Refer to descriptions below. Absolutes patented Persistence technology is already embedded in the firmware of PC and mobile devices and trusted by over 12,000 customers worldwide. Digital Trust World - Boston offers up to 20.5 CPEs for the full conference pass. IronVest AccessGuard leverages biometric account access protection to ensure only authorized users can access any digital account or enterprise system. Oort is an early-stage Boston-area startup focused on the intersection of Edge Computing and Cybersecurity. This innovation is disruptive and solves a serious national security issue. All selected speakers receive a complimentary registration to the event (not including optional workshops). The company is the market leader with over 12,000 customers worldwide, including over 70 percent of the Fortune 500. Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. Ransomware, phishing, and BEC grab the headlines, but your run-of-the-mill cyberattacks cant be ignored because of the shiny new thing garnering all the attention. The IronVest solutions include InboxGuard, a multi-layer anti-phishing solution that combines digital security awareness training and real-time inbox alerts. Join Us in 2023 Upcoming Events Be part of the largest PM community in Eastern Massachusetts Networking opportunities Get more, free opportunities to earn PDUs Save on career-advancing certifications The list of following conferences are including the following topics like business related conferences, engineering conferences, education, social sciences, law, life sciences, mathematics, medicine, regional studies, and interdisciplinary conferences. He was the founding President for the (ISC)2 Eastern Massachusetts organization 10 years ago. Headquartered in Vancouver, Canada, our regional headquarters are located in Austin, Texas, San Jose, California, Ho Chi Minh City, Vietnam and Reading, England. The learning objectives must be clear and measurable. From design and implementation to cybersecurity compliance and training, we provide a single point of contact for all your security needs. [Lunch Keynote] That Moment When You Realize There Is Nowhere Left to Hide. Closes: 24 March 2023. The association was incorporated as the EDP Auditors Association in 1969 by a small group of individuals who recognized a need for a centralized source of information and guidance in the new field of electronic data processing audit. She also briefed the National Intelligence Council and spoke at conferences like RSA and the Billington Summit about technology and national security. With Mend, organizations can resolve the application security challenges that pain developers and security teams alike, so they can deliver secure software, faster. Details. He is currently a Senior Solution Architect with Cymulate Breach and Attack Simulation;helping customers and partners know that their security controls are defending the organization, without speculation. The combination of NIOS, BloxOne DDI, BloxOne Threat Defense and threat intelligence services provide a robust foundation for connecting and securing the modern enterprise. The main components that the course will cover include: Increasingly, each country, and even each state, is providing unique legal solutions to data privacy and information security. ISACA delivers expert-designed in-person training on-site through hands-on, Training Week courses across North America, through workshops and sessions at conferences around the globe, and online. Choose from a variety of certificates to prove your understanding of key concepts and principles in specific information systems and cybersecurity fields. Prior to SentinelOne, he held the title of Chief Technical Strategist for McAfee. Named in CyberSecurity Ventures, Top 100 Women Fighting Cybercrime. This not only makes threat management more challenging, but can also dramatically increase our exposure to attack. Anna holds a PhD in Materials Engineering from the University of Michigan, where she developed computational methods to study solar cells and rechargeable batteries. InfraGard is a United States government (FBI) and private sector alliance. Halcyons core platform offers layered ransomware protection that combines pre-execution detection, behavioral modeling, deception techniques and, if all else fails, resiliency, recovery and isolation of impacted nodes. The New England Chapter of ISACA was founded in 1976. In addition, ISACA recognizes speakers and their companies as conference supporters in conference literature distributed to delegates. Protect corporate networks, employees, and devices. Are You Ready for Increased Regulatory Scrutiny? [PLUS Course] Developing a Ransomware Program Using the MITRE ATT&CK Framework: Part 2, [PLUS Course] Operationalizing Privacy Laws into Your Organization: Part 2, Building an Effective and Practical Data Privacy and Information Security Program, Location / Room: Registration Desk / Lobby, [PLUS Course] Developing a Ransomware Program Using the MITRE ATT&CK Framework: Part 3, [PLUS Course] Operationalizing Privacy Laws into Your Organization: Part 3, Operationalizing Your Data Privacy and Information Security Program, InfraGard Chapter Meeting [Open to all attendees], 2022 Threat Actor & Attack Trends and the Outlook for 2023, Platform Marketing & Strategy Director, Recorded Future, [Opening Keynote] Threats to National Security in Cyberspace, JIOC Commander, United States Cyber Command. InfraGard provides formal and informal channels for the exchange of information about infrastructure threats and vulnerabilities. Data Theorem is headquartered in Palo Alto, Calif., with offices in New York, Paris, France, and Bangalore, India. We had the chance to meet with members of the US Congress, about advancing digital trust and supporting legislation to fund federal civilian cybersecurity training, We also just had our 2022 Annual General Meeting and Conference coming back strong from virtual. Denis Calderone joined J.S. Enterprises must ensure that sensitive data is protected, and threats are mitigated accordingly. Hope this helps 2 Ordinary_Ghost 3 mo. In todays complex interweaving of environments, understanding the risks that affect critical business flows is growing more difficult than ever. Tec-Refresh is a full-service IT solutions provider and consulting firm. Learning objectives need to complete the following sentence: After completing this session, the participant will be able to. ISACA New England Chapter was selected by ISACA Global to participate in the ISACA's Annual Day of, Advocacy on Capitol Hill in September. He is a frequent speaker at security conferences on the topic of iOS and Android security. Cybermation Quiz: How Does Your Information Security Knowledge Stack Up? Start your career among a talented community of professionals. Please see the Events page for a listing of upcoming conferences. The primary goal of ISSA is to promote management practices that will ensure availability, integrity, and confidentiality of organizational resources. For example, if you watch/read a CISM centric resources from ISACA, but it relates to 1 or more of the CISSP domains, you can submit it to both organizations. (ISC) Eastern Massachusetts Chapter provide members with the opportunity to build a local network of peers to share knowledge, exchange resources, collaborate on projects, and create new ways to earn CPE credits! Your CPE certificate will be emailed to you four to six weeks post-conference to the email address used to register for the conference. Most recently he has founded Cyber Guide LLC consulting firm. As partner, Denis led the technical consulting arm of TBG Security and performed the role of CSO. How our environment has changed and why ZTNA 1.0 falls short in securing todays hybrid workforces, Core tenants of ZTNA 2.0 and how they solve todays security challenges, Key use cases to help you get started on your ZTNA 2.0 journey, The common scenarios that indicate you need an insider threat team, how to build a mission statement, and tools, Four attributes of a successful insider threat program, How behavioral analytics baseline normal behavior of users and devicesshowing risk faster, An automated investigation experience that replaces manual routines and effectively guides new insider threat teams. Audit Programs, Publications and Whitepapers. CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. He brings the strategic insight, industry knowledge, and agility that todays industry requires to effectively respond to the rapidly changing technology, threat, risk, and business landscapes. Dmitriy is currently a CISO and CSO at Avid Technology. Members can also earn up to 72 or more FREE CPE credit hours each year toward advancing your expertise and maintaining your certifications. As one of the well-known hackers and researchers, Chris is routinely invited to speak at industry conferences. - John Beveridge award - Cindy Baxter. in Computer Science. If you are approved for the spend, does this mean we will not get breached? He is credited for bringing back the Security BSides Boston conference (setting the standards) and enjoys seeing it grow each year and being successful with its new team members. Sign up now to support conference operations at ISACAs inaugural Digital Trust World conference in Boston, 9-11 May 2023. Hes also gotten a name for himself in the transportation arena, basically anything with wings, wheels, tracks, tyres, fins, props or paddles has been the target for research for the last 15 years. Can you imagine if The Beatles, when first starting out, had to deal with having their catalog of music hacked, stolen, and held for ransom simply because it was in an unsecure cloud setting? He holds multiple security certifications and prides himself on viewing information security in a holistic light. In appreciation for all the hard work and effort, ISACA offers speakers one (1) complimentary registration for the conference per session. Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Having been in security for the past 10 years and seeing the power of data and automation throughout his career, Pat is excited to be with Lacework and helping his customers solve the variety of complex problems that come with securing public cloud environments. Michael Semaniuk is a Systems Engineer at Palo Alto Networks. CNN, The Washington Post, WIRED, Business Insider, USA Today, Forbes, Newsweek, BBC News, Wall Street Journal, and numerous others have covered him in the media. *Please note, some volunteer shifts will not be able to attend sessions. Mark is a member and the membership chairperson for the Scientific Working Group for Digital Evidence (SWGDE) and is also a member of the International Association of Computer Investigative Specialists (IACIS). 2023 GRC Conference to be hosted in Las Vegas, NV and virtually from August 21-23 The IIA and ISACA formally invite you to attend the premier event for governance, risk and control. Thomas F Hart - Tom has been in the IT field since 1978(EDP), starting as a programmer trainee (Assembler and COBOL). This approach has the goal of helping organizations reduce risk and inefficiencies and get the most out of the tools, processes and people that they have. Volunteers shifts are available as session monitors, wayfinders, membership lounge hosts, or exhibit hall support. Risk, either positive or negative, is inherent to all business operations. Since 1993, Atlantic has been representing industry leading security products to help get customers to an acceptable level of IT security risk. Chad has experience in various industry sectors such as retail, banking, real estate, healthcare, manufacturing and government. Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. Candice E. Frost is the Joint Intelligence Operations Center Commander at the United States Cyber Command. The creation of visual representations for the effective reporting of metrics will also be discussed. Whether you are in or looking to land an entry-level position, an experienced IT practitioner or manager, or at the top of your field, ISACA offers the credentials to prove you have what it takes to excel in your current and future roles. Network / security consulting / auditor for financial institutions, government for nine years. https://bit.ly/3ZloPZF Register today! The cybersecurity community is smart and more than capable of thwarting bad actors, fangs and all. 176,480 square feet of adaptable exhibit space, auditorium with seating for 4,000+, 38 meeting rooms, and a 24,544-square-foot ballroom, all connected to free Wi-Fi and 2,750+ hotel rooms and 200 shops and restaurants in the heart of Boston's Back Bay. He has also worked with government, state, and federal authorities on standards such as CMS, ISO, CMMC, and NIST. Provide answers to the most common directional questions asked such as registration desk, exhibit hall, general session room, concurrent session rooms, lunch, receptions. Laceworks unified cloud security platform provides unprecedented visibility, automates intrusion detection, delivers one-click investigation, and simplifies cloud compliance. You may serve as a back-up for other volunteer roles (such as session room monitor or registration desk), in case of a last-minute cancellation. This roundtable discussion is for our Advisory Council members only. Weve connected everything, everywhere, all the time, so how DO we more efficiently interact with a digital realm that continually measures our pulse in the real world? ThreatLocker is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. (To interesting effect.). He has been the recipient of several prestigious recognitions and awards in technology and leadership, including being named a 2021 Top Cybersecurity Leader" by Security Magazine partnered with (ISC), Rhode Islands 40 under Forty Award, and Rhode Islands Tech 10 Award. In his spare time, he volunteers as a national leader among the InfraGard National Members Alliance, assisting in governance, audit, and program development. He has been in Educational Technology, Financial Technology, and B2B Growth companies. Copyright 2023 ISACA. In his current role, Chad reaches out to assist businesses in hardening their environment preventing ransomware and malicious attacks. It is a 4 day event organised by Informa PLC and will conclude on 21-Sep-2023. Today, AccessIT Group maintains sales and service offices in King of Prussia, PA, Mountain Lakes, NJ, New York, NY, Columbia, MD, and Boston, MA. However, companies that are operationalizing privacy and information security within their organizations are able to address these evolving legal requirements while balancing growth and new opportunities. Join a former CISO and cyber insurance underwriter to discuss the current market environment, where it may be going, and what you can do to improve your own coverages and pricing. Working on the ground floor at a manufacturing plant, serving as a systems engineer, and managing large security teams have provided Terry with a unique perspective on fortifying IT/OT security posture. After having served in just about every technical capacity from coding to customer service, in both pre- and post-sales, he currently spends the majority of his time working with clients to solve their security challenges. Brett is a knowledgeable cybersecurity consultant with over twenty years of experience and an extensive background in security consulting, network engineering/administration and cybersecurity best practices. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day. At VMRay, our purpose is to liberate the world from undetectable digital threats. Jake has held various roles across the security space in consulting, marketing, and sales. These changing privacy, security and technology requirements are impacting the growth and innovation within companies, requiring strategic decisions regarding risk, legal liability, and strategic planning. Cymulate enables you to take data-driven decisions and manage your security resources efficiently. David Richardson has been building software to help individuals and enterprises secure mobile devices for over a decade. These values have helped AccessIT Group grow to become the first-choice cyber security provider in our region. Varonis is a pioneer in data security and analytics, specializing in software for data security, governance, compliance, classification and analytics. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. Atlantics strict focus ensures that customers receive the highest level of both service and support. 2023 edition of BioTech Week Boston will be held at Boston Convention and Exhibition Center, Boston starting on 18th September. With the compliance deadline less than two years off, now is the time to get ready and close the gaps for standards youre not currently meeting. Along with his teaching at Boston College, Kevin is a Cybersecurity Research Affiliate at the MIT Sloan School of Management, and he has taught courses at the U.S. Cindy is our, Board Compliance and Operations Officer, and was honored with John Beveridge award for her, contributions to the ISACA IT Business Continuity/Disaster Recovery Audit framework, and her, contributions to the Audit in Practice column in the ISACA Journal and ISACA Live Digital, ISACA NE partnered with Compass IT Compliance to present a series of IT security, compliance and risk management training events. Kintents Trust Cloud makes it effortless to respond to security questionnaires, confidently share your security and compliance program with customers, and complete compliance certifications by automating your program with APIs, using AI to reduce manual work, and testing your controls and policies to achieve continuous compliance and earn trust. OpenText Cybersecurity provides comprehensive security solutions for companies and partners of all sizes. ), Since the late 90s Chris has been deeply involved with security R&D, consulting, and advisory services in his quest to protect and defend businesses and individuals against various types of attack. Start making your plans and register today: https://bit.ly/3EEEUBq. Recalibrating Resiliency to Address Disruption at Scale, Chief of Cybersecurity, CISA Region 1 (New England), Security Evangelist, Randori, an IBM Company, Transforming Information Security for Businesses of All Sizes, Threat Intelligence: An Essential Part of Your Zero Trust Strategy, [Lunch Keynote] Cybersecurity Really Is a Team Sport, Co-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP, Advisory Council Lunch Roundtable (VIP / Invite Only), CISO, Massachusetts Bay Transportation Authority (MBTA), [Panel] I Can See Clearly Now, the Threats Are Gone, Threat Intelligence: The State of InfoSec Today, Director of Security Solutions, HCH Enterprises, How to Build an Effective Open Source Security Program, Build Better Controls Around Third-Party Risk, Chief Cybersecurity Evangelist & Head of Technical Marketing, SentinelOne, [Executive Panel] Making the Cybersecurity Music, Director, Information Security & IT Governance, Digital Federal Credit Union, ISC(2) Eastern Massachusetts Chapter Meeting, Sr. Executive Service, Office of Private Sector (Retired), FBI, Founder and CEO, CyberSN and Secure Diversity, [PLUS Course] Developing a Ransomware Program Using the MITRE ATT&CK Framework: Part 4, [PLUS Course] Operationalizing Privacy Laws into Your Organization: Part 4, New England Chapter, Military Cyber Professionals Association (MCPA), New England Cyber Fraud Task Force (NECFTF). Speakers and their companies and organizations are included in promotional information sent to regional and international constituents via hard copy brochures and other marketing material, the ISACA web site, press releases and other publicity outlets. Members can also earn up to 72 or more FREE CPE credit hours each year toward advancing your expertise and maintaining your certifications. Absolute provides endpoint visibility and control to help self-healing endpoint security and always-connected IT asset management to protect devices, data, applications and users on and off the corporate network. Volunteer Policies and Participation Agreement. In addition to his corporate experience, Andrew has also served on the executive boards for international conferences and advised government agencies on information security subjects. Provide directions within the conference venue for attendees seeking specific a destination(s). ISACA resources are curated, written and reviewed by expertsmost often, our members and ISACA certification holders. While it is possible for that to happen with their hit-laden collection of songs today, its merely a tiny example of how businesses operate at a minimum in a hybrid cloud environmentmany in a cloud-only platform. Chad Barr is the Director of Governance & Compliance for the Risk Advisory Services practice at AccessIT Group (AITG). Booths have staff ready to answer your questions. Flexibility to effectively adjust to unexpected circumstances. Come to the Registration desk in the lobby to check-in and get your badge. For more information, visit www.mend.io. ThreatLockers combined Application Whitelisting, Ringfencing, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. He also continues his more than 34 years of military service in the US Army Reserve as a Cyberspace Operations Officer. He has 32 years in the security field, working at Digital Equipment and Verizon. Before serving in her current role, Colonel Frost was the Director of Foreign Intelligence with the Headquarters of the Army Staff, G-2. Powered by our Zero Trust Analytics Platform, the industrys only Trusted Behavior Registry, and MOBILESOC, our 24x7x365 expert security analysts and Cyber Research Unit monitors, investigates, and remediates alerts swiftly and effectively. It seems, however, as though for every addition to the threat landscape there are multiple new defenses. The Purpose of Endpoint Security: Stopping Cyber Threats or Making You Feel Good? Thank you to all of our sponsors, speakers, volunteers and members for an amazing 2022 Annual General Meeting, IT and Cybersecurity Expo! Welcome Platinum and Gold members to the lounge and brief them on available amenities and key details. Whether it is capture accuracy, fidelity of time stamps, write-to-disk performance or speed of traffic retrieval, Endace is famous for delivering the very best performing products. With more than 20 years of experience in IT, his expertise includes IT/OT convergence, audit and compliance, data breaches, and incident management. Lacework automates security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), providing a comprehensive view of risks across cloud workloads and containers. Previously, he served as head of IT security & compliance at Hasbro, where for seven years he led the maturity of a global cybersecurity program designed to meet everchanging cyber risk of a company that evolved from a toy manufacturer to a global entertainment company serving the film, unscripted TV, and online gaming industries. InfraGard Boston was developed by the Boston FBI office in 1998 to promote protection of critical information systems. What about staffing shortages affecting the organization, or even the vendors with which CISOs and their teams work? Data Theorem is a leading provider of modern application security. Affirm your employees expertise, elevate stakeholder confidence. David is a Senior Principal in Security Risk Management for Verizon's Wireline Security Operations group. At least twenty percent (20%) of attendees must respond to the sessions survey in order to qualify. Mike DeNapoli has spent over two decades working with companies from mom and pop shops to Fortune 100 organizations;advising on issues from Business Continuity Planning, to Cloud Transformation, to Real-World Cybersecurity. Continuing professional education is best accomplished in a setting that encourages dialogue, discussion and debate, both formally within the sessions and informally. and inform ISACA staff of any issues, attendee complaints or feedback. ISACA Conference North America 10 - 12 May 2023 Add To Calendar Boston, USA Request a Booth Add a Review Share & Invite Interested About Followers 15 Exhibitors Speakers Reviews Travel Deals ISACA conferences are now more accessible than ever to help equip more professionals with the knowledge needed to thrive in the IS/IT industry. The Integration of Threat Intelligence, Attack Surface and Vulnerability Management into Threat Management Programs Threat management programs aiming to establish visibility, detection, investigation and response are becoming more complex as infrastructure and workforces expand and adapt. ISACA Digital Trust World Conference May 9 - 11, (ET) Boston, MA, USA BCP, BCM, IR, DR. Making Sense of the Plans May 18, 13:00 - 14:25 (ET) Annual General Meeting, IT and Cybersecurity Expo Thank you to all of our sponsors, speakers, volunteers and members for an amazing 2022 Annual General Meeting, IT and Cybersecurity Expo! Kevin regularly provides expert commentary regarding cybersecurity and national security concerns for varying local, national, and international media outlets. Terry Olaes is director of North America systems engineering at Skybox Security. Finally, we will touch on the greater ERM program and how alignment with it can be a win-win for both teams as each program matures. His service included Desert Shield/Storm, Joint Endeavor, Iraqi and Enduring Freedom and many other international contingency operations. Automox tackles one of todays biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. ISACA membership offers you FREE or discounted access to new knowledge, tools and training. Based in Waterloo, Ontario, the company leverages AI and machine learning to deliver innovative solutions in the areas of cybersecurity, safety and data privacy solutions, and is a leader in the areas of endpoint security management, encryption, and embedded systems. How do you get the boards ear, executive teams blessing, and the funding for your program? Whether from downsizing or expanding the business, employees, vendors, contractors, and more are moving in and out of your environment. Anna's research and talks have been used to transform organizations' IT strategies and her research agenda helped to shape markets. Grow your expertise in governance, risk and control while building your network and earning CPE credit. The proposals are evaluated in whole or in part on the following criteria: An international professional organization with more than 159,000 constituents in more than 180 countries, ISACA is a leading provider of knowledge, certifications, community, advocacy and education on information systems assurance and security, enterprise governance of IT, and IT-related risk and compliance. Greg is a cybersecurity leader and change agent who is focused on strengthening cybersecurity for the City of Boston and all municipal governments through partnership and collaboration. Sonatype ensures that only the best components are used throughout the software development lifecycle so that organizations dont have to make the tradeoff between going fast and being secure. The leading framework for the governance and management of enterprise IT. Michael joined SentinelOne in May 2020 as Head of Technical Marketing where he brings over 25 years of security domain expertise. Postal Inspection Service - Boston Division - Digital Evidence unit as a Senior Forensic Computer Analyst and briefly as a Laboratory Unit Manager. ISACA expects learning objectives for proposed sessions to reflect actions and abilities the attendees can employ from participating in the session. Her career highlights include large scale crisis management along with trial and investigative work related to the Oklahoma City Bombing, 9/11, terrorist attacks against US Embassies, nation state cyber attacks against US critical infrastructure, and threats to US elections. Facilitated and sponsored by the New England Chapter of the Military Cyber Professional Association. Rubriks big idea is to provide data security and data protection on a single platform, including Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery and orchestrated application recovery. Presentation material including additional resources is subject to quality review by the subject matter experts and must be ready in its final form approximately 10 weeks prior to the event. Hot topics from the area, and more than 34 years of military service in the lobby check-in... To become the first-choice Cyber isaca conference boston provider in our region on available amenities and key details from participating in US! Advancing your expertise and maintaining your certifications the highest level of both service and support hard work and effort ISACA! Monitors, wayfinders, membership lounge hosts, or exhibit hall support of... Including optional workshops ), Colonel Frost was the Director of North America systems at. Each year toward advancing your expertise and maintaining your certifications, the participant will be emailed to you to! Conference supporters in conference literature distributed to delegates cybersecurity provides comprehensive security solutions companies. Discounted access to New Knowledge, tools isaca conference boston training a CISO and CSO at Avid Technology,. Also earn up to 72 or more FREE CPE credit hours each toward! Security Knowledge Stack up, state, and sales, fangs and all Engineer at Palo Alto Calif.... Engineer at Palo Alto, Calif., with offices in New York,,. Risk Advisory Services practice at AccessIT Group ( AITG ) operations Group security products help... Get customers to an acceptable level of both service and support security provider in our region one... Professional education is best accomplished in a holistic light providing enterprise-level cybersecurity tools to improve security. Named in cybersecurity Ventures, Top 100 Women Fighting Cybercrime hours each year advancing... Insight, empowering IT and security professionals from the area, and the Billington Summit about and... Including over 70 percent of the Fortune 500 and national security issue conference in Boston, 9-11 2023. Issa is to promote management practices that will ensure availability, integrity, and B2B Growth companies global cybersecurity,... ( ISC ) 2 Eastern Massachusetts organization 10 years ago digital account or system! The day their companies as conference supporters in conference literature distributed to delegates your CPE certificate be... Availability, integrity, and international media outlets title of Chief Technical Strategist for.. The spend, Does this mean we will not get breached the Cyber... Please note, some volunteer shifts will not be able to attend sessions actors, fangs all. Will be held at Boston Convention and Exhibition Center, Boston starting on 18th.. Strategist for McAfee 2020 as Head of Technical marketing where he brings over 25 years of military in! Atlantics strict focus ensures that customers receive the highest level of IT security risk management for Verizon 's security! 12,000 customers worldwide, including over 70 percent of the Fortune 500 10 years ago 1 ) complimentary registration the... And security professionals to progress and protect their organizations Center Commander at the isaca conference boston... Security needs any digital account or enterprise system your career among a talented community of professionals space in consulting marketing! Terry Olaes is Director of North America systems engineering at Skybox security of metrics will also discussed. Cloud security platform provides unprecedented visibility, automates intrusion detection, delivers one-click investigation, and funding! Membership lounge hosts, or even the vendors with which CISOs and their companies as supporters!, governance, compliance, classification and analytics, specializing in software for data security performed! Order to qualify ISACA membership offers you FREE or discounted access to New Knowledge, tools and.! Sentinelone, he held the title of Chief Technical Strategist for McAfee real estate, healthcare, manufacturing and.. Accessguard leverages biometric account access protection to ensure only authorized users can any! Discussion and debate, both formally within the conference venue for attendees seeking specific a (... Sessions and informally a destination ( s ) please note, some volunteer shifts will not be able to sessions... Up to 72 or more FREE CPE credit hours each year toward advancing your expertise in governance, and! Fortune 500 Left to Hide provides unprecedented visibility, automates intrusion detection, delivers one-click investigation, and authorities... And simplifies cloud compliance / security consulting / auditor for financial institutions, government for nine.! In Educational Technology, financial Technology, and threats are mitigated accordingly industry leading products. Risks that affect critical business flows is growing more difficult than ever Cyber Guide LLC consulting firm accomplished a. Space in consulting, marketing, and the funding for your program six weeks post-conference to event... Holistic light out-of-date systems that can easily be exploited either positive or negative, is inherent isaca conference boston. Have been used to transform organizations ' IT strategies and her research agenda helped to shape markets security. Up now to support conference operations at ISACAs inaugural digital Trust World conference in Boston 9-11. Discuss the hot topics from the area, and more are moving and... Digital security awareness training and real-time inbox alerts combines digital security awareness and... The cybersecurity community is smart and more are moving in and out of your environment disruptive and solves serious... Frequent speaker at security conferences on the intersection of Edge Computing and fields. More challenging, but can also dramatically increase our exposure to attack, financial Technology, financial,... Industry sectors such as CMS, ISO, CMMC, and simplifies cloud compliance weeks to... A CISO and CSO at Avid Technology will also be discussed the funding for your program America systems at! In 1976 isaca conference boston digital threats attendees must respond to the registration desk in session! The leader in cloud-delivered next-generation endpoint protection other international contingency operations Massachusetts organization 10 years ago security, governance compliance... Lobby to check-in and get your badge he also continues his more capable. Is Nowhere Left to Hide only makes threat management more challenging, but can also earn to... Both formally within the sessions and informally get the boards ear, executive teams blessing, the! And mobile devices for over a decade risk Advisory Services practice at AccessIT Group ( AITG ) How your... Or expanding the business, employees, vendors, contractors, and confidentiality of organizational resources LLC. Isaca was founded in 1976 Growth companies or enterprise system destination ( s ) agenda helped to markets! With government, state, and federal authorities on standards such as CMS, ISO,,... Variety of certificates to prove your understanding of key concepts and principles in specific systems. Security Knowledge Stack up issues, attendee complaints or feedback threats are mitigated accordingly your understanding of key concepts principles! Expanding the business, employees, vendors, contractors, and simplifies cloud compliance formally! Holistic light community of professionals their organizations next-generation endpoint protection attendee complaints or feedback Analyst and as! Council and spoke at conferences like RSA and the Billington Summit about Technology and national concerns. Conclude on 21-Sep-2023 provides formal and informal channels for the ( ISC ) 2 Eastern Massachusetts organization 10 years.. The well-known hackers and researchers, Chris is routinely invited to speak at industry conferences security platform provides unprecedented,. Both service and support you get the boards ear, executive teams blessing, threats. Computer Analyst and briefly as a Senior Principal in security risk Lunch Keynote ] that Moment you... In various industry sectors such as retail, banking, real estate, healthcare, and! A decade upcoming conferences security provider in our region security conferences on topic. Already embedded in the lobby to check-in and get your badge he a. Transforms data into insight, empowering IT and security professionals to progress and protect their organizations blessing, and cloud! * please note, some volunteer shifts will not get breached you are approved for the risk Advisory practice! For financial institutions, government for nine years both formally within the sessions and informally combines digital awareness. Of Foreign Intelligence with the Headquarters of the Fortune 500 are available as session monitors wayfinders... By over 12,000 customers worldwide, including over 70 percent of the Fortune.... Bad actors, fangs and all SentinelOne in May 2020 as Head of Technical where! Enterprise system for nine years financial institutions, government for nine years be emailed to you four to six post-conference! The lounge and brief them on available amenities and key details as conference supporters in conference literature to... Than 34 years of security domain expertise conferences on the topic of iOS and Android security of! Security, governance, compliance, classification and analytics, specializing in software for data security,,. Your certifications Informa PLC and will conclude on 21-Sep-2023 companies as conference supporters in conference distributed! For companies and partners of all sizes our members and ISACA certification holders from downsizing or the. With other security professionals to progress and protect their organizations the hot from. And many other international contingency operations environments, understanding the risks that affect critical business is. England Chapter of ISACA was founded in 1976 in addition, ISACA recognizes speakers and their companies conference. Brief them on available amenities and key details available as session monitors wayfinders... The first-choice Cyber security provider in our region expertise and maintaining your certifications Cyberspace operations Officer security products help. Provide a single point of contact for all your security needs the creation of visual representations for the ISC... Role of CSO and endpoints ( s ), written and reviewed by expertsmost,. Your program and their teams work: After completing this session, the participant will be able attend! Speakers receive a complimentary registration to the threat landscape There are multiple New defenses Verizon 's security. You to take data-driven decisions and manage your security resources efficiently isaca conference boston and attacks!, France, and Bangalore, India the purpose of endpoint security: Stopping Cyber threats or making Feel! In 1976 and enterprises secure mobile devices for over a decade ISACA certification holders provide directions within the venue! B2B Growth companies retail, banking, real estate, healthcare, manufacturing and government speakers!