Facebook Social Icon Facebook Social Icon You Tube Social Icon

Technology and Innovation

Phone: 913-715-1500

111 S Cherry, Suite 3100, Olathe KS 66061

You are here

Cyber Security Conference

conference banner

Cyber Security Conference & Expo - Save the Date!

In support of National Cyber Security Awareness month, Johnson County is honored to host its 6th Annual Cyber Security Conference and Expo in conjunction with National Cyber Security Alliance.

  • Conference Agenda
  • When: October 6, 2015 - 8:30 am - 3:30 pm
  • Where: Johnson County Administration Building, 111 S. Cherry St., Ste 200, Olathe, KS 66061
  • Cost: FREE (no cost to attend!)
  • Lunch Provided
  • Free Parking: Parking garage on corner of Cherry St. and Loula St.

Certificate of attendance will be available for continuing education credits.

For inquiries: Contact U


Gene TurnerGene Turner, since 1985, has been repeatedly “caught in the act” entertaining his audiences with his amazing sleight-of-hand and unique brand of comedy. He is also a speaker and author on the subject of identity theft. He is a Certified Identify Theft Risk Management Specialist (CITRMS).

Dr. Srinivas MukkamalaDr. Srinivas Mukkamala, co-founder of RiskSense, a leading provider of Software as a Service Vulnerability and Threat Management Solutions and Security Services. Srinivas is the lead researcher for CACTUS (Computational Analysis of Cyber Terrorism against the US). 

Steve SieglerWhat can Start a Security Event?
Steve Siegler, Deputy Chief Information Officer for Operations, State of Missouri. Steve has spent the last 25 years serving the State of  Missouri. Steve oversees operations of the enterprise network infrastructure. He will be talking about the recent security events in Ferguson, Missouri.

>> the complete line up of speakers

Cyber Security News

Newsletters in mailbox

March 2015 Avoiding Online Tax Scams - It’s tax season, which means it’s also time for tax scams, with numerous online scams that attempt to steal people’s tax refunds, bank accounts, or identities. Last year, the Internal Revenue Service (IRS) estimates it paid $5.2 billion in fraudulent identity theft refunds in filing season 2013.   Websense Security Labs reported in 2014 it saw approximately 100,000 IRS-related scams in circulation every two weeks.

February 2015 Protecting Against Cyber Crime - Cybercrime is any violation of federal, state, or local statute, or malicious or suspicious activity, in which a computer, network or device is an integral component of the violation. Examples can include: a malicious cyber criminal breaking into a computer to steal information (computer intrusion) or to change a website (website defacement); malware being placed on a computer without the owner’s permission; and that malware using that computer’s resources to send spam.

January 2015 - 2015 Cyber Security Outlook - We’ve asked experts at the Center for Internet Security (CIS) to share their thoughts on what issues we’ll be talking about and dealing with in 2015. Below are some highlights of those topics. To read more from CIS experts about this year’s trends and threats, visit the CIS blog.

November 2014 Online Shopping Tips - The holidays are right around the corner and consumers are being bombarded with ads for discounted merchandise, free shipping and other special deals during the holiday season, and in particular for Black Friday and Cyber Monday. Last year, more than $1.7 billion was spent online on Cyber Monday, making it the highest volume day in history for online sales.  Online sales are expected to be significant again this year.

September 2014 Social Media Scams - Spot Them Beforehand - The use of social media has exploded, with 255 million active users on Twitter and more than 1.2 billon on Facebook. Unfortunately, so too have the scams and attacks that target social media. Criminals are taking advantage of the increasing number of users and the enormous amount of information exchanged.

August 2014 Secure Online Banking - Virtually every financial institution is using the Internet to communicate and allow customers to conduct transactions online. Customers today expect this convenience, and if done securely, these transactions can be as safe as those conducted in person.

July 2014 Cyber Security and Your Summer Vacation - The summer vacation season is underway and for many of us that means lounging on sunny beaches, reading a book under a shade tree or hitting the road for a new adventure. It  can also mean identity theft and other crimes if we aren’t careful about our online activities and protecting our information. Cyber crime does not take a summer vacation; we need to remain vigilant.

June 2014 Bots, Botnets, and Zombies - You have probably heard terms such as “bots,” “zombies,” and “botnets” in recent news stories about data breaches and other cyber security risks. But what exactly are they, how do they work, and what damage can they cause?

May 2014 Protecting Against Mobile Malware - The volume of cyber threats to mobile computing devices continues to increase as new applications and devices proliferate. McAfee reports that there were more than two million new mobile malware samples in 2013. Symantec reports that nearly 40% of mobile device users have experienced mobile cyber crime in the past 12 months. Some experts estimate that nearly 10% of applications sold on particular platforms are malicious.

April 2014 Hacked! Now What - Maybe you opened an e-mail attachment you shouldn't have and now your computer has slowed to a crawl and other strange things are happening. Or perhaps you’re running an out-of-date, or unpatched, operating system software (such as Windows XP) and have started to see “antivirus warnings.” Perhaps your bank called, informing you that there has been some unusual activity on your account. Your friends and family may start complaining about spam messages they are purportedly receiving from you. These are all signs that your computer may have been hacked.

March 2014 Protect Yourself From Online Tax Scams - Tax season is in full swing and criminals are seizing the opportunity for scams. Because of the recent major data breaches we’ve seen in the past few months, which exposed sensitive information on a large scale, we should be even more vigilant about taking steps to minimize our risk of ID theft and other online-related crime. Don't become the next victim.

February 2014 Personal Backup and Recovery of Your Data - Backups of computers, laptops and other devices are important defense layers in recovering from intentional or unintentional loss or corruption of data. For example, critical information can be lost when your hard drive becomes corrupted; natural disasters can destroy your equipment and device; or malware could infect your computer or device and corrupt your data. With a solid backup and recovery plan, you have a greater chance of recovering from any of these scenarios; without one, those chances are significantly diminished.

January 2014 Cyber Security Outlook - As we look ahead toward the cyber threats facing us this year, some key challenges will result from the advancements in technology that are becoming part of our daily lives. Ranging from the Internet of Things to online currencies, devices and systems have never been more interconnected.

Cyber Security News Archive

Cyber Security Threats

Mobile Devices and Apps

The use of mobile devices continues to grow in 2012, consequently, so does the volume of attacks targeted to these devices.  Every new smart phone, tablet or other mobile device provides another window for a potential cyber-attack.  Closely tied to the trend of more smart phones and tablets being deployed in the enterprise will be the influx of new apps for those devices.  Location-based mobile apps and games all pose potential threats.  The risks include access to information such as physical location or contacts lists, as well as the ability for the apps to download malware, such as keyloggers or programs that eavesdrop on phone calls and text messages.  Hackers are quickly learning how to harvest legitimate applications and repackage them with malicious code before selling/offering them on various channels to the unsuspecting user.


Attacks carried out as cyber protests for a politically or socially motivated purpose are expected to increase, especially in light of the activist movements continuing to take place across the country and around the globe.  Common strategies used by hactivist groups include denial of service attacks and compromise of user credentials to gain access to data, along with posting of emails, credentials, credit card information and other sensitive exfiltrated information.

Search Engine Optimization (SEO) Poisoning

Cyber criminals will continue to take advantage of the 24-hour news cycle to target visitors searching on the most popular keywords or sites and infect users via sites designed to look like legitimate news services, Twitter feeds, Facebook posts/emails, LinkedIn updates, YouTube video comments, and forum conversations.  Expect cyber criminals to take advantage of notable news events such as the London Olympics, U.S. presidential elections, and Mayan calendar predictions.

man with computer text over his face.Social Engineering

Social engineering tactics—including the use of rogue anti-virus to entice users into clicking on malicious links—will continue.  Experts also anticipate that in 2012 will see a growth in fake registry cleanup, fake speed improvement software, and fake back-up software mimicking popular personal cloud services.

Advanced Persistent Threat

Advanced Persistent Threat (APT) refers to a long-term pattern of targeted hacking attacks using subversive and stealthy means to gain continual, persistent exfiltration of intellectual capital. The entry point for espionage activities is often the unsuspecting end-user or weak perimeter security.   APT is likely to remain high in 2012.   Whether focused on exploiting vulnerable networks for use as a storage location or relay point, or to gain insider information, cyber espionage will remain a consistent threat to networks.

Phishing Attacks

Phishing is a deceptive communication (e-mail, text or tweet) targeting a specific individual, seeking to obtain unauthorized access to confidential data.  Phishing attempts are not typically initiated by "random hackers" but are more likely to be conducted by perpetrators seeking financial gain, trade secrets or sensitive information.

What Can You Do? 

By using sound cyber security practices, you can help strengthen Johnson County’s readiness and response to defend against the myriad of challenges and mitigate potential impacts of incidents:

  • Make sure that you have encryption and password features enabled on your smart phones and other mobile devices.
  • Use strong passwords, ones that combine upper and lower case letters, numbers, and special characters, and do not share them with anyone.  Use a separate password for every account.  In particular, do not use the same password for your work account on any other system.
  • Do not use your work email address as a “User Name” on non-work related sites or systems.
  • Be cautious about all communications; think before you click. Use common sense when communicating with users you DO and DO NOT know.  Do not open email or related attachments from un-trusted sources.
  • Don't reveal too much information about yourself on social media websites. Depending on the information you reveal, you could become the target of identity or property theft.
  • Verify Location Services settings on mobile devices.
  • Allow access to systems and data only by those who need it and protect those access credentials.
  • Learn to recognize a phishing website.  Visit https://www.phish-no-phish.com to learn ways to identify a phished website.



InternetGetting Started – A Non-Technical Guide to Cyber Security - Do you have questions about what cyber security is or why you should care about it?  This handy guide will walk you through some steps you can take to make sure you are cyber secure.  It also has a glossary of terms associated with cyber security.  Check it out today so you can be safe online.

Stay Safe Online - Do you want to know how you can stay safe online?  This website is full of great information and tips from how to keep your computer clean to online shopping tips to how to keep your family safe online.

Are You The Weakest Cyber Security Link? - Are you putting your organization's technology environment at risk?  You might be and not even be aware that you are.  Seemingly innocent behavior and actions taken on the Internet can open your company up to cyber security risks like virus infections, data theft, and even data destruction.

Cyber security breaches can cause significant problems for organizations that include the time and effort required to recover from a breach, the public relations problems that can occur, and potentially the permanent loss of valuable data.  Each and every one of us has to take responsibility to make sure we are not the cause of such an incident.

Use this Workplace Security Risk Calculator to see how you score.  Review the helpful hints to see how you can reduce your organization's  risk of becoming a victim of cybercrime

Securing Data on the Go - How easy would it be for a cybercriminal to access your mobile phone, table or laptop when you are out and about?  Check out this brochure for information on who wants your information and how you can protect it.Shopping cart

Online Shopping - It is easy, convenient, and quick.  But how can you be sure you will not be taken advantage of by hackers and criminals.  Take a look here for ways that you can protect yourself when you shop online.

Keep a Clean Machine - The best defense against viruses & malware is to keep a Clean Machine. Make sure that you have the latest security software, an up to date browser, and that you regularly apply patches and updates to your operating systems. This information will help you keep a Clean Machine.

Protecting the Internet - Did you know that protecting the Internet is everyone’s responsibility?  Most of us use the Internet each and every day at work, at home, and at play.  Some of us could not do our jobs without the Internet.  It has become a vital part of modern life.  Look at this infographic to see how we depend on the Internet and what you can do to protect it.

What is Your Online Identity Risk? -   What kinds of risks lurk on the Internet each time you use it?  Because so many of us live our lives online each day, the Internet can be a treasure trove of information about you for cyber criminals.  Look at these statistics from the Pew Institute study, “Anonymity, Privacy, and Security Online”:

  • 21% of internet users have had an email or social networking account compromised or taken over by someone else without permission.
  • 12% have been stalked or harassed online.
  • 11% have had important personal information stolen such as their Social Security Number, credit card, or bank account information.
  • 6% have been the victim of an online scam and lost money.
  • 6% have had their reputation damaged because of something that happened online.
  • 4% have been led into physical danger because of something that happened online.

With these kinds of dangers, it is important to make sure that we all do everything we can to be safe and secure when using the Internet.  Use this online identity risk calculator to see how your online behaviors can increase the risk of identity theft.  Be sure to check out the great tips that will help you reduce your risk of identity theft online.

No cyber bullyingKeep Your Family Safe Online - For most of us the Internet is a presence in our family lives as well as our professional and personal lives.  Our children use the Internet more than we do in some cases for all kinds of things.  Homework, research, contacting friends, gaming, and just surfing are all activities that your kids probably do every day.  So it is important to think about their safety and security while they are online.  Here are several resources with tips, information and actions that you can take to make sure everyone in your family is safe and secure online.

Passwords and Securing Your Accounts - Passwords are like the keys to your house.  You would never think of sharing your house keys with a stranger.  Protect your password just like any other key, keep it safe and do not share it.  Here is more information about keeping your passwords safe and secure.   Read this article from the New York Times for tips on how to create good passwords.

What to do if you are a victim - Would you know what to do if you became a cybercrime victim?   Recovering from a cyber attack can be a time consuming, frustrating experience.  Of course the best thing would never to be a victim in the first place.  But if the worst happens here are some resources to help you bull everything back together.

Malware Goes Mobile - Malicious software—commonly referred to as “malware”—mainly targets desktop PCs. But cybercriminals are increasingly setting their sights on smartphones and other mobile devices. In spite of preventative measures like Apple’s walled garden and Google’s Bouncer application for Android, malware impacts both iOS and Android platforms. This paper includes step-by-step, platform-specific policies and strategies you can employ to protect your data and keep mobile devices safe from the malware writers determined to break into them.