One Week Only! Get an iPad Air with Smart Keyboard, Surface Go, or $300 Off with OnDemand & vLive!

ICS Security Summit & Training 2020

Orlando, FL | Mon, Mar 2 - Mon, Mar 9, 2020
Live Event starts in 87 Days
 

The advisory board members are industry practitioners who volunteer their time and expertise to review Call for Presentation (CFP) submissions, select speakers and keynotes, and help ensure that the program delivers on the SANS Promise to teach you something you can use as soon as you go back to work.


Crystal Bulda

Crystal Bulda @BuldaCrystal

Crystal Bulda is an Information Systems Engineer with over 20 years of experience in the United States Army. Currently operating within the operational technology (OT) space, Crystal is the lead for a critical infrastructure cyber vulnerability assessment team. Crystal’s work experience includes information assurance, incident response, computer network defense, cyber defense operations and much more. Most recently, Crystal was a fellow at Microsoft’s Cyber Defense Operations Center (CDOC) in Redmond, Washington.

Crystal has earned a BS in Computer Science, MS in Management of Information Systems and holds the CISSP, GICSP, GCIP, GRID, GCCC, and CEH certifications.


Jennifer Chavarria

Jennifer Chavarria @jennxxdcs

Jennifer coded her first program in high school, a game of Pong. Looking to make a career out of it, she graduated from the University of Texas at Austin, and began working in IT for the oil and gas Industry. She has held roles from system administration to project management – experience she deems invaluable to finding her niche in security. An oil downturn, and several roles and companies later, she is now a threat hunter for the Shell CyberDefence team, where she delves into various efforts including providing support to industrial control system (ICS) asset owners. She also served as an advisor for the SANS ICS Summit in 2019. Offline, Jennifer enjoys running with her fur babies, cooking for friends, and spending weekends at the lake with her husband.


Tim Conway

Tim Conway @SANSICS

Tim serves as the Technical Director - ICS and SCADA programs at SANS, and is responsible for developing, reviewing, and implementing technical components of the SANS ICS and SCADA product offerings. Additionally, performing contract and consulting work in the areas of ICS cyber security with a focus on energy environments.
A recognized leader in CIP operations, he formerly served as the Director of CIP Compliance and Operations Technology at Northern Indiana Public Service Company (NIPSCO), and was responsible for Operations Technology, NERC CIP Compliance, and the NERC training environments for the operations departments within NIPSCO Electric.
Outside of SANS, Tim continues to perform contract and consulting work in the areas of ICS cyber security with a focus on the energy sector.
Before accepting the opportunity to join SANS, Tim enjoyed a 15-year career with NIPSCO where he held management and leadership positions as well as EMS Computer Systems Engineer responsibilities over the control system servers and the supporting network infrastructure. During his career, Tim has served as the Chair of the RFC CIPC, Chair of the NERC CIP Interpretation Drafting Team, Chair of the NERC CIPC GridEx Working Group, and Chair of the NBISE Smart Grid Cyber Security panel.


Sarah Freeman @sgenevieve

Sarah Freeman is an Industrial Control Systems (ICS) cyber security analyst for the Cybercore Integration Center at Idaho National Laboratory (INL), where she provides U.S. government partners and private sector entities with actionable cyber threat intelligence, developing innovative security solutions for the critical infrastructure within the U.S.
At Idaho National Laboratory, Sarah pursues innovative threat analysis and cyber defense approaches, most recently Consequence-driven Cyber-informed Engineering (CCE). As Principle Investigator on a laboratory discretionary research, her current research is focused on new signatures and structured methods for cyber adversary characterization. Following the December 2015 electric grid attacks, Sarah participated in the DOE-sponsored training for Ukrainian asset owners in May 2016. She has also researched the Ukrainian 2015 and 2016 cyber-attacks and the Trisis/Hatman incident.


Terry Freestone

Terry Freestone @Smoky_D_Bear

Terry is an independent consultant with over 30 years of experience. 14 years ago, he decided to focus on security. He has worked for a variety of industries including government, healthcare and building, but most of his time has been with oil and gas companies. He is also an associate member of CSA technical committee for Security Management for Petroleum and Natural Gas.


Caroline Krouse

Caroline Krouse

Caroline Krouse is a Cybersecurity Senior at the University of West Florida. As a previous Cyber Security Ambassador at UWF Center for Cyber Security, she performed demonstrations to both the general public and secondary school students. She is Treasurer of the Cyber Security Club and Vice President of The Association for Computing Machinery's Council on Women. She volunteers with CaTs, Coding and Tech Stars, where she teaches youth girls programming and engineering concepts. She is also an intern at Navy Federal where she works with Application Security teams implementing and managing security applications and modules.


Robert M. Lee

Robert M. Lee @RobertMLee

Robert is a recognized pioneer in the industrial security incident response and threat intelligence community. He gained his start in security as a U.S. Air Force Cyber Warfare Operations Officer tasked to the National Security Agency where he built a first-of-its-kind mission identifying and analyzing national threats to industrial infrastructure. He went on to build the industrial community’s first dedicated monitoring and incident response class at the SANS Institute (ICS515) and the industry recognized cyber threat intelligence course (FOR578).
Forbes named Robert to its 30 under 30 (2016) list as one of the “brightest entrepreneurs, breakout talents, and change agents” in Enterprise Technology. He is a business leader but also technical practitioner. Robert helped lead the investigation into the 2015 cyber attack on Ukraine’s power grid, he and his team at Dragos helped identify and analyze the CRASHOVERRIDE malware that attacked Ukraine’s grid in 2016 and the TRISIS malware deployed against an industrial safety system in the Middle East in 2017.
Robert is routinely sought after for his advice and input into industrial threat detection and response. He has presented at major security conferences such as SANS, BlackHat, DefCon, and RSA and has testified to the Senate’s Energy and National Resources Committee. As a non-resident national security fellow at New America, Robert works to inform policy related to critical infrastructure cyber security and is regularly asked by various governments to brief to national level leaders.