The 2018 Mississippi College Cybersecurity Summit is a conference designed to engage, educate, and raise awareness about cybersecurity across the nation.

Maeghin Alarid

Lead Policy Analyst

Anti-Terrorism SME, Specialized Risk, Colorado Springs, CO

Mark Goldman

Partner and Co-Founder

The Salus Group, Atlanta, GA

Greg Hofstrand

COO and Director SETA Operations

Independent Software, Baltimore, MD

Wesley McGrew, Ph.D.

Director of Cyber Operations

Horne Cyber, Memphis, TN

Thomas P. Ring II

HPCMP Red Team Lead / J2 Lead, High Performance Computing Modernization Program (HPCMP)

U.S. Army Corp of Engineers, Vicksburg, MS

J. Craig Lowery

Research Director

Gartner

Billy Conn

Chief Architect

EdgeTheory, Ridgeland, MS

Alina Ng

Professor of Law

Mississippi College, Jackson, MS

Dr. April Tanner

Associate Professor, Electrical & Computer Engineering and Computer Science

Jackson State University, Jackson, MS

Scott Marticke

President

Breakaway Consulting, Atlanta, GA

Trent Townsend

Chief Executive Officer

Next Step Group, Inc., Clinton, MS

Harper Maddox

Chief Technology Officer

EdgeTheory, Ridgeland, MS

Brian Walls

Territory Manager

Check Point Software Technologies, Ltd., Tupelo, MS

J.C. Hiatt

Software Consultant

Jackson, MS

R. David Harwell, MBA, CISM, CISA, ITIL

Operational Risk Consultant

Wells Fargo, Jackson, MS

Chris Fortenberry

Security Engineer

Check Point Software Technologies, Ltd., Tupelo, MS

Ryder Taff

CFA, CIPM

New Perspectives, Inc., Ridgeland, MS

Jay White

Director, Security Services Division

MS Department of Information Technology Services, Jackson, MS

Eric Jansen

Executive Vice President

Independent Software, Baltimore, MD

Industries and Topics

The 2018 Cybersecurity Summit will provide valuable cybersecurity tools and resources for a variety of industries and topics, including:

  • Critical Infrastructure
  • Healthcare
  • Government
  • Education
  • Large & Small Business
  • Bitcoin/Cryptocurrency

Schedule

Tuesday, April 10

7:00 p.m.
Swor Auditorium, Nelson Hall
Community Opening Plenary Panel Cyber Risk is Personal: Who is Watching Me? Maeghin Alarid, Craig Lowery, and Trent Townsend

Wednesday, April 11

7:30 a.m. - 8:00 a.m. Anderson Hall, B.C. Rogers Student Center Breakfast, Networking, Registration
8:00 a.m. - 8:10 a.m. Welcome & Opening Remarks Dr. Lee Royce – President, Mississippi College
8:10 a.m. - 9:00 a.m. Keynote Address “Virtual Lure: The Strategic Use of the Internet” Maeghin Alarid – Anti-Terrorism SME, Specialized Risk
9:10 a.m. - 9:55 a.m. Anderson Hall, B.C. Rogers Student Center Breakout Session 1 “Malware, Critical Infrastructure and Public Policy” Dr. Alina Ng-Boyte – Professor of Law, Mississippi College School of Law
9:10 a.m. - 9:55 a.m. Swor Auditorium, Nelson Hall Breakout Session 2 “Digital Forensics” Dr. April Tanner – Associate Professor, Electrical & Computer Engineering and Computer Science, Jackson State University
9:55 a.m. - 10:15 a.m. Networking Break U.S. Army Cyber Vehicle will be available for tours
10:20 - 11:05 a.m. Plenary Address "Cloud Security Myths" Dr. Craig Lowery - Research Director, Gartner
11:10 a.m. - 11:55 a.m. Anderson Hall, B.C. Rogers Student Center Breakout Session 1 "Vendor Risk and Risk Management" R. David Harwell, Jr., MBA, CISM, CISA, ITIL - Operational Risk Consultant, Wells Fargo
11:10 a.m. - 11:55 a.m. Swor Auditorium, Nelson Hall Breakout Session 2 "Cybersecurity Trends for 2018" Brian Walls & Chris Fortenberry - Checkpoint Software Technologies, Inc.
11:55 a.m. - 1:10 p.m. Lunch & Plenary Panel "Bitcoin, Blockchain, & Cryptocurrency" Panel Moderator: Joe Stradinger - CEO/Founder, EdgeTheory
Panel Members
Billy Conn - Chief Architect, EdgeTheory
J.C. Hiatt - Software Consultant/Founder, Hiatt Consulting
Greg H. Hofstrand – Chief Operating Officer, Independent Software
Harper Maddox – Chief Technology Officer, Edgetheory
Ryder Taff – CFA, CIPM, New Perspectives, Inc.
1:15 p.m. - 2:00 p.m. Plenary Address “Cybersecurity: It’s Not Just Your Data That’s At Risk” Mark Goldman – Partner and Co-Founder, The Salus Group
Scott Marticke – President, Breakaway Consulting
2:05 p.m. - 2:50 p.m. Plenary Address “Advantages of Penetration/NIST Testing of Corporate and Government Systems” Greg H. Hofstrand – Chief Operating Officer, Independent Software
Eric Jansen - Executive Vice President, Indepedent Software
2:55 p.m - 3:40 p.m. Anderson Hall, B.C. Rogers Student Center Breakout Session 1 “Regulations, Policy, Protection in the Banking Industry” Jean Bourassa, Information Security Manager, Regions Bank Cyber Operations
Jack L. Izor, VP-Manager, Information Security Governance, Regions Bank
2:55 p.m - 3:40 p.m. Swor Auditorium, Nelson Hall Breakout Session 2 “State Government Perspective” Jay White – Director, Security Services Division, MS Department of Information Technology Services
Trent Townsend – Chief Executive Officer, Next Step Group, Inc.
3:40 p.m - 4:05 p.m. Networking Break US Army Cyber Vehicle will be available for tours
4:10 p.m. - 4:55 p.m. Plenary Address “Application of Offense-Oriented Techniques as a Means of Improving Security” Dr. Wesley McGrew – Director of Cyber Operations, Horne Cyber
5:00 p.m. - 5:45 p.m. Closing Plenary Address “Critical Infrastructure Cyber Security” Thomas P. (Pat) Ring II – HPCMP Red Team Lead / J2 Lead, US Army Corps of Engineers
5:45 p.m. Closing Remarks

Registration

Discounts are available to students and educators.

Registration Type Cost Register
General Admission $150 Register
Educators $75 Register
Students $30 Register
Title Sponsor Premier Sponsor Platinum Sponsor Gold Sponsor Silver Sponsor Bronze Sponsor Exhibitor
Complimentary Tickets 10 8 6 5 3 2 1
Exhibitor Table Check Check Check Check Check Check Check
Logo on event day materials Check Check Check Check Check Check Check
Logo on digital promotional materials Check Check Check Check Check Check
Recognition at event opening Check Check Check Check
Corporate banner on stage Check
Cost $5,000 $4,000 $3,000 $2,000 $1,500 $1,000 $700
Purchase Sponsorship Select Select Select Select Select Select Select

Accomodations

The following hotels are located minutes from the Mississippi College campus and are offering discounted rates to attendees.

Fairfield Inn & Suites

601.925.5750
$93 + tax / night
Mention: MC Cybersecurity Summit Group G1199

Hampton Inn

601.925.9393
$89 + tax / night
Mention: MC Cybersecurity Summit

Holiday Inn

601.708.0400
$89 + tax / night
Mention: MC Cybersecurity Summit

Comfort Inn & Suites

601.925.8250
$85.99 + tax / night
Mention: MC Cybersecurity Summit

© 2018 Mississippi College • For more infomation contact Dr. Melissa Wiggins, Event Coordinator • mwiggins@mc.edu • 601.925.3874

Maeghin Alarid

Maeghin Alarid holds an MA in International Security and Homeland Defense and a graduate certificate in Terrorism Analysis. She has six FEMA certifications in incident response and is a member of the Anti-Terrorism Accreditation Board as a Certified Master Anti-Terrorist Specialist. She was the lead policy analyst at the Institute for National Security Studies onsite at the Air Force Academy in Colorado Springs, working arms control, nonproliferation and strategic stability issues for the Air Force. She has over ten years of experience working for the Department of Defense, the Defense Threat Reduction Agency, and every branch of the military. She was a terrorism instructor at the Defense Nuclear Weapons School where she created the school's first course on Female Suicide Bombers. She was asked to present her research on Female Recruitment and Radicalization Online at the Women's Peace and Security Conference in 2015. Her research was published in the book, "Impunity: Countering Illicit Power in War and Transition" by the National Defense University. She has worked in countering violent extremism and social media monitoring for the last five years. She has experience in curriculum development and instruction as well as in Homeland Security and exercise planning. She has worked with State, Federal, and Military first responders as well as international students and has traveled to various military bases throughout the United States instructing response to radiological terrorism.

Mark Goldman

Mark Goldman is an accomplished Senior Executive, Entrepreneur, and Board Member with more than 35 years of success in the consumer products, travel, hospitality, retail, and financial services industries. Leveraging extensive experience with brand strategy and marketing innovation, Mark is a valuable asset for startups and existing brands looking for guidance on creative marketing innovation in a digital marketplace or expanding their portfolios into new areas. His broad areas of expertise include advertising, brand strategy & development, integrated marketing strategy, corporate governance and leadership, transportation, franchise brands, restaurants, luxury brands, collectibles, B2B, online/digital/social media marketing, sales, creative direction, new business development, and corporate governance.

Mark holds an MBA in Marketing and a BA in Business/Economics, both from George Washington University, Washington, D.C. He has served on the BOD for DuckHead Apparel; the Advisory Board for Metropolitan Atlanta Arts Fund; the Board of Advisors/Chair, Marketing Committee for Park Pride Atlanta, and on the Board of Trustees for The Atlanta Girls' School.

Greg Hofstrand

Greg Hofstrand is the COO and Director of SETA Operations for Independent Software responsible for managing the overall operations and growth of this critical business that supports the cyber intelligence and cyber warfare priorities of our national security clients

Prior to Independent Software, Mr. Hofstrand was the Vice President of Sotera's Cyber Solutions business, responsible for managing the operations and growth of this critical business that supports the cyber intelligence and cyber warfare priorities of our national security clients. Senior Vice President of Zytel Corporation, a specialist provider of cyber solutions to the national security community, acquired by GTEC on October 1, 2010. In this role, he was responsible for growing Zytel's business by 250% in just 2.5 years while managing all program operations, performance, recruitment and human resources.

Before Zytel, Mr. Hofstrand spent eight years working for L-3 Communications where he was responsible for managing major national security programs, becoming recognized as a leader in the management of large government contracts and projects in a diverse array of disciplines and functions. During his 34 years of experience working in the defense sector and intelligence community Mr. Hofstrand has held senior positions within Ford Aerospace Corporation, Harris Corporation and Sperry Support Services and has amassed significant experience in systems and software engineering.

Mr. Hofstrand studied architecture at the Washington State University, Pullman, Washington. Previously he was elected as Judge of Elections and Republican Committee Chairman for Hopewell Township in Pennsylvania.

Wesley McGrew

Dr. McGrew serves as director of cyber operations for HORNE Cyber. Known for his work in offense-oriented network security, Wesley specializes in penetration testing, vulnerability analysis, reverse engineering of malicious software and network traffic analysis.

Wesley is the author of penetration testing and forensic tools used by many practitioners. He is a frequent presenter at DEF CON and Black Hat USA. At the National Forensics Training Center, he provided digital forensics training to law enforcement and wounded veterans. As an adjunct professor he designed a course he teaches on reverse engineering to students at Mississippi State University, using real-world, high-profile malware samples. This effort was undertaken as part of earning National Security Agency CAE Cyber Ops certification for the university. He has presented his work on critical infrastructure security to the DHS joint working group on industrial control systems.

Wesley earned his Ph.D. in computer science at Mississippi State University for his research in vulnerability analysis of SCADA HMI systems used in national critical infrastructure. He served as a research professor in MSU's Department of Computer Science & Engineering and Distributed Analytics and Security Institute.

Thomas P. Ring II

Mr. Ring currently serves as the lead for the Red Team for the HPCMP as well as the J2, and SME Lead for the HPCMP CSSP. Mr. Ring has previously served as the HPCMP CSSP Manager and successfully led the HPCMP CSSP through its most recent reaccreditation effort.

Mr. Thomas P. Ring II has previously served as the Chief of the Computer Incident Response Team (CIRT), Chief of the CyberSecurity Division, and as the CyberTechnical Adivsor for the US Army Corps of Engineers (USACE). In these positions, Mr. Ring was the primary architect of the USACE security models and USACE security policies, and was responsible for directing the detection, response, and investigation for all intrusions across the global USACE enterprise, directing the forensic support team in the assistance with all USACE litigation efforts, user misuse investigations, and criminal support in coordination with USACE Offices of Counsel and other external governmental agencies including the EPA, DHS, DOJ, and DoD.

Mr. Ring has earned 4 Army Achievement medals, 1 Commander's Medal, numerous Commander coins and commendations, as well as the Meritorious Civilian Service medal recognizing his expertise, dedication, and superior performance in the realm of Defensive Cyber Operations (Incident Response, CCRI Support, Forensic and Litigation Support, Cyber Capability Integration and Force Multiplication). Mr. Ring received the USACE CIO IM/IT Excellence in Technical Team Support award in 2017 as well as the USACE CIO Cyber Professional of the Year award in 2015. Additionally, Mr. Ring has won the SANS Security 504 Capture the Flag contest (15 minutes) and was an active contributor to the Metasploit project with numerous published modules.

Alina Ng

Professor Ng has been a faculty member at Mississippi College School of Law since 2007. She is a graduate of Stanford Law School, the University of Cambridge, and the University of London. Professor Ng teaches Property, Intellectual Property, International Intellectual Property, Cyberlaw, and Law and Economics. She writes and publishes in the area of property and intellectual property law. Professor Ng's research focuses particularly on the interrelationship between private property and the public's rights to access such property. In one of Professor Ng's recent articles, The Conceits of Our Legal Imagination: Legal Fictions and the Concept of Deemed Authorship, 17 N.Y.U. J. Legis. & Pub. Pol'y 707 (2014), she argues that the work-for-hire doctrine in copyright law is a dangerous legal fiction because it obfuscates the concept of authorship and what it means to be an author by treating employers of creators as authors of copyrighted works. Professor Ng is currently working on projects dealing with the use of neuroscientific data, the relevance of such data for understanding creative and innovative minds, and its use in the development and implementation of legal policies.

Scott Marticke

Scott Marticke is an accomplished business leader with more than 30 years of experience across all marketing disciplines. As a business development professional, he is responsible for generating over $500 million in business for regional to global firms. He works with organizations that Omnicom, Nissan, Toyota, General Mills, CBS, Saatchi & Saatchi, Ford, Porter Novelli, Dollar/Thrifty, Central Atlanta Progress, MARTA and more, providing strategic and tactical counsel.

In 2009 he co-founded analytics firm Sentiment360, pioneering automated online sentiment analysis for businesses and organizations and political campaigns. It was his work in this field that led Scott to develop the strategic cybersecurity /reputation management service PNProtect for Omnicom's global PR firm, Porter Novelli in 2014. Combining cybersecurity technology with brand reputation and crisis management, PNProtect was the first and only offering of its kind.

Trent Townsend

In his capacity as Chief Executive Officer, Trent works with a variety of customers to help them analyze their cybersecurity posture, makes recommendations regarding how to address noted security issues, and provides the tools, software, and services to enable that resolution.

After 15 years of working in the cybersecurity field, Trent understands the complexities of analyzing risks and the hurdles that all organizations face when attempting to strengthen their cybersecurity position. Prior to working with Next Step Group, Trent worked for 6 years as an Information Security Officer for the U. S. Department of Defense. With the DoD, he was primarily responsible for risk management related to DoD supercomputers and how to apply DoD security policy to supercomputing systems that are not your typical Windows workstations. After leaving the DoD, Trent served first as IT Director for Next Step Group but subsequently moved to CEO. Next Step Group provides a variety of cybersecurity services to private sector entities and also state government, higher education, K-12, and the Federal Government.

Trent is a Certified Information Systems Security Professional (CISSP) and was selected as one of Mississippi Business Journal's Top in Tech for 2017. He holds a B. S. in Computer Science from Mississippi College and a M. S. in Computer Science from Mississippi State University. While at Mississippi State, Trent's program of study and research were in the field of computer security. Since graduating from MSU, Trent's professional focus has centered on helping organizations understand their security risks and how they can best address them.

Harper Maddox

Harper is the Chief Technology Officer and a Founder of EdgeTheory and co-organizer of the Jackson Tech Entrepreneurs meetup. He started coding assembler on his TI-82 calculator and has built applications for Fortune 500 companies, startups, and the department of defense. At EdgeTheory, Harper and Billy Conn built a knowledge graph that connects related topics, tags and locations. It also represents a parent/child hierarchy. They used the graph to determine appropriate social media messaging for a specific topic and we used it to build contextually relevant messages.

J. Craig Lowery

J. Craig Lowery, Ph.D., is a Research Director in Gartner's Technology and Service Provider group. He covers cloud computing in general, infrastructure as a service (IaaS), platform as a service (PaaS) and managed services for public cloud. Other areas of expertise and interest include the emerging "container" ecosystem (lightweight virtualization), serverless computing such as AWS Lambda, cloud application development models, cloud service expense management, cloud management platforms, internal cloud service brokerage and organizational models, and cloud service pricing models. Previous roles include chief cloud architect for cloud management products, technical executive for merger and acquisition activities of cloud-related startups, senior distinguished engineer in a large enterprise software company CTO division, and associate professor and director of Graduate Studies of Computer Science at Mississippi College.

He holds both an M.S. and Ph.D. in Computer Science from Vanderbilt University, with a B.S. double major in Computing Science and Mathematics from Mississippi College.

Brian Walls

Brian Walls has worked in the cyber security field within the state of Mississippi for 16 years. He currently serves as the Territory Manager for Check Point Software in Mississippi & Memphis. Check Point is one of the worldwide leaders and innovators in the Cyber Security. At Check Point, Brian helps customers of all sizes and verticals meet their cyber security needs. His true passion is evangelizing cyber security and helping organizations understand the need for improving the cyber security posture.

Brian holds a Bachelor of Science in Information Technology and Communication from the University of Southern Mississippi where he specialized wide area networking and cyber security.

J.C. Hiatt

J.C. is an avid entrepreneur and software developer from Jackson, MS. He currently owns companies in a few spaces, including software development, fitness, cryptocurrency, and social media.

Eric Jansen

As Executive Vice President, Mr. Jansen brings over 25 years of Software Engineering and Program Management experience with over 17 of those years working as a contractor to the Federal Government Intelligence Community. He has served in roles as a software engineer, system engineer, system administrator, system architect, lead systems engineer, and program manager. Additionally, Mr. Jansen is one of the leaders of both the sales and service teams at Independent Software.

Mr. Jansen co-founded Independent Software and has assisted in growing the company to the size it is today. He directs customer programs, both prime and subcontracts, handling all aspects from capture to close out. Mr. Jansen has built a reputation as a strong communicator with regards to both customers and employees. He leads business development captures and proposal efforts for Independent Software and he has a winning track record within both the Intelligence Community and commercial sectors. Eric’s virtual proposal management process consistently delivers winning proposals on time, within budget, and without the stress of extreme hours.

Mr. Jansen enjoys serving his community through his church and his faith and he is an active supporter of Wounded Warrior Project©, American Heart Association, United Service Organizations (USO), and several local law enforcement agencies. Eric enjoys spending time with his wife, daughters, and grandchildren and he has a passion for boating, skiing, friendly card games, and the outdoors.

Mr. Jansen holds Bachelor of Science Degrees in Computer Science and Mathematics from Towson State University and is a Microsoft Certified Systems Engineer (MCSE).