As more and more people move to the cloud, how are we adjusting some of our most fundamental security controls? Access controls are foundational to securing data and IT systems. As we move to the cloud, how are we supposed to effectively manage access with the infrastructure under the control of an external party? Even more troubling is how we can be held accountable for how our data is protected within that remote infrastructure:
- How are people managing access in the cloud?
- What effect does moving to the cloud have on classic access controls?
- How can using a security cloud broker provide value to your cloud strategy?
When: January 26
Event: 3:00 pm – 6:00 pm
Networking Hour: 6:00 pm – 7:00 pm
Where: Federal Reserve Bank of Boston (600 Atlantic Ave. Boston, MA 02210) Room AV1
Event Sponsored by CyberSN: We would like to thank CyberSN for their generous sponsorship of this event. CyberSN will provide event refreshments and networking hour refreshments. We appreciate your support!
CyberSN was created to decrease the time and frustration associated with staffing and understands the unique needs of staffing in the cyber security arena. We offer contingency and engaged search services from our Boston headquarters, Pittsburgh office and have staffing experts around the US.
Jim Ducharme, Vice President of IAM Products, RSA
Jim is responsible for product strategy for RSA’s IAM business, and leads the associated product management and engineering teams at RSA. He has over 15 years of experience in the Identity market space, including his previous leadership roles at Netegrity, CA, and Aveksa.
Mark Ostrowski – Regional Director Security Engineering – East Coast
Mark has over 20 years’ experience in IT security and has helped design and support some of the largest security environments in the country. As regional director of engineering for the east coast at Check Point Software, Mark provides thought leadership for the IT security industry outlining the current threat landscape and helping organizations understand how they can pro-actively mitigate and manage risk.
James Baker CISSP – ISSAP CISM, Director, Senior Security Architect at AMAG Pharmaceuticals
James is Director, Senior Security Architect at AMAG Pharmaceuticals where he advocates for the company’s total information security needs and is responsible for the development and delivery of the company’s comprehensive information security strategy to include their SAAS offerings. Prior to AMAG James was an Information Security and Compliance Senior Manager at Lanyon now CVENT responsible for the security of 5 SAAS and one Mobile Application offering, Lead Security Architect for Sapient and Security Architect on a project for the Commonwealth of Massachusetts to build a Community Cloud for the States Executive Secretariats.
James has presented on several occasions on multiple cloud security topics, is a member of the Cloud Security Alliance and has been a Board member of the Boston Chapter
As we approach the holidays and a new year, I’d like to take the opportunity to welcome both our new slate of Board representatives along with any new members to the Chapter. I’ve watched the Chapter grow into a close community of information security professionals and I am so thankful for how far we’ve come since our early days and the friendships made along the way.
Building upon the positive momentum from our last event, the year ahead provides us the opportunity to bring a renewed sense of purpose and focus to our Chapter activities. Key areas of focus will include establishing a formalize mission and objectives, such as streamlining membership engagement, community outreach with local higher educational institutions along education for school age children and their parents. I look forward to discussions ahead as we strive to build upon our foundation.
With that in mind, our next educational seminar will be Thursday, January 26th from 3pm-6pm with a networking hour to follow. Please save the date and we hope to see you there!
Thank you again for your involvement and membership. This is your Chapter and let’s make it what your need and want for our information security community.