Virtual Conference: Security Resilience: Incident Management Beyond Ransomware, Zero-Days and even GDPR 


Education Sessions  |  Agenda  |  FAQs  |  Technical Requirements   |  13 December 2017

Earn up to 5 free CPE without the cost of travel!

Join us for this free, live virtual conference to stay ahead of the current security landscape and convert current incident experience into forward-looking management. 


Security Resilience: Incident Management Beyond Ransomware, Zero-Days and even GDPR


According to the 2017 Verizon DBIR, over 50% of data breaches analyzed involved malware, and ransomware was the fifth most common malware variety recorded -- up from the 22nd most common in the 2014 DBIR.

As security professionals move from a "shields up!" approach to a multi-dimensional posture, some common challenges emerge.

In this virtual conference, learn from security experts Kevin Beaver, Nicholas Merker, Jeffrey Ritter, and Dave Shackleford as they dive into:

  • GET GDPR READY: GDPR and how companies should assess their current data security systems to identify what processes are GDPR-ready
  • SECURE MICROSERVICES: 5 opportunities for security improvements in a cloud microservices architecture
  • RANSOMWARE PREPAREDNESS: Details into the growing risk of ransomware and where cybercrime is headed
  • INCIDENT RESPONSE: How to use incident management-related data collection, classification, and analytics to inform future risk management strategy

This virtual event helps today's security and IT professionals' account for the paradigm shift that is already underway.

Plan to attend on 13 December 2017 from 8:15AM to 5:00PM EST to:

  • Connect with thousands of your peers from across the globe
  • Earn 5 FREE CPE hours without the cost of travel
  • Ask questions directly to industry experts and speakers
  • Enhance your professional knowledge

Register today to reserve your seat at this free online event!

  Education Sessions

Session 1: GDPR: The Data Security Processes to Remain Compliant

Presenter: Nicholas Merker, Partner and Co-Chair, Ice Miller’s Data Security and Privacy Practice

Nicholas Merker is a partner and co-chair of Ice Miller's Data Security and Privacy Practice. His experience is unique, as he is only one of a handful of DSP lawyers in the country who can say that they've worked as a computer systems, network and security engineer for 10 years before practicing law. Merker's forte is being able to quickly judge a room at a client site and determining which hat to wear -- lawyer, technologist, or some combination thereof. Merker's technology background gives him the unique ability to bridge the gap between lawyers and technologists, often times translating between the two disparate disciplines to resolve legal issues. He strives to provide practical advice to clients that they can go implement immediately rather than generate long-winded academic answers to basic legal questions.

Session 2: 5 Opportunities to Security Improvements in a Cloud Microservices Architecture

Presenter: Dave Shackleford, Owner and Principal Consultant, Voodoo Security

Dave Shackleford is the owner and principal consultant of Voodoo Security and a SANS analyst, senior instructor, and course author. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering, and is a VMware vExpert with extensive experience designing and configuring secure virtualized infrastructures. He has previously worked as CSO for Configuresoft, CTO for the Center for Internet Security, and as a security architect, analyst, and manager for several Fortune 500 companies. Dave is the author of the Sybex book Virtualization Security: Protecting Virtualized Environments, as well as the coauthor of Hands-On Information Security from Course Technology. Dave coauthored the first published course on virtualization security for the SANS Institute, and authored the upcoming course on public cloud security from SANS, as well. Dave currently serves on the board of directors at the SANS Technology Institute and helps lead the Atlanta chapter of the Cloud Security Alliance.

Session 3: Ransomware: More Than Just Your Next Incident, It’s the Future

Presenter: Kevin Beaver, Founder and Principal Information Security Consultant, Principle Logic, LLC

Kevin Beaver is an information security consultant, expert witness, and professional speaker with Atlanta-based Principle Logic, LLC. With more than 27 years of experience in the industry, Kevin specializes in performing independent security assessments revolving around information risk management. He has authored/co-authored 12 books on information security including Hacking For Dummies (currently in its 5th edition) and The Practical Guide to HIPAA Privacy and Security Compliance. In addition, he’s the creator of the Security On Wheels information security audio books and blog providing security learning for IT professionals on the go. Kevin can be reached at and you can follow him on Twitter, watch him on YouTube, and connect to him on LinkedIn.

Session 4: Tapping into Incident Management Date to Prevent Future Risk

Presenter: Jeffrey Ritter, Founder, Ritter Academy

Employees still represent a big threat to information security, as well as the first line of a company's cybersecurity defense. Learn the strategies to mitigate insider threats, including identity access management processes, privileged identity management and best practices to train employees about their role in information security.

Jeffrey Ritter is one of the nation's experts in the converging complexity of information governance, security, the use of digital information as evidence, and the emergence of cloud-based services. He advises companies and governments on successful 21st-century strategies for managing digital information with legal and business value. He is currently developing and teaching courses on information governance at Johns Hopkins University's Whiting School of Engineering and Georgetown University Law.

  Agenda and Sessions

Date: 13 December Virtual Conference
Title:  Security Resilience: Incident Management Beyond Ransomware, Zero-Days and even GDPR
Show hours:  8:15AM to 5:00PM EST (All Times EST / UTC-4)

Further Insight: Participants may submit questions during the live Q&A sessions that follow each presentation.

Virtual Conference Agenda

8:15AM Doors Open
8:45 Session 1: GDPR: The Data Security Processes to Remain Compliant (Nicholas Merker)
9:45 Dedicated networking time in the Exhibit Hall
10:00 Technology Spotlight Session
10:45 Dedicated networking time in the Exhibit Hall
11:00 Session 2: Session 2: 5 Opportunities for Security Improvements in a Cloud Microservices Architecture (Dave Shackleford)
12:00PM Dedicated networking time in the Exhibit Hall
12:15 Technology Spotlight Session
1:00 Dedicated networking time in the Exhibit Hall
1:30 Session 3: Ransomware: More than just your next incident, it's the future (Kevin Beaver)
2:30 Dedicated networking time in the Exhibit Hall
2:45 Technology Spotlight Session
3:30 Dedicated networking time in the Exhibit Hall
3:45 Session 4:  Tapping into Incident Management Data to Prevent Future Risk (Jeffrey Ritter)
4:45 Dedicated networking time in the Exhibit Hall & Prize Giveaway
5:00 Doors Close

  FAQs and Tips for an Enriching, Educational Virtual Experience

Describe the virtual conference experience.
You (and several hundred of your peers) will enter a vibrant interface to experience expert informational sessions, peer interaction and the sharing of technology solution insights. Attend sessions with security and compliance experts, visit vendor booths for product information and speak with representatives to answer your questions, download background information on enterprise risk management best practices, and interact with your peers.

How will I be reminded of the seminar?
We don't want you to miss this live interactive broadcast. We will send you email reminders with a link to the environment the day before and the morning of the event, and an Outlook calendar invitation to block out the time on your schedule.

What will I get from this virtual seminar?
Walk away with proven techniques from top experts on managing enterprise risk for improved results. This is a great venue to network with hundreds of peers and leading information systems experts, as well as ISACA staff.

  Technical Requirements

Click Here to Run System Check

For Technical Support, please email

Computer / Tech Requirements 2016:

User Troubleshooting Guide:

Displaying Secure Content All Browsers:

Displaying Secure Content Internet Explorer 8, 9 and 10

Most companies have firewalls, proxy servers, intrusion detection and prevention and/or web filtering devices in place as a mechanism to maintain a level of security and reliability of their network infrastructure. In some instances, these mechanisms may require adjustment by your company's IT Infrastructure team to ensure a quality user experience for the rich media and interactive features of the INXPO platform.

The link below includes hostnames, IP addresses, and TCP ports used by the INXPO platform as well as the corresponding application functions they provide. If you are having issues with the interactive and/or rich media features of INXPO, this information can be used by a network administrator to help resolve them. This page is updated when necessary so please bookmark it for future references:

Attention Internet Explorer 10 Users: A browser setting change is required before accessing your CPE Certificate. Click here to read more.



Why Attend?

Gain exposure to new thoughts and ideas to discover, implement and deliver results. The Virtual Conference provides a convenient and open forum where you can:

  • Participate in educational sessions presented by knowledgeable speakers and industry experts
  • Earn up to 5 CPE hours with no travel cost
  • Connect with peers around the world
  • Explore the exhibit hall in between sessions, and interact with sponsors, speakers, experts and peers
  • A resource center, complete with additional information and materials such as white papers, ISACA Journal articles and speaker materials, will also be available.

The Virtual Conference Environment

  • Exhibit Hall—Stop by vendor booths to learn more about products and services important to you and your organization.
  • Resource Center—Browse content by subject in this digital library. Select content for immediate viewing or save it for future reference.
  • Auditorium—Make yourself comfortable in a virtual auditorium where speakers and presentations take place.
  • Networking Lounge—Connect with attendees from across the globe. Start a discussion, meet new people or capture the latest information from your peers in this live, dynamic environment.
  • CPE Information—Complete the Post-Event survey and learn how you can earn your CPE Certificate.