MCRCon 2017
The Henry, Dearborn, MI  |  May 18, 2017
Thank you to all of the attendees and sponsors of this sold out event!

The 21st century organization is changing rapidly. Economics, business trends, technological evolution, workplace preferences and the growing sophistication of cyber threats are all factors contributing to an adapting organizational climate. Educators, governments, nonprofits, libraries, security professionals and businesses face challenges like connecting global workspaces, security in the age of BYOD, policy management in an “always on” culture, cloud networking, the changing landscape of digital collaboration and more.

The Michigan Cyber Range Conference was held on May 18th at the Henry in Dearborn, MI, addressing many of these topics while providing attendees the opportunity to network with industry experts, Merit community members and professional peers.
The MCRCon agenda also featured a Capture the Flag event with participants competing for over $600 in prizes. Chris Meyer of Fowlerville High School won the CTF competition. Chris trains at the Pinckney Cyber Training Institute.
Following the conference, on May 19th a number of special-topic multi-hour workshops were held.
KEYNOTE SPEAKERS
|
Marcel Gagne
Marcel Gagné
Writer and Free Thinker
Linux Journal
How Open Source Destroyed the Past, Created the Present, and Will One Day, Save the Future

We are living in a world built on, and by, Open Source. Every Web page we visit, every message we send, every video we watch, every second of our connected lives owes its existence to an idea that’s part technology, part ideology, and part philosophy. That idea would eventually infect millions, tearing down old business models, cultures, and even livelihoods, as it went. It’s an idea that would redefine the meaning of ‘free’ and ‘freedom’. But it would also create the world we live in, a world that is still struggling to adapt to the changes, a world where the idea that is “free and open” will, in time, define the future.

Marcel Gagné is the author of the “Moving to Linux” series of books, a regular columnist for several tech magazines, a public speaker, radio and television personality, and a well known voice in the Linux and open source universe.
Kristin Judge
Kristin Judge
Director of Special Projects
& Government Relations
National Cyber Security Alliance
Security Awareness is a Shared Responsibility: Have You Pitched in Today?
Everyone has a role to play in securing the cyber ecosystem. Whether you are a technologist, parent, student, CEO, elected official or grandmother you can do something today to improve the Internet experience for all of us. Learn about some basic best practices and many free resources to impact cybersecurity at home, work and play. Leave this session with a list of tips and activities ready to be shared!
Kristin was elected to serve as a Washtenaw County Commissioner in 2008 and supported the U.S. Department of Homeland Security in growing cybersecurity outreach to state and local government officials. After elected office, she worked at the Center for Internet Security, focusing on connecting state and local governments to federal services and technology needed to improve cyber security. As Director of Government Affairs at the National Cyber Security Alliance, Kristin has worked with Google, FTC, FBI, SBA, congressional leaders and other key stakeholders across the country to educate consumers and businesses how to protect sensitive data. In February 2016, NCSA was named a White House partner for authentication education in President Obama’s Cybersecurity National Action Plan (CNAP) after Kristin’s leadership to create the NCSA “Two Steps Ahead” national program. As a thought leader, Kristin has been seen on the C-SPAN Network, local news outlets and called on by technology publications like SC Magazine and Government Technology to share best practices for online safety. In 2017, Kristin was chosen for the 3rd cohort in the Presidential Leadership Scholars program which is a partnership between the presidential centers of George W. Bush, William J. Clinton, George H.W. Bush, and Lyndon B. Johnson to bring together a select group of leaders who share a desire to create positive change across our Nation.
Chris Roberts
Chris Roberts
Chief Security Architect
Acalvio Technologies
Hillbilly BBQ: Putting your Rail Networks to Use to Facilitate our Party

This presentation took longer to put together than it takes to break into most of the US railway infrastructure.

Chris Roberts is the chief security architect for Acalvio Technologies, helping to drive technology innovation and product leadership. Roberts directs a portfolio of services within Acalvio designed to improve the physical and digital security posture of both enterprise, industrial and government clients. In addition, Roberts works to shape the next generation of deception platforms and helps companies with their maturity modeling and overall security solutions.
 
MAY 19TH WORKSHOPS
|
Security on a Shoestring
Jason Brown
Chief Information Security Officer
Merit Network
With the cost of security products and services skyrocketing, how can organizations afford to protect themselves?

While larger organizations are able to purchase the necessary equipment and hire security staff, small and medium sized businesses have difficulty keeping up. Hackers are very aware of this trend and are now targeting these smaller organizations with gaps in their security plan in the hopes of pulling off a successful breach.

Gartner is predicting that prices will continue to rise for security protection and firewall services. The industry could see as much as $170 billion in growth over the next four years.

What steps can organizations with budgetary restrictions take to protect themselves?

Learn how to implement free and low-cost effective solutions within your organization such as:
• Security Frameworks
• Implementation of Risk Management
• Use of Open Source Security Tools
• Information Sharing and Threat Intelligence

Turning Up the Volume on Engagement
Fredricka Joyner
Senior Leadership & Organization Development Consultant
ADVISA
The world of work is becoming increasingly complex and competitive due to ever-changing technology, globalization, environmental concerns, resource constraints, and a host of other issues. At the same time, the labor force is shrinking as a result of shifting generational patterns and a widening skills gap. This combination of variables has created an unprecedented set of dynamics – a perfect storm – in almost every business environment. In the face of the dynamic tension caused by these factors, attracting and retaining top talent is of critical importance. This workshop will explore how companies can respond strategically by turning up the volume on engagement.

Through participation in this interactive session, participants will be able to:

  • connect business and personal strategic challenges to the need to focus on engagement
  • describe the elements of the current business environment that are coming together to create the strategic imperative for engagement
  • describe the role of the manager in creating and supporting a high-engagement work culture
  • take specific action to strengthen elements of engagement in their sphere of influence
  • identify aspects of the organization’s culture that can be strengthened or enhanced to turn up the volume on engagement
  • identify opportunities for personal development related to turning up the volume on engagement.

Participants will leave the session armed with an understanding of the strategic backdrop, a useful conceptual model, a set of sample strategies and a handful of specific actions for turning up the volume on engagement in the arenas where they work.

CONFERENCE AGENDA
|

Time
Room
Topic
Presenter

8:00-8:45 a.m.
Presidential Ballroom & Lobby
Breakfast and Registration

8:00-3:00 p.m.
Plaza & Presidential Lobbies
Sponsor Tables

9:00-4:30 p.m.
Room II
Members’ Lounge

9:00-3:00 p.m.
Room III
Capture the Flag

8:45-9:00 a.m.
Presidential Ballroom
Opening Remarks
Dr. Joe Adams, Merit Network

9:50-10:10 a.m.
 
Transition

10:10-11:00 a.m.
Plaza Ballroom A
Web Security: Tales from the Field
Michael Hess, University of Michigan

10:15-11:00 a.m.
Plaza Ballroom B
Taking Flight in Northern Michigan
Dawn Stone & Brian Dawson, Alpena Community College

10:15-11:00 a.m.
Room I
Exploring the Future of Cloud Vendor Security Assessments
Nick Lewis, Internet2

10:15-11:00 a.m.
Directors Room
Sponsor Presentation: Ransomware Education and Defense 101
Greg Cooper, Cisco

10:15-11:00 a.m.
Delegate Room
Sponsor Presentation: Exploring the Capabilities and Economics of Cybercrime
Jim Walter, Cylance

11:00-11:10 a.m.
 
Transition

11:10-12:00 p.m.
Plaza Ballroom A
No One in the Middle: Enabling Network Access Control via Transparent Attribution
Jeremy Erickson, University of Michigan

11:10-12:00 p.m.
Plaza Ballroom B
Two-Factor to Ten Thousand Users
Kevin Hayes and Kristine Theobald, Wayne State University

11:10-12:00 p.m.
Room I
Governor’s High School Cyber Challenge
Dr. Joe Adams

11:10-12:00 p.m.
Directors Room
Sponsor Presentation: How to Maintain your Cybersecurity Strategy as you Migrate to the Cloud
Greg Kreiling, Palo Alto Networks/AmeriNet

11:10-12:00 p.m.
Delegate Room
Sponsor Presentation: Usable and Effective Security for Empowered Users, Cloud, Mobile and BYOD
Steve Edwards, Duo Security

12:00-12:45 p.m.
Presidential Ballroom, and Lobby
Lunch and Screening of the Newest Cyber Range Movie

12:00-3:00 p.m.
Outdoors
Drone Demonstrations
Drone tours start at noon and will continue at the start of each hour

1:30-1:40 p.m.
 
Transition

1:40-2:30 p.m.
Plaza Ballroom A
Inside The Threat Actor Studio
Aamir Lakhani, Doctor Chaos Research

1:40-2:30 p.m.
Plaza Ballroom B
The Hidden Risks of Not Implementing an Enterprise Risk Management Framework
Jason Brown, Merit Network

1:40-2:30 p.m.
Room I
Modernizing a Legacy Backup system into a Private Cloud Solution
Alex M. George and Robert Hogle, Wayne State University

2:30-3:00 p.m.
Room II and Lobby
Sponsor Passport Time & Collection and Refreshment Break

3:00-3:50 p.m.
Plaza Ballroom A
Why Am I Under Attack?
Jacob Brabbs, Merit Network

3:00-3:50 p.m.
Plaza Ballroom B
Bridging the Cybersecurity Talent Gap
Trpko Shawn Blazevski, Amanda LaBelle and RJ Fischer, CyberOU

3:00-3:50 p.m.
Room I
Analyzing NextGen Security Practices and Security Tools
Dr. Jared DeMott, VDA Labs

3:50-4:00 p.m.
 
Transition

4:50-5:20 p.m.
Presidential Ballroom
Closing Remarks and Passport Drawings
Dr. Joe Adams, Merit Network

5:20-7:30 p.m.
Presidential Lobby
Cocktail Reception


Time
Room
Topic
Presenter

8:00-8:30 a.m.
Presidential Ballroom & Lobby
Breakfast and Registration

8:30-11:30 a.m.
Plaza Ballroom A
Turning Up the Volume on Engagement
Fredricka Joyner, ADVISA

8:30-11:30 a.m.
Plaza Ballroom B
Security on a Shoestring
Jason Brown, Merit Network



COMMUNITY SUPPORTERS

|

ADVA Optical Networking
Juniper Networks
SILVER SPONSORS
|

Access Interactive
Advisa
Aerohive
AmeriNet
Carahsoft and VMware logos
Cisco
Cyber World Institute
Cylance
Duo Security
Lenovo
Palo Alto Networks
 
BRONZE SPONSORS
|

ADTRAN
Arista Networks
Aspen Wireless
AT&T
CDW-G
Howard Technology Solutions
Imperva
Nutanix
Proofpoint
Telnet Worldwide
Veeam
BASIC SPONSORS
|

CDW-G
ECI
VMware
VIDEO SPONSOR
|


Zscaler

WORKSHOP SPONSOR
|


No Starch Press