inspire collaboration among businesses, organizations, and researchers to develop the future farm, which we believe will solve issues critical to farmers worldwide

3G) Rethink Cybersecurity Workforce Strategies

Moderator: Melana Howe, Lake Region State College

• Michelle Rakoczy, PhD, North Dakota University Core Technology Services • Michael Roue, North Dakota University System

Exhibit Sponsor

• Katie Adams, Safal Partners The news headlines that tout 'Cybersecurity Talent Shortage,' is a fallacy. There is plenty of talent in the industry – at all levels and from diverse backgrounds. Yet, talented individuals struggle to enter our industry. North Dakota academia, within its own organization of higher education has solved their hiring dilemma through the use of apprenticeships in information technology. Utilizing the apprenticeship model, the North Dakota University System Core Technology Services has partnered with Lake Region State College in developing a model to fill open positions including cybersecurity in their organization which is replicable across North Dakota and elsewhere.

Apprenticeships have been around for centuries and has statistically proven to increase employee retention rates and keep pace with new technologies. Apprenticeships can be used to recruit or up-skill current employees. You will hear from a panel including those involved in the academic apprenticeship program, employer partner and a student/apprentice. These experts will participate in a roundtable to discuss how you may customize this model to your business needs.

Doosan Bobcat

Closing Keynote

The Golden Hour in an Emergency

3:15 pm - 4:00 pm

Regina Phelps, EM & Safety Solutions When faced with a fast moving and potentially catastrophic incident, what will make the difference in your ability to respond rapidly and effectively? Every organization is dealing with this issue as our current threats escalate in intensity and frequency. Ransomware, malware, Denial of Service attacks and cyber intrusions of all kinds have placed the laser beam spotlight on how effective we are as an organization in the first few moments and hours of a crisis.

The “Golden Hour” term was first described by R. Adams Cowley, MD, when he recognized that the sooner trauma patients reached definitive care – particularly if they arrived within 60 minutes of being injured – the better their chances of survival. It may sound like an odd comparison, but take a second look. What your company does in those first few minutes and hour(s) makes all the difference in the world. To do that, the first thing you need is a sound assessment and communication process and a crisis management team that knows their roles and responsibilities.

This fast-paced presentation will cover what you need to have in place to make that first hour truly golden for your organization.

Page 13


2021 CyberCon Exhibitors Bismarck State College (booth F)

Marco Technologies (booth B)

Contact: Kelsey Wirt

Contact: Brenda Wall

Email: kelsey.wirt@bismarckstate.edu

Email: brenda.wall@marconet.com

1500 Edwards Ave

2906 Morrison Ave Ste 1

Bismarck, ND 58501

Bismarck, ND 58504

www.bismarckstate.edu

www.marconet.com

Dakota Carrier Network (booth D)

ND Dept. of Emergency Services (booth A)

Contact: Jennifer Guthmiller

Contact: Darin Hanson

Email: jguthmiller@dakotacarrier.com

Email: dthanson@nd.gov

4202 Coleman St

Fraine Barracks Lane, Bldg 35

Bismarck, ND 58503

Bismarck, ND 58504

www.dakotacarrier.com

www.des.nd.gov

High Point Networks (booth G)

Network Center, Inc. (booth E)

Contact: Jason Herner

Contact: Andi Thoreson

Email: jason@highpointnetworks.com

Email: andi.thoreson@netcenter.net

4204 Boulder Ridge Rd #200

3487 S University Dr

Bismarck, ND 58503

Fargo, ND 58104

www.highpointnetworks.com

www.netcenter.net

Lake Region State College (booth C) Contact: Daniel Driessen Email: daniel.driessen@lrsc.edu 1801 College Dr N

Vendor Map/Map of

Devils Lake, ND 58301

NECE 4th floor

www.lrsc.edu

The Basin Auditorium (304) is located on 3rd floor.

Page 14


Special Thanks to: A/V Production and Technical Support

Catering

Dusty Anderson

Bismarck State College Food Service

Cole Bernhardt

Becky Fischer & Staff

Jesse Carmen

Awards

Chris Heydt

Capital Trophy

Printing

1803 E Century Ave

Image Printing & Mike Upgren

Bismarck, ND 58503

1803 E Broadway Ave #4757

701-223-5670

Bismarck, ND 58501

701-222-4000

301 E Front Ave

Flash Printing

Bismarck, ND 58504

904 E Front Ave

Dakota Awards, Inc

WER B EA

U

!

A

C

E

PO

N

TH

Bismarck, ND 58504

O

Y UP ON FOR

O

$1.00 off 16 oz or 20 oz Mocha, Latte, or Chai (hot or iced) Must present coupon at the time of order.

Coupon good at the Power Bean on first floor, in BSC's National Energy Center of Excellence only, October 5-6, 2021


Thank you to our 2021 Sponsors!

Partner Sponsor

Platinum Sponsor Wednesday Lunch Sponsor

Gold Sponsor Tuesday Lunch Sponsor

Silver Sponsors

Exhibit Sponsors

Benefit Sponsors

Supporting Sponsor


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.