Cyber Security Conference - speakers photos

Cyber Security Conference

Cyber Security Conference
View program brochure
For more information:

1.866.678.3933 or 405.744.5208

April 28, 2017

COX Convention Center, Oklahoma City, Oklahoma

Featuring state, national, and international experts on cyber security – one of the hot topics of 2017 in business.

With the increasing risk and sophistication of cyber attacks, there is a continuous need to adapt your business strategy to protect sensitive business and personal information. This inaugural Cyber Security Conference brings national and international experts to the state and is sponsored by the Management Science and Information Systems Department and the Center for Executive and Professional Development, Spears School of Business, Oklahoma State University.

a man touching a security lock icon.

Benefits to the participant

Learn from the experts and take advantage of questions and answers and networking to develop new ideas and get the information you need to address cyber security including how to:

  • understand the risks your organization faces
  • define the nature and motivation of different threats—fraud, theft,
  • extortion, national security, terrorism
  • develop a cyber security strategy for your business.

Sponsorship Information

2016 Sponsors

Gold Sponsor

Silver Sponsors

Please see program 2016 agenda for details.

Understanding & Applying Threat Intelligence
Ken Westin, Security Market Specialist, Splunk, Portland, OR
In the security industry we have heard a lot about threat intelligence and how it can be used to bolster our security posture. However, actually implementing a threat intelligence program can be a challenge for many organizations, without a solid understanding of the fundamentals and a clear strategy for integrating and using the data within their existing security ecosystem. This presentation will provide a summary of threat intelligence, from the building blocks of Indicators of Compromise (IoC), how they are aggregated into feeds and used for identification of attack patterns. Attendees will discover how threat intelligence is much more than just data, but a process organizations can implement to provide richer context to their existing tools and data collection processes.

Get Ahead of Cyber Crime
Terry Jost, Partner/Principal, Advisory Risk, EY, Dallas/Ft. Worth, TX
Anticipating cyber-attacks is the only way to be ahead of cyber criminals. That’s our message to businesses across the globe today, derived from our experiences with thousands of organizations we work with each year. Generally this session will discuss our findings and best practices to improve organizational focus on managing cyber threats and suggestions for how to get ahead of today’s cyber criminals. Reports in the media regularly illustrate that cyber threats are increasing in their levels of persistence, sophistication and organization: the damage caused by a cyber-attack can severely impact a business. Even if you have not experienced an attack yet, you should assume that your organization will have been targeted, or perhaps your security has already been breached. Our research uncovers that many organizations are making progress on building the foundations of cyber security. And though this progress is notable and builds on the best framework to protect an organization from cyber risks, most organizations report having only a “moderate” level of maturity in their foundations.

A Role for Corporate America in Today’s Cyberwar
Matthew Harper, Director, Information Security, Devon Energy, Oklahoma City, OK
Cyber security leaders in the private sector have a wealth of resources at their disposal to take an active role in defending U.S. critical infrastructure. Too often companies expect the government to protect them and sit back minding their technology waiting to be the next victim. Mr. Harper will share a perspective on a healthy relationship between the government and private sector and how corporate America can step up to meet the challenges of defending an enterprise in the era of the targeted attack and data breach.

Rethinking the Challenge of Security
Sabine Schilg, Vice President, Security Division, IBM, Armonk, NY
As organizations drive innovation and engage with customers in new ways, protecting against cyberattacks becomes more critical. We will explore a new way to think about security in the era of cloud and uncover what CIOs need to know—and with whom they need to partner to proactively protect their organizations.

An Intelligence Analyst’s View of the Current Threat Landscape
Allison Wikoff, Intelligence Analyst/Security Researcher, Dell SecureWorks, Atlanta, GA
Increased reporting on cyber threats, attacks and actors in main stream media implies the threat landscape is getting more complex. Is it? This talk will cover observations from an intelligence analyst’s point of view and what organizations need to fundamentally understand in order to be more prepared to defend their networks.

Security and Privacy Implications of Smart Objects on Infrastructure and Developing a Security Mindset
Monique Morrow, Chief Technology Officer, Cisco Systems, Zurich, Switzerland
With the advent of the Internet of Things (IoT) the notion of smart objects will definitely have implications to infrastructure and to the overall architecture for IoT: Smart objects possess 5 attributes which will be discussed: a Unique Internet Address; a Unique Location (fixed or mobile); an Increase in Machine-Generated and Machine-Processed Information; Complex New Capabilities in Security, Analytics, and Management; and Time and Location Achieve New Levels of Importance in information processing as Internet-connected objects work to generate ambient intelligence. Moving to complexities of machine learning, one could envision that infrastructure will need to possess rather cognitive attributes. Deconstructing the security implications of smart objects on infrastructure will be the focus of this paper and presentation. What are the threat detection vectors and potential response constructs? What are the opportunities for further research? What about the privacy implications? Who is accountable? What should a security mindset look like? The notion of predictability and to cognition from our brain to cyber security?

Executive Management Briefing – A Road Map to Freedom: The Strategy for Effective Cyber Security
General Keith Alexander, Commander, U.S. Cyber Command (2010-2014) and Director, National Security Agency/Chief, Central Security Service (2005-2014)
A four-star Army general and the highestranked military official of U.S. Cyber Command, the National Security Agency and the Central Security Service, Gen. Keith Alexander has played a pivotal role in securing our safety at home and abroad for the past decade.

James Burkman, Ph.D.James Burkman, Ph.D., is a Clinical Assistant Professor of Management Science and Information Systems. Dr. Burkman is a Veteran with distinguished service in teaching and mentoring in the OSU Veterans Entrepreneurship Program for many years. His most current completed research includes in the industries of electronics, consumer behavior, and information security with the majority of his research being funded by Best Buy Inc. He has also served as the Faculty Advisor for the OSU Information Security and Assurance Club since 2008. Dr. Burkman has given presentations on management and employee empowerment, visual analogies, and knowledge in information systems. He received his Ph.D. and Masters of Business degree in Management Information Systems with an emphasis on Organizational Behavior from Indiana University and received his Bachelors of Arts degree from Western State College in Business Administration with a supporting area of Finance.

Matthew HarperMatthew Harper serves as the Director of Information Security for Devon Energy Corporation and functions as this Fortune 200 organization’s Chief Information Security Officer. His responsibilities include communicating cyber risk to executive management and the Board of Directors, and developing and executing strategies to protect Devon’s information assets for both information technology and operational technology. Harper leads teams responsible for digital security, risk management and compliance, identity and access management, testing and quality assurance, and training. Prior to joining Devon, he served as a Special Agent and Supervisory Special Agent in the Federal Bureau of Investigation for 14 years where he specialized in cyber investigations, critical infrastructure protection and intelligence matters.

Terry JostTerry Jost is a principal in the Advisory Services practice of Ernst & Young LLP and has more than 25 years of experience in information technology (IT), risk and advisory strategy services. Terry is member of the EY National Risk practice and the Cyber security Leader for the US Southwest Region. Prior to rejoining EY, Terry was CEO and Chairman of the Board at Mycroft, Inc., a mid-size global IT security services and consulting business, with an emphasis in identity management and access compliance, application security and security-as-a-service. His commentaries on managed risk services, cyber security, risk technologies and business process improvements & management are available in many major publications and on the internet, including BusinessWeek, The New York Times, Forbes, Fortune, CNBC, Reuters, CRN and InformationWeek.

Monique MorrowMonique Morrow is the Chief Technology Officer, New Frontiers, Engineering at Cisco Systems since November 2014. Monique was the first CTO of Cisco Services from June 2013 to November 2014 where she led the development of Cisco Services Technologies mapped to Services Customer Solution Reference Architecture that is now foundational for Cisco Customer Solutions implementation. Monique has a track record of co-innovating with customers, that has transcended the globe from North America, Europe and Asia. Under Cisco’s Office of the CTO, both as an individual contributor and manager, Monique built a strong leadership team in Asia-Pacific. Monique is a staunch advocate for women in technology and has been recognized as one of the Top Ten Influential IT Women in Europe 2014. She was one of 6 Global Achievers recognized for the ITU and UN Women 2014 GEM-TECH Award. Monique currently has 9 patent submissions filed with US Patent Office and 7 patents issued by the US Patent Office.

Kent NaborsKent Nabors serves as Chief Information Security Officer, responsible for Information and Physical Security for MidFirst Bank, a $11 billion, privately-owned, multi-state institution. Before joining MidFirst in 1998 he worked in bank examinations with the Federal Deposit Insurance Corporation and the Federal Reserve Bank of Kansas City. At MidFirst, he managed the network infrastructure before establishing the Information Security department. Kent received his MBA from the University of Oklahoma. He is also the co-author of the book “Dissecting the Hack: The F0rb1dd3n Network”. Kent is a supporter of a variety of InfoSec and Security community initiatives including serving on the board for Oklahoma Infragard since 2007, participating in the 2014 FBI Citizens Academy, and assisting in a re-launch of the DefCon Group program in 2015.

Sabine SchilgSabine Schilg is Vice President of M&A Integrations, Security, IBM. Through years of helping IBM succeed in areas of M&A, Product Management, Product Marketing, Marketing, Business Development as well as designing and transforming social and collaboration strategies for IBMs Top 100 accounts, Sabine has developed a unique vision on what is driving business success and growth in IBMs security business through successful integration of newly acquired companies that complement the organic security business. With Trusteer, Fiberlink, CrossIdeas, Lighthouse and Cybertap we expand our portfolio to new heights.In her previous role as CMO for the Software Group in Europe, she led the marketing and communication efforts for IBMs leading software brands. Prior to this, Sabine led the integration of several social and analytics acquisitions including Cognos Europe, SPSS and Bowstreet.

Ken WestinKen Westin has over 15 years of experience in technology with an emphasis on security. As Security Market Specialist at Splunk he works with businesses to better understand how to leverage security analytics to increase their security posture and operations through automation and data insight. Over the course of his career Westin has developed patented forensic technologies to aid law enforcement in tracking criminals online and trained security leaders on various security and privacy related topics. His work has been featured by BBC, New York Times, Forbes and other publications, as well as appearing as a subject matter expert on Bloomberg, NBC News, Fox News and other media outlets.

No photo availableAllison Wikoff is an information security professional with over 10 years in information security with a focus on intelligence work. As a Senior Intelligence Analyst and Security Researcher for the Dell SecureWorks Counter Threat Unit™ (CTU) research team, she creates actionable intelligence information for delivery to internal and external clients and provides direction for Dell SecureWorks Threat Intelligence Management System (TIMS). Prior to joining Dell SecureWorks, Allison performed incident response/threat intelligence analysis and managed large and small-scale infrastructure, application, and organizational penetration tests as a member of a large, private organization’s national incident response team. She previously held information security positions within financial, healthcare and manufacturing organizations.

Rick Wilson, Ph.D.Rick Wilson, Ph.D., has been a faculty member in OSU’s Spears School of Business for 25 years, presently serving as Chair of the Management Science and Information Systems Department. Prior to earning his Ph.D. from the University of Nebraska-Lincoln, Dr. Wilson worked for a number of years in industry as an IT professional in the telecommunications industry. He is most well-known in academia for his research in the data sciences, including sports analytics, and has won over a dozen teaching and leadership awards throughout his career.

  • The conference is designed for senior-level leaders, human resource and information technology management and professionals, operational technology specialists, systems and data administrators, and other business leaders involved in the decision-making process for cyber security strategy, implementation and management.
  • The conference will be beneficial to those in a range of industries including: legal practices, accounting firms, insurance brokers, personal information suppliers, wholesalers, public sector suppliers, schools, and colleges, and those involved in decision making on or delivery of cyber security in central government, local government, police and fire services, health services, and education.

  • Program format – 8am – 5:30pm conference
  • CPE credits/CEU credits available
  • Location – COX Convention Center (Map), Oklahoma City, Oklahoma
  • Price
    Cyber Security Conference only – $225 per person
    Cyber Security Conference and General Keith Alexander Executive Management Briefing $275 per person
    Multiple registration discount available.
  • Sponsorship Information:
    Sponsorship opportunities are available. Become a Sponsor.
  • Cancellation Policy:
    If a participant would like to cancel her/his registration less than 10 days prior to the conference, you are welcome to send a substitute. All guarantees have been submitted to the hotel, so refunds are not attainable. A refund is available given notification no later than 11 days prior to the conference. If you are transferring your registration to a colleague, please contact the OSU Center for Executive and Professional Development at 1-866-678-3933 or
  • For additional information or to sponsor:
    Sarah Williams, Program Coordinator, Center for Executive and Professional Development
    Oklahoma State University, 215 Business Building
    Stillwater, OK 74078-4011 USA
    Toll free: 866-678-3933
    Telephone: 405-744-5208