Vulnerability affects the bottom line of the region’s businesses.
Cyburgh, PA Initiative aims to advance Pittsburgh as an internationally recognized leader in cybersecurity.
Through presentations and idea exchanges, Cyburgh is a forum for cybersecurity professionals to engage with and learn from peers, thought leaders, and solution providers.
About Cyburgh, PA Initiative
Now in its sixth year, Cyburgh is a multi-day, virtual event. At Cyburgh, you’ll hear from thought leaders and subject matter experts from Pittsburgh and beyond. Our focus will be on the business and strategic areas that leaders and technical professionals need to know about.
When: May 25 to May 27, 2021 | 9:00AM to 12:00PM
Speakers – More to be announced!
Just Announced! Closing Keynote
Gregory J. Touhill, Director, CERT Division, Software Engineering Institute (SEI)
Newly appointed in April of 2021, Greg Touhill is the director of Carnegie Mellon University’s SEI’s CERT Division. Touhill was appointed by former President Barack Obama to be the first chief information security officer (CISO) of the United States. Previously he served in the Department of Homeland Security (DHS) as deputy assistant secretary, Office of Cybersecurity and Communications, National Programs and Protection Directorate. Most recently he was president of Appgate Federal, a provider of cybersecurity services to government defense and civil agencies.
May 25: Changing Minds and Attitudes – How to Be a Change Maker for a Secure Supply Chain
Not all companies have a CISO, but all companies are vulnerable to threats and attacks from malicious actors. This panel of experts will discuss strategies to bring your entire supply chain onto the same team when it comes to cybersecurity. From overcoming employee apathy and working with outside vendors/customers to gaining management and board buy-in, we’ll discuss strategies to foster a comprehensive culture of security throughout your company’s ecosystem.
Panelists (More to be announced)
• Christopher Fry, CISSP, Cybersecurity Program Manager, compunetix, inc.
• Shari Gribbin, Advisory Solutions Partner with Arch Access Control, CNK Solutions
• Richard Platts, CETL, Director of Technology and Innovation, North Allegheny School District
• Mark Vescovi, CIO, Liberty Tire Recycling
Moderator: David Kane, CEO, Ethical Intruder
May 26: Resiliency in Cybersecurity - Sponsored by GrayMatter
Fighting cyber threats and data breaches is a job that never ends. A comprehensive resilience strategy takes planning, monitoring, a robust incidence response, and recovery. This panel will discuss best practices and lessons learned from the cybersecurity leaders who live and breathe this strategy. Learn how to best prepare and react so you know what to do when this happens to your company.
- Dr. Trebor Z. Evans, PMP, CCISO, CDPSE, Senior Vice President and Chief Information Security Officer (CISO), Dollar Bank
- Jay Saludis, CISSP, CISM, Director Information Security, 84 Lumber
- Peter Zwieryznski, CISSP, Information Security Architect, Koppers Inc.
Moderator: Scott Christensen, Cyber Practice Lead, GrayMatter
May 26: Cybersecurity Maturity Model Certification (CMMC) – Navigating through the Murky Waters of Certification - Sponsored by Schneider Downs
CMMC is an important, but vast certification affecting many of our region’s companies. For companies works with the Department of Defense, this audit ensures that there are appropriate levels of cyber security controls and processes in place to protect controlled unclassified information. This panel will dive into the nuances and best practices of obtaining this certification directly from the source of its creation, CERT and Johns Hopkins University. Connected with these experts, we’ll here industry perspectives from those who have gone through the process and the lessons they learned.
Panelists: (More to be announced)
- Gregory Crabb, Principal Consultant, SideChannel & Founder of 10-8, LLC (former CISO of the USPS)
- Troy Fine, Senior Manager, Risk Advisory Services, Schneider Downs
-Sam Merrell, CISSP, Director, Global Information Security & Compliance, Kennametal
- Katie Stewart, Senior Member of the Technical Staff, CERT Division | SEI | Carnegie Mellon University
Moderator: Matthew Butkovic, CISA, CISSP, Technical Director- Cyber Risk and Resilience | CERT Division | SEI | Carnegie Mellon University
May 27: The Evolution of Enterprise and Personal Networks - Sponsored by Expedient
The progression of moving from data center to hybrid, cloud, and multi-cloud is in full speed. From micro-segmentation and zero trust architecture to AI integration and process automation, these tools and strategies help companies stay ahead of increasingly sophisticated threats. With the proliferation of remote/hybrid work and digital transformation initiatives, there are many more devices to secure across multiple networks. This panel will discuss how cybersecurity is constantly evolving and will help you keep you up with the latest trends.
Panelists: (More to be announced)
- Craig Burland, Sr Manager Cyber Security Operations, Eaton
- F. Iman Joshua, Head of Information Security, Vimeo
- John Ramsey, CISO, National Student Clearinghouse
- Satish Shetty, CIO, ANSYS
Tuesday, May 25: ATO ASAP: Automating Federal ComplianceATO ASAP: Automating Federal Compliance
Creation of a System Security Plan - fundamental to achieving an Authority to Operate - is toil with results often aimed more for compliance than security. Learn about the free open-source tools and component libraries available to the private sector, to cut costs while enhancing security and verification.
Presented by Fen Labalme, CISO, CivicActions
Wednesday, May 26: Why Firms Need a Security Incident Response Plan
Having a plan for cybersecurity incident response activities enables your team to control the chaos and stress that an incident can create within an organization. It’s why preparation is the first phase, it’s the foundation of the SIRP. Creating the plan, assigning roles and responsibilities, and preparing for what to do during the various phases will help your team to develop the operational maturity that will help to reduce the impact that a security event has on an organization.
Presented by Keith Arnold, Vice President, Advanticom
Wednesday, May 26: Why All Businesses Should Formalize Their Cybersecurity Program
Whether you're a small business or large enterprise, everyone is a target for threat actors across the world. The market for security solutions has grown exponentially making the task of addressing cybersecurity complex. In this session we'll cover the benefits of a cybersecurity program and how you can design, build, and maintain a program fit for to your business regardless of your size, industry, budget, or complexities.
Presented by Michael Yates, CISO, All Lines Technology
Thursday, May 27: Beyond the Buzzwords: Clearing up the Confusion around Zero Trust
While it has been around for more than a decade ‘zero trust’ is one of the most misused terms in the industry today. As zero trust heightened its status as a ‘buzzword’, the term became overused and caused confusion. This presentation aims to clear up the confusion around zero trust by discussing and defining the principles of zero trust and how adopting a zero trust model may help increase your organization’s cybersecurity posture.
Presented by Eric Cornelius, Chief Product Officer at iboss
Who Should Attend?
Chief Executive Officers, Chief Operations Officers, Chief Information Officers, Chief Information Security Officers, Chief Privacy Officers, Practitioners, Business Leaders, IT Managers and those who want to learn about the challenges and opportunities within cybersecurity.
This program is applicable to all audiences: corporations, small business, academic institutions and public sector - especially those interested in learning how to protect your business and mitigate risk.
As vulnerability affects the bottom line of our region’s business, it’s critical to stay on top of the latest threats and trends.
• Cyburgh is a learning opportunity for IT and security leaders.
• Cyburgh is a forum for the Pittsburgh IT community to network.
• Cyburgh connects attendees to partners that may help keep their business secure and protect their customers and bottom line.
• Cyburgh brings outside perspectives to the Pittsburgh IT community.
Agenda: (subject to change)
Tuesday, May 25, 2021
8:45 AM | Welcomes and Introductions
9:15 AM | Keynote Speaker
10:00 AM | Panel Discussion: Changing Minds and Attitudes – How to Be a Change Maker for a Secure Supply Chain
11:00 AM | Networking Round Tables
11:30 AM | Breakout Speakers
12:00 PM |End of Program
Wednesday, May 26, 2021
9:00 AM | Technical Keynote: Ethical Intruder
9:30 AM | Panel Discussion: Resiliency in Cybersecurity - Sponsored by GrayMatter
10:30 AM | Panel Discussion: Cybersecurity Maturity Model Certification (CMMC) – Navigating through the Murky Waters of Certification - Sponsored by Schneider Downs
11:30 AM | Breakout Sessions/Round Tables - Sponsored by All Lines Technology
12:00 PM | End of Program
Thursday, May 27, 2021
9:00 AM | Panel Discussion: The Evolution of Enterprise and Personal Networks - Sponsored by: Expedient
10:00 AM | Breakout Sessions
10:30 AM | Round Table Discussions
11:00 AM | Closing Keynote
12:00 PM | End of Program
FREE | PTC Members
$299 | Non Members
Thank You to our Sponsors!