Search MassTLC
Sign In


Forgot your password?

Create Your Free Profile

MassTLC Calendar

10/6/2016
Career Fair

10/12/2016
Membership Overview Call

10/20/2016
TechExec Rooftop Party

GET EMAIL UPDATES

Get email updates on upcoming events and
new content!

Email:

CONNECT WITH MASSTLC

 
 



2014 Security Conference: Building Security InTo an Insecure World
Tell a Friend About This EventTell a Friend
2014 Security Conference: Building Security InTo an Insecure World

NOTE: Attendees must bring a government-issued photo ID.

10/22/2014
When: October 22, 2014
8:30 AM - 4:30 PM
Where: Federal Reserve Bank of Boston
600 Atlantic Ave #100
Boston, Massachusetts  02210
United States
Contact: Margot Rodger

« Go to Upcoming Event List  



Online registration will close on Monday, October 20, 2014 at 3:00 p.m.
We regret that walk-in registration is not available at this event due to federal building security restrictions.

The question is not if you will be compromised, but when. High-profile breaches coupled with the dramatic rise in mobile devices, digital applications and the vast amount of electronic data available for exploitation have raised cybersecurity to the forefront of technology, from the boardroom to the end user. Cybersecurity is now a shared responsibility – we’re all in this together.

Please join local visionaries and industry leaders for this full day conference to explore the current landscape of cybersecurity threats, new attacks on modern infrastructure, how to reduce risk, prepare for and respond to security breaches, and how to work with c-suite leadership on managing your company’s cybersecurity strategy.  


KEYNOTE & KEYNOTE PANEL:

   
 KEYNOTE PANEL
Gerald Beuchelt
Chief Security Officer
Demandware
 KEYNOTE PANEL
Michael Howell
Deputy Program Manager
Office of the Program Manager,

Information Sharing Environment Washington, D.C.
 KEYNOTE
Bruce Schneier
CTO
Co3 Systems
 KEYNOTE PANEL 
Kevin Swindon
Supervisory Special Agent
Federal Bureau of Investigation


SPEAKERS:

     
Seble Assefa
Network Services Group
Federal Reserve Bank of Boston 
 Caleb Barlow
VP, Mobile Security
IBM
Gregory Bialecki
Secretary of Housing and Economic Development
Commonwealth of Massachusetts 

Joshua Brickman
Director, Security Evaluations
Oracle  
Edna Conway
Chief Security Officer,
Global Supply Chain
Cisco Systems, Inc. 
    
 Eric Cowperthwaite
‎Vice President, Advanced Security & Strategy

Core Security Inc.

Greg Dracon
Partner
.406 Ventures
 
Andy Ellis
CSO
Akamai
 

Bryan House
Vice President
 Global Accounts
Acquia


    
 Jim Flynne
Vice President of Operations
Carbonite


Mark Jaffe
CEO
Prelert 
Jigar Kadakia
 Chief Information Security and Privacy Officer
Partners Healthcare
 

Andrew Kenney
Vice President
Platform Engineering
Acquia

Sally Long
Executive Director
The Open Group
 
 
 
Brian Milas
Chief Technology Officer
Courion 
Kevin O’Brien
VP / Founding Team
Conjur, Inc.
 Jim O’Neill
Chief Information Officer
Hubspot  

Rich Perkett
Vice President, Product Management & Engineering
Rapid7

Paul Roberts
Editor in Chief
Security Ledger  
Piyum Samaraweera
Senior Director of Product Management for Cloud
Sophos
  
  
 Jon Stavis
VP, Software Development & Product Management, Information
Security & Risk
Fidelity
Investments
Mark Steinhoff
Director
Deloitte & Touche LLP 
Maxim Weinstein
Security Advisor
Sophos  
Adam Woodbury
Principal Engineer
MITRE 
  Chris Wysopal
Co-Founder & CTO
Veracode
 Ron Zalkind
CTO and Co-Founder
CloudLock



CPE & ISACA Credits Available!

MassTLC is an Official (ISC)2 Continuing Professional Education (CPE) Submitter. This course is eligible toward the certification maintenance requirements. A sign-in sheet will be available onsite to register for credit. Please bring your (ISC)2 member number.  

For attendees seeking Continuing Professional Education credits through ISACA, a certificate of attendance will be provided. ISACA does not accredit external events, but may use the certificate of attendance for individual submission for CPE credits.


AGENDA: *
* In our continued effort to bring you the most up-to-date program, session topics are subject to change.

 8:30 AMRegistration and Networking Breakfast 

 9:00 AMWelcome and Introductions

 9:20 AMKeynote Panel: State of Cybersecurity and Information Sharing Organizations
The question is not IF you will be compromised, but WHEN. Learn about the current landscape of cybersecurity threats, new types of attacks on modern infrastructure, and how to reduce risk, prepare for and respond to security breaches, and how information sharing organizations, public and private, are working together to combat these threats.
   •  Gerald Beuchelt, Chief Security Officer, Demandware
   •  Michael Howell, Deputy Program Manager, Office of the Program Manager, Information Sharing
      Environment, Washington, D.C.

   •  Kevin Swindon, Supervisory Special Agent, Federal Bureau of Investigation

 10:05 AMWho Owns Security?
Recent cybersecurity breaches have elevated the responsibility and consequences for cybersecurity to the highest echelons of company leadership. This panel will explore the increasingly strategic role security and privacy are taking in organizations, and how those responsible for security within those organizations can convey key performance indicators of cybersecurity to CEOs and Board members.
   •  Jigar Kadakia, Chief Information Security and Privacy Officer, Partners Healthcare
   •  Mark Steinhoff, Director, Deloitte & Touche LLP
   •  Chris Wysopal,
Co-Founder & CTO, Veracode

 10:50 AMNetworking Break

 11:10 AMBREAK OUT SESSIONS:

OPTION 1:

The Human Firewall
In an increasingly BYOD and BYOA world, mobile security and the human firewall – your organization’s employees – are of critical importance in maintaining defenses. Learn how to manage security within a growing mobile and cloud-based environment, and how to fortify identity and access management to minimize risk.
    •  Caleb Barlow, VP of Mobile Security, IBM
    •  Brian Milas, Chief Technology Officer, Courion



 

OPTION 2:
Securing Your Third Party Vendors
Your company and products may be secure, but what about those of third party vendors and supply chain partners? Explore the issues in managing cybersecurity risks in the end-to-end supply chain environment.
    •  Joshua Brickman, Director, Security Evaluations, Oracle
    •  Edna Conway, Chief Security Officer, Global Supply Chain, Cisco Systems, Inc.
    •  Sally Long, Executive Director, The Open Group
    •  Adam Woodbury, Principal Engineer, MITRE

 12:00 PMNetworking Lunch

 12:40 PM

BREAK OUT SESSIONS:

OPTION 1:

Security Intelligence

This session will address how companies can utilize the power of Big Data to improve situational awareness in order to provide preemptive defenses from multiple cybersecurity threats.
   •  Seble Assefa, Network Services Group, Federal Reserve Bank of Boston
   •  Eric Cowperthwaite, Vice President, Advanced Security & Strategy, Core Security Inc.
   •  Mark Jaffe, Chief Executive Officer, Prelert

  •  Paul Roberts, Editor-in-Chief, Security Ledger

Rich Perkett, Vice President, Product Management & Engineering, Rapid7

 

OPTION 2:
Security for the Rest of Us

Small businesses face unique challenges in securing their (and their customers’) assets. This session will explore how organizations are addressing security concerns in small businesses, and maintaining the level of security their customers demand.

   •  Maxim Weinstein, Security Advisor, Sophos

 1:35 PMSelling Security

   •  Andy Ellis, Chief Security Officer, Akamai Technologies, Inc.
   •  Bryan House, Vice President, Global Accounts
   •  Andrew Kenney, Vice President, Platform Engineering


 2:20 PMSecurity in the Cloud
This session will explore recent incidents, such as Heartbleed and impact on and response of cloud service providers, as well as how to adapt cybersecurity processes and business applications for the cloud.
   •  Jim O'Neill, Chief Information Officer, Hubspot
   •  Piyum Samaraweera, Senior Director of Product Management for Cloud, Sophos
   •  Ron Zalkind, CTO, CloudLock

 3:05 PMNetworking Break

 3:20 PMInnovating in Information Security
This session will focus on how entrepreneurs, companies and investors all have an opportunity to help defend against information security attack. Discussion topics will range from what security challenges are gathering momentum, market insight, hiring employees and raising capital.
   •  Greg Dracon, Partner, .406 Ventures
   •  Kevin O’Brien, VP / Founding Team, Conjur, Inc.
   •  Jon Stavis, VP, Software Development & Product Management, Information Security & Risk, Fidelity
      Investments


 4:00 PMKeynote: The Future of Incident Response
Protection and detection can only take you so far, and breaches are inevitable. As a result, response incident response has stepped into the spotlight. This session will examine the economic and psychological forces within the computer security field and describe the future of incident response (IR) and thus, the industry. It will discuss how response technology, unlike detective and preventative controls, must augment people rather than replace them. Understanding the implications of this reality requires a systems theory approach to IR. This session borrows one from the US Air Force: OODA loops. By leveraging the cycle of observe, orient, decide, and act, this session demonstrates how we can optimize IR efforts, and deliver valuable insight into what is arguably the most crucial discipline to maintaining IT security in the coming decade.
   •  Bruce Schneier, Chief Technology Officer, Co3 Systems

 4:30 PMClosing Remarks

 4:35 PMNetworking Cocktail Reception - with a view!
The conference will conclude with a networking cocktail reception on the rooftop of the Federal Reserve.
Here is a sneak peak:




Platinum Sponsors

  

Gold Sponsor  Silver Sponsors  
  

 
 



Interested in sponsoring this year's conference?  Email us for more information:
sponsorship@masstlc.org

Security Conference Advisory Board:
 
  • Gerry Beuchelt, Demandware (Co-Chair)
  • Lee Weiner, Rapid7 (Co-Chair)
  • Jack Bonner, MITRE
  • Deb Briggs, NetScout
  • Edna Conway, Cisco
  • Justin Cuyler, Acquia
  • Marc French, Constant Contact
  • Patrick Harding, Ping Identity
  • Mark Leary, Xerox
  • Ken Leeser, Kaliber Data
  • Nick Levay, Bit9
  • Brian Milas, Courion
  • Upesh Patel, Trusteer/IBM
  • Ron Piccioli, Iron Mountain
  • Michael Stewart, Federal Reserve Bank of Boston
  • Chris Wysopal, Veracode
  • Ron Zalkind, CloudLock
  • Stephen Zamierowski, Deloitte

 

ORDER YOUR TICKET BELOW:

EVENT PHOTOS

 

                                                                                                             THANK YOU TO OUR GLOBAL SPONSORS                                                       

 
   
 
    


 



   
           



           

                   





  
           


  

 

 

                                 




           

 

                    




                 

                      


        






 
 

About
Board of Directors
Team
In the News
Careers
Contact Us
Membership
Member Directory
Tech Company
IT Department
Affiliate
Join Now
Renew Now
Events
Annual Meeting
Boston TechJam
Innovation unConference
Leadership Awards
MassTLC Events
Community Events
Communities
Big Data
Cloud
CXO Series
Internet of Things
Healthcare & Life Sciences
Mobile
Robotics
Sales & Marketing
Security
Software Dev
Workforce Dev
Ed Foundation
Internships
K-12 Initiatives

Resources
Affiliate Directory
Blog

Content Library
Job Board
MassTLC TV
More Opportunities
Policy
Sponsor
Get Involved