1 Message
Digest #3440
Message
Sat Nov 7, 2015 8:40 am (PST) . Posted by:
"Peter Lutz" peter_f_lutz
Register
<https://connecticuttechcouncil.wliinc34.com/events/IT-Summit-160/register>
*2015 Event Program*
*9:00 AM: Keynote Speaker,* *Dr. Gary McGraw*, CTO, Cigital, Inc.
[image: Dr. Gary McGraw, Keynoter]
<http://www.ct.org/wp-content/uploads/2015/09/gem2014-forweb-e1441154040910.jpg>*Keynote
Presentation*:
*Cyber War, Cyber Peace, Stones, and Glass Houses *Washington has become
transfixed by cyber security and with good reason. Cyber threats cost
Americans billions of dollars each year and put U.S. troops at risk. Yet,
too much of the discussion about cyber security is ill informed, and even
sophisticated policymakers struggle to sort hype from reality. According to
Dr. McGraw, Washington focuses on many of the wrong things. Offense
overshadows defense. National security concerns dominate the discussion
even though most costs of insecurity are borne by civilians. Meanwhile,
effective but technical measures like security engineering and building
secure software are overlooked. Dr. McGraw believes that cyber security
policy must focus on solving the software security problem – fixing the
broken stuff.
*10:00 AM to 11:00 AM:*
-
*Cybersecurity-Employee Training: The Critical Element in Cybersecurity *This
presenter will provide specifics on effective training programs to help
employees understand today's vulnerabilities and threats to business
operations. Elements of a well-defined cybersecurity policy will be
covered. Attendees will return to their workplace with the key elements of
a security-training program. Typically, training deals with the basics such
as password usage and management, e-mail management, and browser
management. Today's IT security professionals strongly recommend that
training cover topics such as recognizing and dealing with social
engineering, use of personal devices, recognition and response to phishing
attempts, data confidentiality issues, outsourcing, and use of the
Cloud. Employee awareness and training can help greatly reduce the risks of
a cyber threat.
*Presenter*: *Ben Smith*, Field Chief Technology Officer (CTO), East
Coast, RSA, a division of EMC
*10:00 AM to 11:00 AM:*
-
*Cloud: Virtualization & Hybrid Cloud Implementations *This panel will host
a discussion a discussion of server virtualization and hybrid cloud
implementation, touching on security & privacy concerns, performance
expectations, ROI metrics, and support requirements. At some point all
businesses find themselves running out of computing resources. Often this
is a storage issue but in other situations, additional hardware might be
required. Demanding time-to-market requirements might not allow time
for procurement and implementation of new hardware. Constricting budgets
may eliminate opportunities to maintain infrastructure. Businesses of all
sizes are isolating information processing with an expectation that they
can leverage outsourced data-center business models. *The Cloud is here,
and Server Virtualization will enable companies to be more agile, grow more
rapidly, and dramatically reduce implementation risks.*
*Moderator: Andy Powell*, Regional Sales Manager Dell (Wyse Technology)
*Panelists: Joe Conlin*, Senior Sales Engineer, TierPoint, *Neil Holme,*
Principal, Impact Business Technology, *Dan Salzillo*, Principal, Bruner
Consulting Associates
*10:00 AM to 11:00 AM:*
-
*The Dark Net *It's the underbelly of the web, a home to both scoundrels
and political activists. A place only accessible by using specially
designed anonymizing software. It's a secret place, where terrorists can
hide their digital footprints, whistleblowers can safely reach out to
media contacts, and illicit, underground nastiness occurs. Hear from
someone who drops in occasionally, and who will provide a tantalizing tale
of what goes on there.
*Presenter: Bob Graham*, Chairman & CEO, BlackRidge Technology
*11:15 AM to 12:15 PM:*
- *Can Startups Solve IT's Pressing Problems-An Alternative Model for
New Ideas and Solutions?*
This panel discussion, including a venture capitalist, will present
the case that start-ups can offer the IT department a solution for priority
issues. Discussion will include navigating around the issue of financial
stability and where to find innovative new companies.
*The Hartford Steam Boiler (HSB) Insurance and Inspection Company will
provide a case study presentation of their involvement with Meta. Meta, a
San Francisco CA based startup with a focus on wearable computing – space
glasses and augmented reality to improve remote collaboration and providing
expertise just-in-time across the globe. **Moderator*: *Ronald Vernier*,
CIO, Hartford Steam Boiler
*Panelists: Marija Curkovic*, Head of Hartford Steam Boiler Inspection and
Insurance of Canada IT and *Steve Obsitnik,* Operating Partner,
Saugatuck Advisory
*11:15 AM to 12:15 PM:*
-
*Data Encryption *As data breaches become more common, it is clear that a
robust firewall is not sufficient to protect your enterprise. Many
companies are now exploring the use of new encryption methods to secure the
data. This session will discuss the trade-offs necessary to implement
encryption tools, and provide a practical roadmap to consider these
technologies.
*Moderator:* *John Ayers*, Sr Director Global Managed Security Services,
Level 3 Communications
*Panelists:* *Christopher Bernard, *Managing Director IT Security &
Risk, Cushman & Wakefield, *Francis Cianfrocco, *CEO, Bayshore Networks
*11:15 AM to 12:15 PM:*
-
*Keeping Control: Data Security and Vendor Management *Companies in a
variety of sectors – from education and health care to manufacturing and
professional services – are aggressively collecting, utilizing and
deploying significant amounts of data across their business platforms.
Today, the challenge is not so much the generation or collection of data,
but how to safeguard the data from inappropriate use or disclosure. With
breaches affecting tens of millions of individuals in the news regularly,
all companies should be addressing how to protect the data they hold. For
this topic, a panel of legal and data security experts will address the
risks posed by providing vendors access to your data, and best practices to
protect your data and your business.
*Moderator: Daniel Schwartz*, Esq., Shipman & Goodwin LLP
*Panelists: Steve Bartolotta*, Vice President and Chief Information
Security Officer, Community Health Services of Connecticut, Inc., *Douglas
Casey*, Director of Technology, Capitol Region Educational Council
(CREC) and
* William Roberts, Esq.*, Shipman & Goodwin LLP
*12:30 PM – 1:30 PM* – *Lunch*
*Lunch Keynoter: Carl Herberger*, Vice President, Security Solutions,
Radware
*[image: Radware_CarlHerberger-hi-res3]*
<http://www.ct.org/wp-content/uploads/2015/09/Radware_CarlHerberger-hi-res3-e1443074734110.jpg>*Safety,
Sanctuary and Security: The Societal Impact of Ever-Permeating Connectivity*
Every day, we network-enable more aspects of our professional and personal
lives. We make conscious decisions to adopt technologies in the pursuit of
convenience or an apparent need to feel connected. Often the decisions are
thrust upon us by employers, service providers or even those we've come to
rely on in the physical world. Each step towards deeper and total
connectivity comes with consequences; risks associated with our personal
privacy, the security of our business and even our safety. This
presentation will explore the changes we've already allowed into our lives,
where things are leading, and portents for personal, business and public
security.
*1:45 PM – 2:45 PM:*
-
*Responding to The Cybersecurity Incident: The Essentials of a Response
Team and Plan *This panel will cover response team elements to send you
home better prepared to develop your own cybersecurity team and implement a
response plan. Is your company or organization prepared to respond to
a cyber attack, particularly a serious one that can shut down your entire
business? Is there a response team ready with the right legal, technical,
and communications skills to take necessary, immediate and ongoing action?
Does the team have the knowledge to identify the size and scope of the data
breach, recover critical systems, data, and restore connectivity to assume
normal business activities? Do your software and security tools provide you
with adequate information to tell you about the nature and extent of the
breach? What does Connecticut law require you to report under its new
regulations? Hear the answers to these questions.
*Moderator: Andrea Obston*, President, Andrea Obston Marketing
Communications, LLC
*Panelists: Barry Abramowitz, *Executive Vice President & CIO Liberty
Bank, * Brian Vecci*, Technical Evangelist*, *Varonis Systems, Inc.,* Linn
Freedman*, Chair Data Privacy & Security Team, Robinson & Cole LLP
*1:45 PM to 2:45 PM:*
-
*A CIO Panel Discussion *This panel of distinguished CIOs will discuss such
topics as their 2016 IT investment priorities, digitalization and the
ongoing issues of the cloud, mobile, social and information.
*Moderator: Shawn Banerji*, member of the Information Officers (IOP) and
FinTech Practice, Russell Reynolds Associates.
*Panelists: Michael Diliberto*, CIO, Priceline.com*, Tom McCurley*, CIO,
Crane Co.,* Joe Tait*, CIO, Lydall, Inc., and *Sigal Zarmi, *Vice
Chairman, Network Chief Information Officer, PricewaterhouseCoopers
*3:00 PM to 4:30 PM:*
*Networking for attendees, sponsors and panelists* – Cocktails and Hors
d'oeuvres
<https://connecticuttechcouncil.wliinc34.com/events/IT-Summit-160/register>
*2015 Event Program*
*9:00 AM: Keynote Speaker,* *Dr. Gary McGraw*, CTO, Cigital, Inc.
[image: Dr. Gary McGraw, Keynoter]
<http://www.ct.org/wp-content/uploads/2015/09/gem2014-forweb-e1441154040910.jpg>*Keynote
Presentation*:
*Cyber War, Cyber Peace, Stones, and Glass Houses *Washington has become
transfixed by cyber security and with good reason. Cyber threats cost
Americans billions of dollars each year and put U.S. troops at risk. Yet,
too much of the discussion about cyber security is ill informed, and even
sophisticated policymakers struggle to sort hype from reality. According to
Dr. McGraw, Washington focuses on many of the wrong things. Offense
overshadows defense. National security concerns dominate the discussion
even though most costs of insecurity are borne by civilians. Meanwhile,
effective but technical measures like security engineering and building
secure software are overlooked. Dr. McGraw believes that cyber security
policy must focus on solving the software security problem – fixing the
broken stuff.
*10:00 AM to 11:00 AM:*
-
*Cybersecurity-Employee Training: The Critical Element in Cybersecurity *This
presenter will provide specifics on effective training programs to help
employees understand today's vulnerabilities and threats to business
operations. Elements of a well-defined cybersecurity policy will be
covered. Attendees will return to their workplace with the key elements of
a security-training program. Typically, training deals with the basics such
as password usage and management, e-mail management, and browser
management. Today's IT security professionals strongly recommend that
training cover topics such as recognizing and dealing with social
engineering, use of personal devices, recognition and response to phishing
attempts, data confidentiality issues, outsourcing, and use of the
Cloud. Employee awareness and training can help greatly reduce the risks of
a cyber threat.
*Presenter*: *Ben Smith*, Field Chief Technology Officer (CTO), East
Coast, RSA, a division of EMC
*10:00 AM to 11:00 AM:*
-
*Cloud: Virtualization & Hybrid Cloud Implementations *This panel will host
a discussion a discussion of server virtualization and hybrid cloud
implementation, touching on security & privacy concerns, performance
expectations, ROI metrics, and support requirements. At some point all
businesses find themselves running out of computing resources. Often this
is a storage issue but in other situations, additional hardware might be
required. Demanding time-to-market requirements might not allow time
for procurement and implementation of new hardware. Constricting budgets
may eliminate opportunities to maintain infrastructure. Businesses of all
sizes are isolating information processing with an expectation that they
can leverage outsourced data-center business models. *The Cloud is here,
and Server Virtualization will enable companies to be more agile, grow more
rapidly, and dramatically reduce implementation risks.*
*Moderator: Andy Powell*, Regional Sales Manager Dell (Wyse Technology)
*Panelists: Joe Conlin*, Senior Sales Engineer, TierPoint, *Neil Holme,*
Principal, Impact Business Technology, *Dan Salzillo*, Principal, Bruner
Consulting Associates
*10:00 AM to 11:00 AM:*
-
*The Dark Net *It's the underbelly of the web, a home to both scoundrels
and political activists. A place only accessible by using specially
designed anonymizing software. It's a secret place, where terrorists can
hide their digital footprints, whistleblowers can safely reach out to
media contacts, and illicit, underground nastiness occurs. Hear from
someone who drops in occasionally, and who will provide a tantalizing tale
of what goes on there.
*Presenter: Bob Graham*, Chairman & CEO, BlackRidge Technology
*11:15 AM to 12:15 PM:*
- *Can Startups Solve IT's Pressing Problems-An Alternative Model for
New Ideas and Solutions?*
This panel discussion, including a venture capitalist, will present
the case that start-ups can offer the IT department a solution for priority
issues. Discussion will include navigating around the issue of financial
stability and where to find innovative new companies.
*The Hartford Steam Boiler (HSB) Insurance and Inspection Company will
provide a case study presentation of their involvement with Meta. Meta, a
San Francisco CA based startup with a focus on wearable computing – space
glasses and augmented reality to improve remote collaboration and providing
expertise just-in-time across the globe. **Moderator*: *Ronald Vernier*,
CIO, Hartford Steam Boiler
*Panelists: Marija Curkovic*, Head of Hartford Steam Boiler Inspection and
Insurance of Canada IT and *Steve Obsitnik,* Operating Partner,
Saugatuck Advisory
*11:15 AM to 12:15 PM:*
-
*Data Encryption *As data breaches become more common, it is clear that a
robust firewall is not sufficient to protect your enterprise. Many
companies are now exploring the use of new encryption methods to secure the
data. This session will discuss the trade-offs necessary to implement
encryption tools, and provide a practical roadmap to consider these
technologies.
*Moderator:* *John Ayers*, Sr Director Global Managed Security Services,
Level 3 Communications
*Panelists:* *Christopher Bernard, *Managing Director IT Security &
Risk, Cushman & Wakefield, *Francis Cianfrocco, *CEO, Bayshore Networks
*11:15 AM to 12:15 PM:*
-
*Keeping Control: Data Security and Vendor Management *Companies in a
variety of sectors – from education and health care to manufacturing and
professional services – are aggressively collecting, utilizing and
deploying significant amounts of data across their business platforms.
Today, the challenge is not so much the generation or collection of data,
but how to safeguard the data from inappropriate use or disclosure. With
breaches affecting tens of millions of individuals in the news regularly,
all companies should be addressing how to protect the data they hold. For
this topic, a panel of legal and data security experts will address the
risks posed by providing vendors access to your data, and best practices to
protect your data and your business.
*Moderator: Daniel Schwartz*, Esq., Shipman & Goodwin LLP
*Panelists: Steve Bartolotta*, Vice President and Chief Information
Security Officer, Community Health Services of Connecticut, Inc., *Douglas
Casey*, Director of Technology, Capitol Region Educational Council
(CREC) and
* William Roberts, Esq.*, Shipman & Goodwin LLP
*12:30 PM – 1:30 PM* – *Lunch*
*Lunch Keynoter: Carl Herberger*, Vice President, Security Solutions,
Radware
*[image: Radware_CarlHerberger-hi-res3]*
<http://www.ct.org/wp-content/uploads/2015/09/Radware_CarlHerberger-hi-res3-e1443074734110.jpg>*Safety,
Sanctuary and Security: The Societal Impact of Ever-Permeating Connectivity*
Every day, we network-enable more aspects of our professional and personal
lives. We make conscious decisions to adopt technologies in the pursuit of
convenience or an apparent need to feel connected. Often the decisions are
thrust upon us by employers, service providers or even those we've come to
rely on in the physical world. Each step towards deeper and total
connectivity comes with consequences; risks associated with our personal
privacy, the security of our business and even our safety. This
presentation will explore the changes we've already allowed into our lives,
where things are leading, and portents for personal, business and public
security.
*1:45 PM – 2:45 PM:*
-
*Responding to The Cybersecurity Incident: The Essentials of a Response
Team and Plan *This panel will cover response team elements to send you
home better prepared to develop your own cybersecurity team and implement a
response plan. Is your company or organization prepared to respond to
a cyber attack, particularly a serious one that can shut down your entire
business? Is there a response team ready with the right legal, technical,
and communications skills to take necessary, immediate and ongoing action?
Does the team have the knowledge to identify the size and scope of the data
breach, recover critical systems, data, and restore connectivity to assume
normal business activities? Do your software and security tools provide you
with adequate information to tell you about the nature and extent of the
breach? What does Connecticut law require you to report under its new
regulations? Hear the answers to these questions.
*Moderator: Andrea Obston*, President, Andrea Obston Marketing
Communications, LLC
*Panelists: Barry Abramowitz, *Executive Vice President & CIO Liberty
Bank, * Brian Vecci*, Technical Evangelist*, *Varonis Systems, Inc.,* Linn
Freedman*, Chair Data Privacy & Security Team, Robinson & Cole LLP
*1:45 PM to 2:45 PM:*
-
*A CIO Panel Discussion *This panel of distinguished CIOs will discuss such
topics as their 2016 IT investment priorities, digitalization and the
ongoing issues of the cloud, mobile, social and information.
*Moderator: Shawn Banerji*, member of the Information Officers (IOP) and
FinTech Practice, Russell Reynolds Associates.
*Panelists: Michael Diliberto*, CIO, Priceline.com*
Crane Co.,* Joe Tait*, CIO, Lydall, Inc., and *Sigal Zarmi, *Vice
Chairman, Network Chief Information Officer, PricewaterhouseCoop
*3:00 PM to 4:30 PM:*
*Networking for attendees, sponsors and panelists* – Cocktails and Hors
d'oeuvres
No comments:
Post a Comment