Register For This Event

About the Event

As geopolitical tensions continue to rise and threat actors are more driven for success than ever before, DDoS attacks are increasing in quantity, scope, and complexity.  The days of old are gone and its imperative that security leaders understand the dynamic nature of today’s DDoS attacks.  Join VCSP and NETSCOUT Arbor as we explore the shift change in the DDoS attack landscape and how to evaluate your vulnerability to DDoS attacks.

Date & Time:

March 21, 2024 | 12 - 1 PM

Meet the Speaker


 

Richard Hummel, Senior Threat Intelligence Manager | NETSCOUT

 

 

 

 


Register For This Event

About the Event

The AWS Security Reference Architecture (AWS SRA) is a holistic set of guidelines for deploying the full complement of AWS security services in a multi-account environment. It can be relied upon to help design, implement, and manage AWS security services so that they align with industry accepted practices. The recommendations are built around a single-page architecture that includes AWS security services. In this session, learn about the AWS SRA and how you and your team’s might rely on the AWS SRA to design and secure your cloud hosted workloads. Also learn how they help achieve security objectives, where they can be best deployed and managed in your AWS accounts, and how they interact with other security services.

Date & Time:

June 1, 2023 | 12 - 1 PM

About Manny Landron


 

VP- Cloud Security | Enabling teams to adopt and secure AWS cloud leveraging automation as a work force multiplier.

 


Register For This Event

About the Event

The use of Generative AI has exploded in the last year, surprising and delighting most consumers in its rise from relative obscurity. Every day there’s a new product or service taking advantage of Generative AI, and it seems that if you don’t use them you’ll be left behind. In this session we’ll look at how this AI revolution occurred, the risks and benefits of using Generative AI services, and some key tooling capabilities and best practices for governance and control in a business environment.

Date & Time:

November 16, 2023 | 12 - 1 PM

Meet the Speaker


Patrick McNeil

Senior Security Architect,  GuidePoint Security

Patrick is a Sr. Security Architect for GuidePoint Security, specializing in application security and DevSecOps programs, API Security, and AI / ML. His background includes software development, system architecture design, network engineering, and security in the defense, banking, and telecom industries. Patrick is a hacker and #telephreak at heart, passionate about teaching and mentoring. He has shared his knowledge at a number of conferences, including DEFCON, DerbyCon, BSidesLV and local BSides events, CarolinaCon, CackalackyCon, regional OWASP meetings, and various telecom industry and fraud prevention forums. Patrick enjoys growing his local security community by volunteering with BSidesRDU and CackalackyCon, and is the president of a nonprofit Oak City Locksport.

 

 

 

 


Register For This Event

About the Event

Join us on October 5th from 12-1 PM for the latest on where our cyber-attack surface is growing and how to reduce the risk posed by key cyber threats from nation states to critical infrastructure to malicious use of  AI.  We are fortunate to have a panel of front-line subject matter experts who will share their knowledge of the cyber threat challenges they face every day.

Date & Time:

October 5, 2023 | 12 - 1 PM

Meet the Speakers


Panelists:

Chris Cope,  Field Supervisor, FBI

Sean Stalzer, Director, Cyber Security, Dominion Energy Services

Lance James, Founder and CEO of Unit221B,  Former Deloitte Head of Cyber Intelligence, and Chief Scientist for Flashpoint

Moderator:

Beth Bergin Waller, Chair, Cybersecurity and Data Privacy
Practice, Woods Rogers Vandeventer Black

 

 

 

 


Register For This Event

About the Event

The rapid scaling of quantum computers is approaching an inflection point, with profound implications for multiple industries. The business advantage is insurmountable in pharmaceutical, finance, energy, intelligence, and many other fields. It will separate the haves from the have-nots to become market leaders. The dark side is the impact to virtually all digital networks today, including all the cybersecurity tools used to protect modern enterprise and critical infrastructure. The issue is “harvest now, decrypt later” which enables the future exploitation of any data collected today and before a transition to post-quantum cryptography. However, there are powerful solutions and tools to begin preparing now.

Date & Time:

March 9, 2023 | 12 - 1 PM

Meet the Speaker


 

Denis Mandich, CTO of Qrypt

 

 

 

 


Register For This Event

Date & Time:

November 17, 2022 | 12 – 1 PM

About our Speakers


 

Jason Ancarrow, AVP of Enterprise Cybersecurity for CarMax

 

Jason Ancarrow is AVP of Enterprise Cybersecurity for CarMax where he leads Cybersecurity Operations and Security Architecture. He also serves on the Advisory Board for the VCU Cybersecurity Center. In addition, Jason serves as the President of the CarMax Foundation, which directs the CarMax Foundation’s work to promote the causes CarMax Associates care about to impact the communities where they live and work. Jason was commissioned as an Officer out of college and completed his commitment with the Virginia Air National Guard. His Technology career spans over 20 years in program management, information security operations, and consulting with organizations such as AOL, Capital One, IBM, US Army, and the FBI.

 

He holds a BA in Economics from the Virginia Military Institute (VMI) and a MS in Information Security and Assurance from Norwich University. Jason also serves on the Board for the American Red Cross Capital Region and the Advisory Board for the VCU Cybersecurity Center and Torchlight.ai.

 


Ron Buchanan, Information Security Officer for Atlantic Union Bank

 

Ron Buchanan joined Atlantic Union Bank in 2016 as the Information Security Officer. Prior roles include Senior Director of Information Security Operations at Capital One and Vice President of the CyberCrime Investigations for State Street Bank. Ron has over 20 years’ experience in cyber security including incident response, forensics, eDiscovery, encryption, and investigations. Ron’s primary mission continues to focus on protecting assets, stakeholders, and intellectual property from cyber threats, while enabling the business to operate with flexibility and full situational awareness.

 

Ron has a BS in Business Management & Finance from Northeastern University and a Master of Science in Information Assurance from Norwich University. Ron has obtained certifications as a CISSP, CISM, and EnCE (Encase Certified Examiner). Ron is also a member of ISSA, and the FBI’s InfraGard and Citizens Academy programs. Ron serves on the Board of the Virginia Cyber Security Partnership.

Register For This Event

Date & Time:

October 27, 2022 | 12 – 1 PM

About our Speaker


 

Rob Hankison, Cyber Security Specialist Leader at Deloitte

 

Rob Hankinson is a Cyber Security Leader for Deloitte, specializing in advising federal agencies and states on how to transition to a Zero Trust architecture. Rob has over 25 years of cyber security experience, most of which is as a director for information technology for the U.S. Department of State. Rob also spent some time with the Office of Management and Budget’s (OMB) Office of the Federal CIO where he helped shape federal policy regarding IT security and communications.

Date:

July 13, 2022

Time:

1 – 4 PM


Schedule:

1:00 - Welcome by VITA
1:15 - IT Security in the Hybrid World with Randy Marchany / Virginia Tech
2:00 - MACH37 Introduction with Mike McCoy / MACH37
2:10 - Problems, Solutions, Use Cases and Traction by MACH37 Cohorts
3:10 - From the Trenches / Call-in from Kyiv, Ukraine with Hideez
3:55 - Upcoming Events by VITA
4:00 - Adjourn

Session Details

"IT Security in the Hybrid World" w/ Randy Marchany

The hybrid work world has required us to change our security architectures to adapt to an environment where organizations have limited visibility to endpoints. This shift incorporates strategies involving zero trust principles, moving away from network-basedIDS/IPS as line speeds increase, and vulnerability management/scanning of external networks. The era of corporate network boundaries is ending.

MACH37 Introduction + Cohort Presentations

MACH37 is a start-up accelerator designed to facilitate the creation of the next generation of cyber product companies.

5 Cybersecurity companies (cohorts) participating in MACH37 will present 12 minutes each on their problem, solution, use cases and traction they have made since graduating from MACH37.

"From The Trenches"

Hideez a MACH37 graduate company will describe how they are helping defend critical infrastructure from Russian cyber attacks.