• Download Our Latest Case Study

  • Download RoundTower's Company Overview

2017 Ohio Information Security Conference – RoundTower Technologies 2017 Ohio Information Security Conference – RoundTower Technologies

march, 2017

15mar7:30 am5:30 pm2017 Ohio Information Security Conference


Event Details

Technology First invites you to join the 14th Annual Ohio Information Security Conference.

Click Here to Register

Technology First invites you to join us for our 14th Annual Ohio Information Security Conference.  The conference will focus in four areas/tracks: management, technical, implementation, and workforce development.  The audience will be managers responsible for security policy and administrative decisions and technicians responsible for security implementation and effectiveness.

Interested in becoming a Sponsor? Sponsorship Opportunities
Interested in Exhibiting?  Exhibitor Opportunities

Keynote Speakers:

Breakfast Keynote: The Worst Cyber Threat is often the most overlooked… the Malicious Insider
Robert Schuetter, CISO, VALVOLINE

Bob Schuetter Most cyber security teams are focused on the external threat actor and for good reasons.  But who owns the insider threat?  The physical security team, the cyber team, somewhere in the middle with little focus?  Mr. Schuetter will cover the success and failures of implementing insider threat programs in companies with high intellectual property value.  As a former CSO owning both the cyber and physical security teams, he will cover the gaps of these two security mindsets and provide some case file examples when things go right.

Lunch Keynote: Security Intelligence & Threat Analytics in the Energy Sector
Jeff Ochester, CISSP, Manager, Physical & Cyber Infrastructure Security, THE AES CORPORATION

Jeff Ochester Cyber and physical threats to the Energy Sector continue to evolve in their scope and ability. AES has responded by adopting compliance requirements and diligent intelligence-based threat analytics to recognize risk and deploy proper protection measures. This presentation will provide an outline of how intelligence and threat analytics are being performed to protect assets against cyber and physical threats within the Energy Sector. Gain learnings from our cyber-security program approach, which is based on protecting the confidentiality, integrity, and availability of data. And hear about how you can lower risk by monitoring and analyzing threats to better leverage your people and security architecture.


(Wednesday) 7:30 am - 5:30 pm EST


Sinclair Community College

444 W 3rd St Dayton, Ohio 45402

Comments are closed.