ProCon 2019 - 22nd Annual Professional Development Conference
The Twenty-Second Annual IEEE Cedar Rapids Professional Development Conference, ProCon 2019, is a one-day, two-track regional event for engineers and other professionals, to be held May 14, 2019, at the Marriott Hotel in Cedar Rapids.
Payment is appreciated at time of registration, cash and check will be taken at door.
When registering please select your session interest (Track 1 or 2) by selecting the corresponding menu selection and track i.e. (Chicken Track 1 or Chicken Track 2), etc.
Date and Time
- Date: 14 May 2019
- Time: 08:00 AM to 04:30 PM
- All times are America/Chicago
- Add Event to Calendar
- Starts 19 February 2019 08:00 AM
- Ends 14 May 2019 02:00 PM
- All times are America/Chicago
- Admission fee ?
- Menu: Chicken - Track 1, Beef - Track 1, Vegetarian - Track 1, Chicken - Track 2, Beef - Track 2, Vegetarian - Track 2
Doug Jacobson and Andy Neller
Home and Business Security: How to protect yourself without a cyber security staff by Doug Jacobson
Description: Hackers are focused on making money through stealing data, stealing credit cards, or holding your data for ransom. Hackers today have a large array of tools and support information to help them carry out their attacks. Recent attacks have shown they are getting smarter about how they steal data, or make money. This presentation will look at threats and against people at home or in business and how you can better protect yourself. We will look at the threat landscape from both the defender’s and hacker’s viewpoints and how attackers have changed over time. We will look at threats and against data at rest and in motion with in a typical organization. We will discuss examples of data breaches and talk about methods to mitigate data loss under this new threat environment.
CyberSecurity - Digital Hapkido: Redirecting the Attacker's Energy by Andy Neller
Attendees will see a proven defense-in-depth control structure that deals well with complex adversaries and ransomware/malware. The talk will be structured in a plug-and-play way so that the attendee can take different aspects of the security controls back to protect their organizations. During the presentation I will also talk through some alternative options to some of the covered controls to help increase the success of the attendee raising their security posture in their own environment. Attendees will see practical adversary obstruction and how to leverage the home-field advantage to flip the script on hackers giving their organization the upper hand.
CloudSecurity - Navigating the Stormy Skies through Security Controls Verification by Andy Neller
Description: Attendees of this presentation will learn how common security frameworks map to cloud services like AWS and how to identify gaps in expected control objectives. This presentation will help individuals in understanding the shared responsibility landscape and how it impacts organizational control mappings.
Doug Jacobson, Ph. D
Doug Jacobson is a Professor in the Department of Electrical and Computer Engineering at Iowa State University and currently holds the rank of University Professor. Dr. Jacobson joined the faculty in 1985. Dr. Jacobson’s current funded research is targeted at developing robust countermeasures for network-based security exploits and large scale attack simulation environments. He is director of the Internet-Scale Event and Attack Generation Environment (ISEAGE) test bed project. Dr. Jacobson has given over 150 presentations in the area of computer security and has testified in front of the U.S. Senate committee of the Judiciary on security issues associated with peer-to-peer networking. He has published numerous papers on computer security education and the use of hands-on laboratories to teach computer security, as well as written a textbook on network security. He also created a computer security outreach program targeted at the general public, post-secondary students and faculty. He co-authored a book on security literacy for the non-technical audience and also lectures on this topic. His team has developed a cyber security literacy curriculum for grades k-12.
Andy Neller CISSP, CRISC, CCE
Dynamic leader in cybersecurity focusing on providing best-in-class security programs, security architecture, governance and regulation compliance, secure cloud migration, and IT security risk management strategies and services to enable delivery of solutions to the business. Over 20 years of cybersecurity experience providing innovative and scalable capabilities, services and consulting to stakeholders in support of a preventive data loss security posture. Currently Mr. Neller is the CyberSecurity Operations Manager and HIPAA Security Official for Wellmark Blue Cross Blue Shield Inc.
Emotional Intelligence - The Key to Success
Emotional Intelligence - The Key to Success by Patti Seda
IQ may help you get the job. But EQ will determine how far you go and how successful you are when you arrive!
Experts agree that Emotional Intelligence often determines who will climb the corporate ladder and who will be passed over. During this workshop you’ll gain an understanding of the traits and actions to improve your EQ, such as:
- Self-Perception: Gaining awareness of your strengths and weaknesses
- Self-Expression: The way you express yourself, both verbally and nonverbally
- Interpersonal Relationships: How to gain trust and respect and be a good team player without looking for anything in return
- Decision Making; How to be unbiased and objective
- Stress Management; The final step in the EQ process
If you have perceptions of EQ as hand-holding, trust falls and singing kumbaya – this session will break those myths and give you practical tools to be successful!
Attendees in this track will be entered to win a complimentary EI assessment at the end of the day.
Patti is the owner of Seda Consulting; a firm committed to guiding individuals and teams to be their professional best, through organizational design, succession planning and coaching. She is certified in EQi-2.0 Emotional Intelligence and MPO Personality Assessment tools.
Before starting her own business, Patti worked in a variety of industries, including advertising and marketing, insurance and banking. Starting as a payroll and benefits coordinator, she worked her way up to the executive team level in organizations that experienced high growth, as well as business and cultural change.
|Time||Track 1 Track 2|
|8:00 - 8:30||Registration|
|8:30 - 10:00||
Home and Business Security: How to protect yourself without a cyber security staff - Part 1 -- Doug Jacobson
|Emotional Intelligence - The key to success - Part 1 -- Patti Seda|
|10:00 - 10:15||Break|
|10:15 - 11:45||
Home and Business Security: How to protect yourself without a cyber security staff - Part 2 -- Doug Jacobson
Emotional Intelligence - The key to success - Part 2 -- Patti Seda
|11:45 - 1:15||Luncheon Speaker -|
|1:15 - 2:45||
CyberSecurity: Digital hapkido: redirecting the attacker's energy -- Andy Neller
|Emotional Intelligence - The key to success - Part 3 -- Patti Seda|
|2:45 - 3:00||Break|
|3:00 - 4:30||
CloudSecurity: Navigating the stormy skies through security controls verification -- Andy Neller
|Emotional Intelligence - The key to success - Part 4 -- Patti Seda|