The (ISC)2 Eastern Massachusetts Chapter invites you to participate in our upcoming educational session.
TOPIC: Creating an Information Security Culture through Retention, Response & Recovery
The Top 16 Security Predictions for 2016
SPEAKER: Daniel J. Lohrmann is Chief Security Officer & Chief Strategist at Security Mentor, Inc. and an internationally recognized cybersecurity leader, technologist and author. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan.
TOPIC: Building a Culture Starting with the People
SPEAKER: George Ehrhorn is the IT Security Manager for MathWorks, a software company that builds software for scientists and engineers. Prior to this George held several managerial and individual contributor roles in security engineering and IT auditing, usually for software companies.
Mediated Discussion: Making Information Security part of your Organization’s Culture
* Christian Hamer, CISO, Harvard University Information Technology
* Gerald Beuchelt, Chief Security Officer, Demandware, Inc.
* Mark Annati, VP IT, Extreme Reach, Inc.
* Barbara Rosen-Campbell, Director, IRM Strategy and Planning, Global Information Risk Management, Manulife / John Hancock
* Mark Arnold, Director of Information Security, PTC
March 29-30, 2016
Hynes Convention Center
- Earn 12-16 CPE Credits
- 60+ Educational Elements
- Featured Keynotes, Panel Discussions & Breakout Sessions
- Network With Industry Peers
- Interactive Conference Pass
Tue. March 29th
Wed. March 30th
Hynes Convention Center
900 Boylston Street
Boston, MA 02115
The Premier Regional Cybersecurity Event Near You!
Boston Police Department
“Hunting The Electronic Criminals Boston Style”
The (ISC)2 Eastern Massachusetts Chapter will host an event based on Threat Intelligence. This topic will focus on Federal Investigations, Cyber Crime activity and tools for visibility.
Subject: Threat Intelligence: Federal Investigations, Cyber Crime Activity, Tools for visibility
Speaker #1: Jason Gonzalez is a partner at Nixon Peabody LLP, and is head of Nixon’s Privacy and Data Protection Practice Group. Jason is a former Assistant US Attorney at the US Attorney’s Office in Los Angeles, and also worked as a Managing Director at computer forensics and incident response firm Stroz Friedberg.
Topic: Jason will be speaking on defense perspectives on federal investigations and cybercrime.
Speaker #2: Adam Bookbinder is the chief of the Cybercrime Unit in the U.S. Attorney’s Office for the District of Massachusetts. He has been an assistant U.S. Attorney since 1999, spending the past 11 years in the Cybercrime Unit and the previous four in the Economic Crimes Unit. Before joining the U.S. Attorney’s Office, he worked as an assistant D.A. in the Essex County D.A.’s Office, an associate at Bingham, Dana, and Gould, and a clerk for Ninth Circuit Judge Stephen Trott. He has a B.A. from Dartmouth College and a J.D. from Harvard Law School.
Topic: Priorities of the U.S. Attorney’s Office’s Cybercrime unit in the areas of computer crime, Intellectual Property Crime, and large-scale identity theft. Discuss lessons learned from cases involving cooperation and coordination with the private sector
Speaker #3: Matt O’Neill started with the Secret Service in 1998 in New Haven; he transferred to Washington, DC, in 2003 and spent four years on the Vice President’s Detail. In 2007, Matt transferred to the Manchester, NH, Resident Office. He primarily investigates cyber crimes such as ACH fraud, network intrusions, phishing, and POS terminal compromises and other types of financial crimes.
Topic: Matt will talk about the latest trends relating to online cyber fraud such as exploiting Apple Pay and other new payment systems as well as the online sale of personally identifiable information. Matt will compare and contrast identity fraud to credit card fraud and provide tips on how to protect yourself from being a victim