My home on the interwebs

Lectures

 

  • The 15th Annual Wisconsin IT Symposium as a Security Panelist in Milwaukee, WI on May 4, 2017.

Cyber Security Expert Panel: Your Best Defensive & Offensive Strategies to Reduce Risk & Secure the Enterprise.

  • CypherCon 2.0 on March 30 & March 31, 2017

Second Wisconsin hacker conference: CypherCon 2.0 – Shaping children for the future of hacking, organized and guidance. Find out more at http://cyphercon.com

Discussion with students from my childhood town on where security is present and where security is going in the future.

  • Guest on Open Source Security Podcast on Monday, December 6, 2016

Discussion on all things CypherCon! Check it out: http://www.opensourcesecuritypodcast.com/2016/12/episode-17-cyphercon-interview-with.html
reference links from the talk:

Show Notes:

  • Security Panelist at Marquette’s Cyber Security Colloquium  on Friday, October 28, 2016

Information: Agenda should be very beneficial to organizations that have responsibility for educating the general public, while others educate customers and employees or students about cyber security. For policy makers, educators, and security professionals who often have dual responsibility for technology and administration. The focus of the panels remains the same. keynote: Lt Governor, Rebecca Kleefisch

Topic: Government and General Public Awareness

Governments and agencies serving the general public have a responsibility to their constituents to make them aware of threats and defenses and to protect the privacy of information. National programs have been defined to help organizations increase cyber security awareness that can protect the infrastructure and information and maintain privacy. This panel will help answer the question, ‘What is being done locally and what is most effective?’

  • Security Panelist at WTA’s (Wisconsin Technology Association) on Friday, October 21, 2016

 The WTA is a nonprofit organization formed for the following purposes:

  1. Provides a forum for members to exchange ideas and experiences
  2. Educate members on the latest concepts in telecom and technology
  3. Focus on regional and national issues affecting the profession
  4. Professional advancement of telecom / technology
  5. Encourage research and development of products which enhance the productivity of members
  • Department of Homeland Security: IMPACT focus group industry speaker in Madison, WI on Thursday, September 29, 2016.

Industry representative on Cyber Security R&D data needs that the Department of Homeland Security: IMPACT (Information Marketplace for Policy and Analysis of Cyber-risk & Trust)  IMPACT accommodates a wide variety of data types and enables data discovery, analytics, visualization and integration by international researchers in industry, academia and the government.

  • “Shhh, it’s a secret” BioHacking Village Lead at DEF CON in Las Vegas, NV @ on August 4th-7th, 2016

The DEFCON BHV focused on the two major areas of biohacking: human augmentation and genetic engineering. We also showed interested in quantified self or health related content! Individuals/Companies presented demos and prototypes, injections, finished products, with the content being compelling and clearly worth the audience’s time.

We gave priority to content that is useful to the DEF CON community and the hacker community at large. We want to share practical and conceptual knowledge.

  • The 14th Annual Wisconsin IT Symposium as a Security Panelist in Pewaukee, WI on Wednesday, May 4, 2016.

Cybersecurity 2016 & Beyond: The New Normal
Technology continues to evolve as the network perimeter evaporates into the cloud and electrons become the new global currency. Enterprises are continuously challenged by an elusive and morphing cyber threat from bad actors and opportunists who use the vulnerabilities in our Information Systems as weapons. From fraudsters to nation state-sponsored cyber warfare, these attacks come at us from every direction as the ingenuity of criminal minds seek new and creative ways to infiltrate our valuable information resources and engage in cyber warfare against our businesses and our way of life–compromising our financial and national security. We are bombarded daily with newspaper headlines and digital media reports about the latest cyber security breach. This breakout session will allow our panel of Executives the opportunity to share hard won experience and best practices with the Wisconsin IT Symposium audience.

  • Tribeca Film Festival – Representing critically acclaimed TV Series Mr. Robot & DEF CON in New York on Thursday, April 14-April 19, 2016.

Discussing to thousands of attendees regarding traditional ‘hacking’ and niche topic demonstrations on biohacking: Genetic Procurement & Privacy

  • CYPHERCON – Opening Ceremony at Pfister Hotel & Safe House in Milwaukee on Friday, March 11, 2016.

First Wisconsin hacker conference: CYPHERCON, did the introduction and guidance. find out more at http://cyphercon.com

  • IBM’s Qradar Users Group Meeting at Kohl’s Innovation Center on Wednesday, October 28, 2015.

Event involving my assistance with an information security colleague on a customer case study regarding IBM Qradar’s network hierarchy. Our traffic data represented a local midwestern chain of hospitals. Also at the event SEIM reporting was discussed.

  • EC Council’s annual conference: “Hacker Halted – Cyber Pandemic” in Altanta, Georgia on September 17th, 2015

Abstract: You were warned in 1997 that a not-too-distant future was approaching. This dystopian future is here now due to rapid technological advances, much quicker than we initially imagined. These breakthrough DNA technologies are exposing your deepest darkest secrets. Who can see this information? What will they do with this information? Little does anyone know they are only one data breach away from public exposure.

  • “Shhh, it’s a secret” “Social Implications of DNA Acquisition & Storage” at DEF CON in Las Vegas, NV @ on August 6th-9th, 2015

Abstract: The advent of rapid ‘Next-Generation’ DNA sequencing methods has greatly accelerated biological and medical discovery steering society into a paradigm shift, the genomic era, of personalized medicine. This trend promises an affordable insight into your personal genome potentially giving individual’s personal advantages. What information is hidden within a strand of DNA and what are implications of accessing this data? Will these rapid advancements enhance humanity without sacrificing ethics and personal exposure? Can society overcome challenges stemming from emerging technologies such as massive internet accessible databases and cloud storage?

  • “GATTACA – Final Warning!”  at Thotcon in Chicago, IL on 5/14/2015!

Abstract: You were warned in 1997 that a not-too-distant future was approaching. This dystopian future is here now due to rapid technological advances, much quicker than we initially imagined. These breakthrough DNA technologies are exposing your deepest darkest secrets. Who can see this information? What will they do with this information? Little does anyone know they are only one data breach away from public exposure.

  • Herd Mentality & Modern Media Trolling at DC414/Defcon Milwaukee on 03/06/2015

Abstract: Do you trust your news sources? After my experiments… I don’t recommend it.  We dive in the wacky world of trolling modern journalism, nobody is safe 🙂

  • Advanced DNA Security at DC414/Defcon Milwaukee on 02/06/2015

Abstract: Continued discussion on what does the future hold in the confidentiality of raw DNA? My presentation discussed the DNA data and how the information can get leaked to an individual and the ramification if the data gets released. We also went over the public databases for connecting an individual to another unknown  individual.

  • SC Congress Chicago on 12/04/2014 

Presentation to the Chicago InfoSec community on information security in healthcare organizations.

  • Data protection of Electronic Medical Records (EMR) containing DNA at DEFCON DC414-Milwaukee on 11/07/2014

Abstract: DNA Sequencing is becoming cheaper and more commonly requested by medical staff. The protection of data storage is becoming increasingly difficult. Therefore, what does the future hold in the confidentiality of patient DNA? If patient DNA data is indeed leaked to the public this knowledge is irreversible. My presentation discusses the implications of patient health records containing DNA data, the ramification if the data gets released, and  the challenges health organizations will encounter in the near future.

  • Google Apps Class at Kewaskum Schools on 08/27/2013

Abstract: As a Google Apps for Education Certified Trainer, I provide professional development services designed to make the most of school’s Google Apps implementation. Kewaskum’s new and existing staff members attend my classes regarding Google Mail, Google Apps/Drive, Google Calendar, and other tools that Google offers for the educational sector.  Being a Certified Trainer requires a lot of additional side preparation and the certification is carefully vetted by Google and meet rigorous qualification standards.

  • “Shhh, it’s a secret” in Vegas on August 1st-4th, 2013

Top Secret! You’ll have to ask…

  • Windows 7 Class at Kewaskum Schools on 05/21/2013 & 06/12/2013

Abstract: As the Director of InformationTechnology at Kewaskum School District I taught teaching staff best practices of Microsoft’s Windows 7 operating system. In addition, all those who attended also received Lenovo T530 i5 laptops to improve the mobility of our teaching staff. Wireless has been activated at nearly all the schools in the last 6 months and VPN access activated in the last week. The changes we are implementing push our vision for teachers to be able to work anywhere and everywhere!

  • Google Apps / Office 365 Roundtable at Brainstorm on 03/11/2013

Abstract: Assisting the Director of Instructional Technology at Kewaskum School District, Michael helped moderate a round-table discussion regarding Google Apps / Office 365 rollouts in  education.  The next generation of mail/office showdown within K12 education seems to be in favor of Google apps with a ratio of about 50 to 1 when compared to Office 365. Their platforms differ greatly in usability, functionality, and mobile support for students and staff.

  • Bring your own Device (BYOD) in education at SLATE on 9/09/2012

Abstract:  Along with his business partner John, Michael  spoke at an educational conference called SLATE. Our session focused on new educational methods of implementing various devices using wireless technology. Teaching efficient strategies for introducing random modern technology into the classroom can be a challenge in rural Wisconsin. The goal of speaking at SLATE follows the mindset that spreading ideas and sharing best practice knowledge at conferences  saves money and headaches freeing time and resources for other projects that impact children learning.

  • “shhh, it’s a secret” in Vegas  on July 26-29th, 2012

Top Secret! You’ll have to ask…

  • The State of Information Technology in Cuba at UW-Green Bay on 5/03/2011 

Abstract: Discussing my graduate studies in Havana, Cuba. My lecture touches on the antiquated network infrastructures of Cuba. The United State’s blockade has set Cuba further back then the rest of the world. Oddly, during the trip the first undersea cable was set into a test operations from Venezuela.

 

Pre-2011 Presentations:

Organic SEO

Michael Goetzman has been working with SEO/SEM for over 10 years. Most people find that natural website positioning can be difficult and time intensive. Learn efficient strategies for web site optimization. Mike teaches sophisticated methodologies together with the least known methods behind Google’s present search algorithm in a very practical hands on way.

Computer Security

Michael has a bachelors degree in Information Security Systems and attends local def con meetings sharing ideas of the 10 domains of security.

Lockpicking

Getting past physical locks in a non-destructive method can be tricky. Methods used by professionals to unlock a common pin tumbler lock very quickly seems like a trick out of the movies! Michael has successfully taught methods of opening a lock in under 5 seconds during his lectures. In the United States alone more than 90% of home and commercial locks are believed to be pin tumbler locks – this means 90% of the locks in the United States are susceptible to attacks.