TAG Information Security presents:
2017 Cybersecurity Simulation
May 17th, 2017: 9:00 a.m. - 4:00 p.m.
Kennesaw State University Center
3333 Busbee Drive, Kennesaw, GA 30144
The Cyber Security Simulation event is an all-day, open business continuity simulation: a role playing event where C-Level executives, senior management and security practitioners come together and “react” to a staged business-impacting cyber attack.
The attack on critical infrastructure, will challenge participants and showcase the attack impacting the business, technical and legal response.
Your organization has been hit by a cyber attack!
- How do you know? Is your website down?
- Has a ransom request been received for your intellectual property?
What do you do now? How do you react?
- What policies or procedures are in place?
- Are they up-to-date? Do they cover this situation?
What is the impact of this attack?
- On current customers? On your reputation?
- What are your liabilities?
We are pleased to announce our Keynote Speaker - Steven Bay former Managing Director over Edward Snowden and National Security Agent, as he discusses: Lessons Learned from Inside the Edward Snowden Affair
Having served as Edward Snowden's manager at the time Edward fled the country with terabytes of classified intelligence data, Bay will share the inside story of his interaction with Snowden and discuss cybersecurity lessons learned that can help protect you and your enterprise from insider threats and other security incidents.
Bay has over 15 year’s experience in Information Security supporting both the public and private sector. Much of his career was spent at the National Security Agency where he served as both a cyber subject matter expert and led a team of government contractors. It was during this time that he served as Edward Snowden's manager and was intimately involved in his disappearance and the aftermath following Snowden's revelations. Recently, Mr. Bay supported the private sector as he served as Chief Information Security Officer and Information Security Consultant assisting Fortune 500 companies build security programs. He has presented at numerous cybersecurity conference and corporate events and was his writings were recently published on TheCipherBrief.com. He is a veteran of the U.S. Air Force and is an Intelligence Officer in the U.S. Navy Reserve.
Other speakers include:
Roy Hadley, Partner with Thompson Hine LLP
Chad Hunt, Special Agent with the FBI
9:00 am - 12:00 pm: Morning Briefing - this will provide important background information on the attack.
12:00 pm - 1:00 pm: Lunch
1:00 pm - 3:00 pm: The Simulation - Each attendee will be assigned a role to play in one of three table top exercises in the simulation.
3:00 pm - 4:00 pm: Post Event Discussion and Assessment - after the Simulation, panelists will discuss the different responses to the attack in each of their rooms. Participants are encouraged to join is and discuss the issues raised during the day’s activities as well as network and talk about how the lessons learned apply specifically to their own organizations.