2017 ICCM Americas Workshops

All workshops are Post Conference (Tuesday afternoon through Wednesday Morning)

A Short Introduction to Data Mining

Pat Bailey

Resources Needed:  Participants should plan on bringing their own laptop, or be willing to share one.  The hands-on exercises will be done in pairs.  Participants are encouraged, but not required, to bring their own data set.

Coverage of Workshop:  Data has been called the new oil because it’s there and there is so much value in it once it has been “refined.”  This workshop will examine the  motivation and benefits to data mining along with presenting concepts through hands-on exercises.  Specifically, the agenda will be as follows:

  • Examine what is meant by data mining and the general process to support it
  • Install the open source package KNime
  • Using visualization for initial exploration
  • A high level overview of data mining algorithms and how they can be applied.  These include clustering, classification, support vector machines, Naïve Bayes, Linear Regression etc.
  • Construction of a workflow that includes importing data, data cleansing, and applying the appropriate algorithm

The workshop focuses on using tools (ie KNime).  Participants are not expected to do any coding.


Implementing the CIS Critical Security Controls

Josh Brower

“The CIS Critical Security Controls (CIS Controls) are a concise, prioritized set of cyber practices created to stop today’s most pervasive and dangerous cyber attacks. The CIS Controls are developed, refined, and validated by a community of leading experts from around the world. Organizations that apply just the first five CIS Controls can reduce their risk of cyberattack by around 85 percent….

“The CIS Controls embrace the Pareto 80/20 Principle, the idea that taking just a small portion of all the security actions you could possibly take, yields a very large percentage of the benefit of taking all those possible actions –security.org

This workshop will introduce the CIS Controls and focus on practically implementing the first five. The CIS Controls are vendor agnostic, and we will focus on tools and techniques that are cross-platform. The first five CIS Controls are as follows:

  • CSC 1: Inventory of Authorized and Unauthorized Devices.
  • CSC 2: Inventory of Authorized and Unauthorized Software.
  • CSC 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers.
  • CSC 4: Continuous Vulnerability Assessment and Remediation
  • CSC 5: Controlled Use of Administrative Privileges.