Information Security Culture – Educational Session – Feb 25

The (ISC)2 Eastern Massachusetts Chapter invites you to participate in our upcoming educational session.

TOPIC: Creating an Information Security Culture through Retention, Response & Recovery
The Top 16 Security Predictions for 2016

SPEAKER: Daniel J. Lohrmann is Chief Security Officer & Chief Strategist at Security Mentor, Inc. and an internationally recognized cybersecurity leader, technologist and author. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan.

TOPIC: Building a Culture Starting with the People

SPEAKER: George Ehrhorn is the IT Security Manager for MathWorks, a software company that builds software for scientists and engineers. Prior to this George held several managerial and individual contributor roles in security engineering and IT auditing, usually for software companies.

Mediated Discussion: Making Information Security part of your Organization’s Culture

PANEL MEMBERS:
* Christian Hamer, CISO, Harvard University Information Technology
* Gerald Beuchelt, Chief Security Officer, Demandware, Inc.
* Mark Annati, VP IT, Extreme Reach, Inc.
* Barbara Rosen-Campbell, Director, IRM Strategy and Planning, Global Information Risk Management, Manulife / John Hancock
* Mark Arnold, Director of Information Security, PTC

Continue reading

Secure World Boston – 2016

March 29-30, 2016
Hynes Convention Center
Cybersecurity Conference

 

We invite (ISC)2 members to use the discount codes below when registering. We look forward to seeing you at the conference!
  • Earn 12-16 CPE Credits
  • 60+ Educational Elements
  • Featured Keynotes, Panel Discussions & Breakout Sessions
  • Network With Industry Peers
  • Interactive Conference Pass

When
Tue. March 29th
Wed. March 30th
Where
Hynes Convention Center
900 Boylston Street
Boston, MA 02115
What
The Premier Regional Cybersecurity Event Near You!

Keynote:

Steven Blair
Detective
Boston Police Department

“Hunting The Electronic Criminals Boston Style”


Continue reading

Threat Intelligence Seminar – June 18

The (ISC)2 Eastern Massachusetts Chapter will host an event based on Threat Intelligence. This topic will focus on Federal Investigations, Cyber Crime activity and tools for visibility.

Subject: Threat Intelligence: Federal Investigations, Cyber Crime Activity, Tools for visibility

Speaker #1: Jason Gonzalez is a partner at Nixon Peabody LLP, and is head of Nixon’s Privacy and Data Protection Practice Group. Jason is a former Assistant US Attorney at the US Attorney’s Office in Los Angeles, and also worked as a Managing Director at computer forensics and incident response firm Stroz Friedberg.
Topic: Jason will be speaking on defense perspectives on federal investigations and cybercrime.

Speaker #2: Adam Bookbinder is the chief of the Cybercrime Unit in the U.S. Attorney’s Office for the District of Massachusetts. He has been an assistant U.S. Attorney since 1999, spending the past 11 years in the Cybercrime Unit and the previous four in the Economic Crimes Unit. Before joining the U.S. Attorney’s Office, he worked as an assistant D.A. in the Essex County D.A.’s Office, an associate at Bingham, Dana, and Gould, and a clerk for Ninth Circuit Judge Stephen Trott. He has a B.A. from Dartmouth College and a J.D. from Harvard Law School.
Topic: Priorities of the U.S. Attorney’s Office’s Cybercrime unit in the areas of computer crime, Intellectual Property Crime, and large-scale identity theft. Discuss lessons learned from cases involving cooperation and coordination with the private sector

Speaker #3: Matt O’Neill started with the Secret Service in 1998 in New Haven; he transferred to Washington, DC, in 2003 and spent four years on the Vice President’s Detail. In 2007, Matt transferred to the Manchester, NH, Resident Office. He primarily investigates cyber crimes such as ACH fraud, network intrusions, phishing, and POS terminal compromises and other types of financial crimes.
Topic: Matt will talk about the latest trends relating to online cyber fraud such as exploiting Apple Pay and other new payment systems as well as the online sale of personally identifiable information. Matt will compare and contrast identity fraud to credit card fraud and provide tips on how to protect yourself from being a victim

Continue reading

LinkedIn Group