FALL 2014 Network Training Conference

October 16, 2014

Grizzly Jack's Grand Bear Resort

Utica, IL

Conference Sponsored By:

OneNeck IT Solutions


Conference Schedule

With help from our sponsors, the fee for this training conference is only $175.


Online Registration is Closed

On-Site Registration is still available.


Sponsorship Opportunities
Online Sponsor Registration



Information security is critical for every organization, large and small. The IVNUA Fall 2014 Conference will focus on information security. The conference includes four 90-minute technical training sessions covering the following topics:


The STATE of Computer Security Today

In this presentation we will look at the what keeps security professionals up at night. We will start by taking a look at where to find the information of what attacks are happening today. Next we will look at what groups comprise the hacking going on today, where they are physically located, and analyze what motivates them to do what they do. Lastly, we will look at the role governments are currently playing in this game.


The Hackers' Methods and Tools

In this section we will focus on the methods and tools that hackers use to break into your computers and networks. Some of these attacks will surprise you at how easy and vulnerable many networks are. After looking at a specific attack we will look at what can be done to mitigate your risk to that attack.


Creating Your Security Methodology - an Important Step Securing Your Computers and Networks

Securing your computers and networks is a tougher job than hacking them. This is because, as a sysadmin, you have to succeed every time to be considered successful, however; a hacker only needs to succeed once to win. In this session we will cover the planning, methodology, and mindset you should have in place before an incident occurs.


Tools and Techniques You can Use to Secure your Computers and Networks

In this section we will expand beyond the previous session of planning and methodology with specific tools and steps you can use to secure your computing environment. We will look at hacker tools you can use to assess your network like Metasploit as well as tools like the Microsoft Security Configuration Wizard and Group Policy that can help secure your systems.


Featured Presenter:
Brian Lewis, Microsoft IT Pro Evangelist


Brian Lewis works as an IT Pro Evangelist for Microsoft Corporation in the Midwest, where he focuses on the IT Pro audience in Illinois, Indiana, and Wisconsin. He is very passionate about technology and has over 18 years of enterprise IT experience. Brian enjoys working with all computer and networking technologies. He enjoys everything from programming and scripting to working with all types of infrastructure. There just isn’t a technology that isn’t interesting to him. Brian enjoys several hobbies outside of computers including rock climbing, trail biking, and swimming.


Brian received his Bachelors degree in Management of Information Systems from the University of Wisconsin – Milwaukee. One of Brian’s passions is computer security and he holds the Certified Information Systems Security Professional (CISSP) certification among other computer industry certifications.

For more information, please e-mail us at conference@ivnua.org.



Thursday, October 16, 2014




Keynote Address

Breakfast Buffet Provided

Compare and contrast Cisco's new products with Alert Logic's SaaS.  Get the pros and cons of each solution.
Presented by Dennis Eickhorst


The Current State of Computer Security

Brian Lewis


BREAK (Refreshments Provided)

Sponsor Hall Opens


Social Engineering

Brian Lewis


LUNCH (Provided) -- Lunch


Sponsor Hall Open


How to Secure Your Windows Servers: Reducing the Attack Surface with the Security Configuration Manager

Brian Lewis


BREAK (Refreshments Provided)


How to Secure Your Windows Servers: Strategies to Secure Your AD Credentials

Brian Lewis