|MassTLC Presents: 2014 Security Conference: Building Security InTo an Insecure World
The question is not if you will be compromised, but when. High-profile breaches coupled with the dramatic rise in mobile devices, digital applications and the vast amount of electronic data available for exploitation have raised cybersecurity to the forefront of technology, from the boardroom to the end user. Cybersecurity is now a shared responsibility – we’re all in this together. Please join local visionaries and industry leaders for this full day conference to explore the current landscape of cybersecurity threats, new attacks on modern infrastructure, how to reduce risk, prepare for and respond to security breaches, and how to work with c-suite leadership on managing your company’s cybersecurity strategy.
The Future of Incident Response: Protection and detection can only take you so far, and breaches are inevitable. This session will examine the economic and psychological forces within the computer security field and describe the future of incident response (IR) and thus, the industry. It will discuss how response technology, unlike detective and preventative controls, must augment people rather than replace them. Understanding the implications of this reality requires a systems theory approach to IR. This session borrows one from the US Air Force: OODA loops. By leveraging the cycle of observe, orient, decide, and act, this session demonstrates how we can optimize IR efforts, and deliver valuable insight into what is arguably the most crucial discipline to maintaining IT security in the coming decade.
Security in the Boardroom: Recent cybersecurity breaches have elevated the responsibility and consequences for cybersecurity to the highest echelons of company leadership. Explore the strategic role security and privacy are now taking in organizations Innovating in Information Security: This session will focus on how entrepreneurs, companies and investors all have an opportunity to help defend against information security attack. Discussion topics will range from what security challenges are gathering momentum, market insight, hiring employees and raising capital.
Security Intelligence: This session will address how companies can utilize the power of Big Data to improve situational awareness in order to provide preemptive defenses from multiple cybersecurity threats. Securing Your Third-Party Vendors: Your company and products may be secure, but what about those of third party vendors and supply chain partners? Explore the issues in managing cybersecurity risks in the end-to-end supply chain environment.
Security for the Rest of Us: As large companies increase their cybersecurity measures (and budget dollars) in the wake of ongoing attacks, hackers are increasingly going after small to mid-size businesses, who may not have the same resources to keep up, but for whom security is essential to their business. Learn how small companies can defend against ongoing security threats, and provide the security their customers require.
Defending Against the Human Firewall: This session will explore preparing your organization against insider threats, creating a security-aware workforce, and maintaining defenses in a BYOD and BYOA environment.
Security in the Cloud: Security is essential for a successful cloud. Learn about recent incidents, such as Heartbleed and the impact on and response of cloud services providers, as well as how to adapt cybersecurity processes for the cloud
Edna Conway, Chief Security Officer, Cisco Systems; Rich Perkett, Vice President, Product Management & Engineering, Rapid7 and many others.
MassTLC has offered to extend Member pricing to members of the BPMA. Register using the below code for a Non-Member Ticket to apply the discount.
Promotional code: BPMA2014
For more information and to register: http://masstlc.site-ym.com/ events/event_details.asp?id= 477322&group=