Our customers include Fortune 1000 companies to midsize organizations as well as government and defense agencies. Its 247 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business-disrupting events. Region 1 is headquartered in Boston and Mr. King oversees CISA cybersecurity services and support via Cybersecurity Advisors throughout New England. He has worked in the Banking, Defense, Utilities, Gov. 2023 GRC Conference to be hosted in Las Vegas, NV and virtually from August 21-23 The IIA and ISACA formally invite you to attend the premier event for governance, risk and control. In addition, ISACA recognizes speakers and their companies as conference supporters in conference literature distributed to delegates. ISACA 205,275 followers 2d Thank you Jo Stewart-Rattray for being a true leader for women in technology. All selected speakers receive a complimentary registration to the event (not including optional workshops). The (ISC)2 Maine Chapter is a professional association authorized by the (ISC)2 the Worlds Leading Cybersecurity Professional Organization created by (ISC)2 members and information security professionals living and working in Maine. Mr. Woodson is an IT information security professional with over 25 years of experience and has a deep understanding of operational and information technology processes, the implementation of cost - As mobile, hybrid, and public cloud computing have become dominant models, his technical focus has evolved from endpoint and email security toward mobile and cloud-based, software-defined architectures delivering workload resiliency and security. Assist ISACA with line support and ticket collection for t-shirt creation experience in exhibit hall, Help answer attendee conference and directional questions, Volunteers may not attend sessions during their shift. Gigamon is the first company to deliver unified network visibility and analytics on all information-in-transit, from raw packets to apps, across physical, virtual and cloud infrastructure. Protecting more than $6 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements. Speakers can prove their value, expertise, knowledge and acumen by presenting relevant and timely subjects in an effective manner, often leading to business development. Powered by actionable insights from our real-time contextual threat intelligence, OpenText Cybersecurity customers benefit from high efficacy products, a compliant experience, and simplified security to help manage business risk. Mark is a member and the membership chairperson for the Scientific Working Group for Digital Evidence (SWGDE) and is also a member of the International Association of Computer Investigative Specialists (IACIS). Varonis detects insider threats and cyberattacks by analyzing file activity and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation. This roundtable discussion is for our Advisory Council members only. This talk will discuss how to measure the controls used to mitigate risk in a way that informs not only on if the controls are being effective in managing business risk, but also to ensure that theyre not having a negative impact. John has spent the last decade focused on helping to improve the lives of security analysts and security operations teams using software solutions, data analytics and automation. Brett Price is a Senior Cybersecurity Consultant for the Risk Advisory Services practice at AccessIT Group (AITG). This session will include an overview of key compliance documentation, including policies, procedures, and supporting documentation. And what a great event it was! Before his time with CISA, Mr. King was Global Lead for IBM Security Command. Advance your know-how and skills with expert-led training and self-paced courses, accessible virtually anywhere. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney. The Integration of Threat Intelligence, Attack Surface and Vulnerability Management into Threat Management Programs Threat management programs aiming to establish visibility, detection, investigation and response are becoming more complex as infrastructure and workforces expand and adapt. Because when you secure your data, you secure your applications, and you secure your business. ), Since the late 90s Chris has been deeply involved with security R&D, consulting, and advisory services in his quest to protect and defend businesses and individuals against various types of attack. events with 300 attendees in-person attendees. Has led technical teams of up to 200 individuals both nationally and globally, while leading in various industries such as telecoms, energy, software, government, retail, financial services, international organizations/NGOs, and non-profit. Make plans for ISACA Conference: #DigitalTrustWorld Boston on 9-11 May. Adam Rosen serves as Vice President of Product Strategy at Netwrix. With hundreds of chapters across the globe, ASIS is recognized as the premier source for learning, networking, standards, and research. The zero-integration, browser-based solution provides a holistic account access protection solution for companies of all sizes. Please identify a replacement if you must cancel less than 72 hours before the conference. Senior Information Technology/Security Executive with over 25 years of experience at premier institutions successfully building services and client relationships, developing methodologies, and integrating cross-functional skills. We serve over 165,000 members and enterprises in over 188 countries and awarded over 200,000 globally recognized certifications. Headquartered in Dallas, TX, Zimperium is backed by Liberty Strategic Capital and SoftBank. Using ForgeRock, more than 1,300 global customer organizations orchestrate, manage, and secure the complete lifecycle of identities from dynamic access controls, governance, APIs, and storing authoritative dataconsumable in any cloud or hybrid environment. We help address the worlds greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. However, as more sensitive data and critical processes are moved to the cloud, ensuring the security and integrity of these assets becomes increasingly important. With offices in Rhode Island and the Boston area, Envision serves clients throughout New England and beyond. Also, he won 1st and 2nd prizes in various English Parliamentary Debate Competition.<br><br>After graduation, he worked as a Security Consultant in NRI, and he was specialized in Red Team, Blue Team, and Global Security Management. UpGuard is the best platform for securing your organizations sensitive data. BS, Management Science, Bridgewater State University The (ISC)2 Maine Chapter is dedicated to providing education and regular meetings to help information security professionals in Maine. SecureWorld staff will be available throughout the day if you have any questions. No matter how broad or deep you want to go or take your team, ISACA has the structured, proven and flexible training options to take you from any level to new heights and destinations in IT audit, risk management, control, information security, cybersecurity, IT governance and beyond. 900 Convention Center Blvd. Recalibrating Resiliency to Address Disruption at Scale, Chief of Cybersecurity, CISA Region 1 (New England), Security Evangelist, Randori, an IBM Company, Transforming Information Security for Businesses of All Sizes, Threat Intelligence: An Essential Part of Your Zero Trust Strategy, [Lunch Keynote] Cybersecurity Really Is a Team Sport, Co-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP, Advisory Council Lunch Roundtable (VIP / Invite Only), CISO, Massachusetts Bay Transportation Authority (MBTA), [Panel] I Can See Clearly Now, the Threats Are Gone, Threat Intelligence: The State of InfoSec Today, Director of Security Solutions, HCH Enterprises, How to Build an Effective Open Source Security Program, Build Better Controls Around Third-Party Risk, Chief Cybersecurity Evangelist & Head of Technical Marketing, SentinelOne, [Executive Panel] Making the Cybersecurity Music, Director, Information Security & IT Governance, Digital Federal Credit Union, ISC(2) Eastern Massachusetts Chapter Meeting, Sr. Executive Service, Office of Private Sector (Retired), FBI, Founder and CEO, CyberSN and Secure Diversity, [PLUS Course] Developing a Ransomware Program Using the MITRE ATT&CK Framework: Part 4, [PLUS Course] Operationalizing Privacy Laws into Your Organization: Part 4, New England Chapter, Military Cyber Professionals Association (MCPA), New England Cyber Fraud Task Force (NECFTF). Ransomware attacks are becoming more targeted, sophisticated, and costly, even as the frequency of attacks remains consistent. Anna holds a PhD in Materials Engineering from the University of Michigan, where she developed computational methods to study solar cells and rechargeable batteries. Attendees may select the Digital Trust World event that most aligns with their learning needs: Digital Trust World Boston, 9-11 May 2023. Unfortunately for the practitioner, there has yet to be a single definition widely accepted by both analysts and vendors perporting to be knowledgeable on the subject. Chris has been credentialed in many of the top IT and information security disciplines and as a CyberSecurity advocate and passionate industry voice, he is regularly featured in national newspapers, television news, industry publications and several documentaries. Our security ratings engine monitors millions of companies and billions of data points every day. Local ISACA chapter events are not subject to this procedure. With Mend, organizations can resolve the application security challenges that pain developers and security teams alike, so they can deliver secure software, faster. Macintosh HD:Users:Sidragon1:Pictures:y3t1-CR.jpegChris is the CISO for Boom Supersonic and works as an advisor for several entities and organizations around the globe. Before joining Steward, he served as Deputy CISO at Partners Healthcare/MassGeneralBrigham and in various roles in Harvard University. Led by a team of information security and high-growth company veterans, ZeroFox has raised funding from NEA, Highland Capital, Intel Capital, Hercules Capital and others, and has collected top industry awards such as Red Herring Top 100 North America, the SINET16 Champion, Dark Readings Top Security Startups to Watch, Tech Council of Marylands Technology Company of the Year and the Security Tech Trailblazer of the Year. From design and implementation to cybersecurity compliance and training, we provide a single point of contact for all your security needs. Cybersecurity expert and good Samaritan Andrew Smeaton shares his personal and professional story that started from sitting on a beach in Cancun with a cocktail drink in hand to driving into Ukraine to save a colleague and his family from an active war zone. ISACA membership offers you FREE or discounted access to new knowledge, tools and training. Attendees will leave with a deeper understanding of the tools and techniques available for managing and securing their cloud environments, as well as practical tips for implementing a successful cloud security posture management program. Bill Bowman has been the first CISO at five different organizations over the last 20 years. Gurinder Bhatti is a Principal Global Security Strategist for Okta's pre-sales field teams. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. BlackBerrys vision is clearto secure a connected future you can trust. The learning objectives must be clear and measurable. With 100 million mobile sensors fueling a dataset of virtually all the mobile code in the world, the Lookout Security Cloud can identify connections that would otherwise go unseenpredicting and stopping mobile attacks before they do harm. Recognized as a Super Lawyers Rising Star Technology Law, Jordan practices in many jurisdictions throughout the United States in both state and federal courts, as well as internationally in both Europe and Asia. ISACA is not looking for lectures, but rather innovative and exciting sessions. Proposals are reviewed by ISACAs subject matter experts. Youll never look at your lights the same way again. From the modest beginnings of its first meetingwhich was held at Valle's Steak House on Route 9 in Newton, Massachusettsthe chapter has grown to over 2000 members across four states (MA, NH, ME, VT). At OpenText Security Solutions, he and his team are focused on quality and efficacy to continuously evolve our Advanced Email Threat Protection and Email Continuity Service solutions, equipping customers and partners with security solutions that are needed in today's continuously evolving threat landscape. The award recognizes most substantial overall, contributions to the board, and to the Chapter. What are organizations doing today and how they can leverage automation to improve their program? Monitor room environment and ambience (i.e. Please see our projected* timeline below: Call for speakers deadline: 24 March 2023 Choose from over 70 sessions on #digitaltrust, audit, privacy, cybersecurity, and more. For more information, visit BlackBerry.com and follow @BlackBerry. Varonis is a pioneer in data security and analytics, specializing in software for data security, governance, compliance, classification and analytics. Perform light room maintenance if necessary. Each Call for Speakers clearly identifies: ISACAs subject matter experts identify elements within the Call for Speakers (listed above), then review the proposals, vet the speakers, and make final topic and speaker selections. Part 1: Ransomware Overview The Current Threat Landscape, Part 2: Ransomware Attacks and the MITRE ATT&CK Framework, Part 3: Ransomware Controls Frameworks, Guides, and Best Practices, Part 4: Building a Ransomware Program Based on the NIST Risk Management. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Write and deploy code that runs on the network edge. Brian established himself as a leader in cybersecurity, privacy, and compliance program development. Based on the worlds most advanced malware and phishing analysis platform, we enable enterprises, government organizations, and MSSPs to automate security operations, accelerate analysis and response, and build reliable threat intelligence. Working with a range of organizations to improve their security programs, Sanara has experience in endpoint as well as the exposure management space. Mend secures all aspects of software, providing automated remediation from problem to solution versus only detection and suggested fixes. Enterprises must ensure that sensitive data is protected, and threats are mitigated accordingly. Roger is a 22-year veteran product manager who specializes in capturing customer and partner concerns, staying abreast of industry trends including regulatory changes, and translating that information into cross-functional development teams to solve the cybersecurity business problems of today and tomorrow. Choose from over 70 sessions on #digitaltrust, audit, privacy, cybersecurity, and more. As the leading independent Identity partner, we free everyone to safely use any technologyanywhere, on any device or app. In his current capacity, he manages Netwrixs portfolio of data security and data privacy technologies depended on by enterprises around the world to protect their most critical information. Additional CPE for volunteering is not available. Compass IT Compliance was founded in 2010 and provides information security risk mitigation services. IronVest is a 360 employee protection platform that protects companies from any kind of account takeover that leads to systems and data compromise. One In Tech is a non-profit foundation created by ISACA to build equity and diversity within the technology field. To learn more, go tohttps://www.expel.io. She has led large-scale sales and operations and built high-performance teams at Rapid7 and Motion Recruitment prior to founding her own organizations. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk. Copyright 2023 ISACA. After having served in just about every technical capacity from coding to customer service, in both pre- and post-sales, he currently spends the majority of his time working with clients to solve their security challenges. ISACA resources are curated, written and reviewed by expertsmost often, our members and ISACA certification holders. Register today at isaca.org/digital-trust-world 31 views 5 days ago Risky Business - Jon Brandt For the average person, life moves quickly. He has been on the ISSA New England Chapter Board since 1998. Your cybersecurity plans, policies, and procedures are only as good as your ability to utilize them in response to a cyber event. Beyond training and certification, ISACAs CMMI models and platforms offer risk-focused programs for enterprise and product assessment and improvement. Members can also earn up to 72 or more FREE CPE credit hours each year toward advancing your expertise and maintaining your certifications. Held in October 2022 following J.S. Today, AccessIT Group maintains sales and service offices in King of Prussia, PA, Mountain Lakes, NJ, New York, NY, Columbia, MD, and Boston, MA. A graduate of the United States Military Academy at West Point, Colonel Frost holds masters degrees from Central Michigan University and the United States Army School of Advance Military Studies. Proactive leader with intense focus on customers and beneficial outcomes. In appreciation for all the hard work and effort, ISACA offers speakers one (1) complimentary registration for the conference per session. CISA works with partners to defend against todays digital and physical threats to reduce risk and enable secure and resilient infrastructure into the future. Noelle Pickler The Chapter President is Colonel Richard Berthao. Most recently, Ben has been involved in security evolution, as it extends beyond the traditional boundaries, and into the wider world. Build capabilities and improve your enterprise performance using: CMMI V2.0 Model Product Suite, CMMI Cybermaturity Platform, Medical Device Discovery Appraisal Program & Data Management Maturity Program, Submit your abstract for the Digital Trust World Conference 2023, Opens: 13 February 2023 Deidre Diamond is the founder and CEO of CyberSN, the largest cybersecurity talent acquisition technology and services firm in the U.S., transforming job searching and hiring for the cybersecurity industry. He was assigned duties at NATO/SHAPE, U.S. CENTCOM, U.S. INDO-PACOM, and U.S. CYBERCOM. Join us in. Jeanette Sherman has spent her cybersecurity career working to understand and relieve the struggles of security leaders as they work to secure open source. ISACA Conference 2023: Digital Trust World is the place where digital trust practices are shared, careers are accelerated and global thought leaders are forged. Meet some of the members around the world who make ISACA, well, ISACA. For more information, visit www.eSentire.com and follow @eSentire on Twitter. Our speaker will share insights on how Zero Trust can help to mitigate these threats and will: Why strategic leadership and an understanding of roles, personalities, and psychology is important for building and managing effective cybersecurity teams. Since early 2018, the incidence of broad, indiscriminate Ransomware campaigns has declined, but losses from Ransomware attacks have increased significantly, according to complaints received by FBI case information. Brett is a knowledgeable cybersecurity consultant with over twenty years of experience and an extensive background in security consulting, network engineering/administration and cybersecurity best practices. 1 2 Principal, Security Risk Management, Verizon, [Opening Keynote] Lessons Learned from a Day in Ukraine. Colonel Frosts commitment to national security includes three decades of public service. Our mission is simple to take full ownership for all that we do, to protect those who trust in us, and to make lifelong clients from every customer contact. In his role, Greg continues to lead efforts to strengthen the cybersecurity capabilities across the City and further the teams mission through modernizing technology, partnerships, and regular training. The New England Chapter of ISACA was founded in 1976. BlackBerry. InfraGard is a United States government (FBI) and private sector alliance. Envision Technology Advisors is a business and technology consultancy specializing in Digital Transformation, Cybersecurity, Business Continuity, Infrastructure Consulting, Web Design and Development, and much more. Founded by Maor Bin and Jony Shlomoff, Adaptive Shield works with many Fortune 500 enterprises and has been named Gartner Cool Vendor 2022. Brian has a passion for developing teams with a focus on individual team member success and career growth. J.S. In Session 3 and 4, we will focus on operationalizing your Data Privacy and Information Security Program, making it actionable for the teams that will implement the requirements into the organizations day-to-day operations. Michael Woodson is Sonestas Director of Information Security and Privacy and was formally the Chief Information Security Officer (CISO) for the Massachusetts Bay Transit Authority, the public agency responsible for operating most of the transportation services in Greater Boston, Massachusetts. Todays cyber leaders face threats within and without, benign and malignant, and still need to move at the speed of business. GoodLeap marks Davids fourth creation of a Code-to-Cloud Application Security program. DeleteMe reduces business risk from threats such as social engineering, doxxing, and online harassment by continuously removing executive and employee personal data from online sources. ISACA delivers expert-designed in-person training on-site through hands-on, Training Week courses across North America, through workshops and sessions at conferences around the globe, and online. Sign up now to support conference operations at ISACA's inaugural Digital Trust World conference in Boston, 9-11 May 2023. Executive Leadership Professional Coach Program, AIIR Professional Consulting Build on your expertise the way you like with expert interaction on-site or virtually, online through FREE webinars and virtual summits, or on demand at your own pace. Here you can find the upcoming conference date, conference name and venue. CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. Greg McCarthy is the first Chief Information Security Officer for the City of Boston and career public servant. Provide answers to the most common directional questions asked such as registration desk, exhibit hall, general session room, concurrent session rooms, lunch, receptions. Industry-specific sessions are welcome to make guidance more specific. Keysights portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Why to Attend? Halcyon is a cybersecurity company building products that stop ransomware from impacting enterprise customers. He is a frequent speaker at security conferences on the topic of iOS and Android security. ISACA North America Conference: Digital Trust World - Agenda The creation of visual representations for the effective reporting of metrics will also be discussed. IronVest AccessGuard leverages biometric account access protection to ensure only authorized users can access any digital account or enterprise system. From 2016-2017, he was the Panel Lead for the Collegiate Working Group for the U.S. Department of Homeland Security's National Initiative for Cybersecurity Education (NICE). Walter Williams has over 20 years of experience in Information Security. Daniel J. W. King is the Region 1 Chief of Cybersecurity for the Cybersecurity and Infrastructure Security Agency (CISA) within the U.S. Department of Homeland Security. In his spare time, Esmond likes to fret about spare time and annoy people who read bios. Our certifications and certificates affirm enterprise team members expertise and build stakeholder confidence in your organization. He has been a Programmer, Systems Analyst, Operating Systems Programmer, Network Systems Programmer, DR / BCS Specialist, IT Auditor, GRC, Sr. Security Analyst, Contractor/Consultant, Security Conference Panelist- Moderator-Organizer-Speaker. Come together with the world's leading minds in digital trust, audit, governance, privacy, cybersecurity and emerging technologies and become more empowered to advance digital trust and your career. ISACA offers training solutions customizable for every area of information systems and cybersecurity, every experience level and every style of learning. Its staff has decades of experience from different industries, numerous certifications and awards, and will bring their expert knowledge to an engaging training session. Deidres leadership style combines 25 years of experience working in technology and staffing, her love of the cybersecurity community, and a genuine enthusiasm for people. The primary goal of ISSA is to promote management practices that will ensure availability, integrity, and confidentiality of organizational resources. How do cybersecurity professionals keep up and strike the right note in their symphony of defenses? Join ISACA in Boston (USA) at #DigitalTrustWorld where attendees can learn from Theoretical Physicist, Dr. Michio Kaku, and data engineer/"Facebook Whistleblower," Frances Haugen. Be resourceful in answering uncommon attendee questions such as securing a private space for a meeting, finding an outlet adapter, or other non-conference related needs. Topics will include the growing importance of digital trust, how digital trust pertains to IT audit, security management, risk management, enterprise governance, data privacy and cybersecurity. After a youth spent befriending famous hackers, Jeanette has developed a perspective on cybersecurity that takes into account not only today's business needs, but also the thought patterns of real threat actors. Dont forget about the consultants working hard to stay ahead of those wanting to do harm, as well. During the process, we vet the potential speaker, not the speakers company or organization. He has over 15 years of experience in the IT and Information Security fields with a background in Security Operations, Business Continuity and Information Assurance. Courses include Designing and Building a Cybersecurity Program, The NIST Cybersecurity Framework Foundations, The NIST Cybersecurity Framework Practitioners, Engineering, Technology and Business Labs and Workshops based on the NIST Cybersecurity Framework, etc. During her six years in the FBIs Senior Executive Service, Erin improved intelligence sharing, threat preparedness, and operational collaboration with Fortune 500 company C-suite executives, and U.S. and foreign government counterparts. Program finalized: Week of 15 May 2023 Previously, he worked with local government in designing and sourcing emergency apparatus and can still parallel park a Ladder Truck. Working on the ground floor at a manufacturing plant, serving as a systems engineer, and managing large security teams have provided Terry with a unique perspective on fortifying IT/OT security posture. She also plays a lot of ice hockey. He serves as the Practitioner Editor for Bloomberg Laws Texas Privacy & Data Security Law, among many other activities. She also provides counsel on a variety of security and privacy frameworks, including the International Standards Organization (ISO) 27001 and 27701, the National Institute of Standards and Technology (NIST) cyber and privacy frameworks, and the Payment Credit Card Industry Data Security Standard (PCI DSS).