Information Security Summit 2013
Organization: MassBay Community College
Venue: MassBay Community College
|Event Date/Time: May 30, 2013 / 8:00 am - (EST)||End Date/Time: May 30, 2013 / 1:00 pm - (EST)|
DEFENDING YOUR DATA
Content is the lifeblood of every organization. The way we create, consume and communicate has radically changed in the last several years – and so must the security systems we use to defend it. Today, attacks on company data are more sophisticated and targeted, and most are aimed at stealing precious data. Every channel of communication is vulnerable; from email and mobile computing devices to a multitude of web-enabled technologies. If it’s hard for large, sophisticated businesses to keep up with the latest security challenges, it’s an even more daunting task for smaller and medium sized businesses.
Keynote Address: State of the State of Security David J. Sherry CISSP CISM, Chief Information Security Officer, Brown University
- State of the State Security
- Application Security
- Current Threats
Industry Expert Panel: Mandates, Risk & Compliance
Lawmakers are often seen in the news shouting about how companies need to maintain compliance with a number of different mandates. The government passes these laws and the security professional is tasked with creating and implementing a plan for the enterprise. Did we forget to mention that your IT budget will not be increasing? Join us on this panel to discuss the current state of legislation, compliance, and governance – all while trying to stay within the confines of your budget.
BYOD is Real, it’s Here. The BYOD (Bring Your Own Device) into the workplace environment is in full swing, creating an entire new set of issues for CIO’s and IT departments, as “mobility” invades the enterprise. How does an IT department cope with the proliferation of smart devices, dealing with issues such as access, bandwidth and management? Theft, device insecurity, poorly developed apps, corporate data accessibility – these are but a few of the realities that IT departments will have to face when travelling down the BYOD road. Hear from our panel of experts and how they are managing with this growing phenomenon.
Challenges for Protecting Data in the Cloud
Is it for you? Our panel will attempt to get to the truth in how various cloud and virtualization technologies play in real-world situations to help customers make informed decisions on what will be best for their particular environment. While the focus remains on protecting data, the question emerges as to what the best way to do that is. What might be right for one might not be right for another.
Cyber Threats - A Boston Cyber Division Overview
This briefing will include information on the Boston Cyber Task Force, Understanding the Cyber Risk, Threat Trends, and Counterintelligence and Counterterrorism considerations.
Lunch, Networking & Exhibitor Showcase