We are hearing more and more about breaches across all industries. If you are not prepared, the impact can be staggering! Join us on October 20th to answer some of the most pressing questions about how to respond to today’s information security incidents; how to protect yourself; and, how to be prepared for the aftermath.
- Review of Recent Events at Harvard University
- Current Threat Landscape and Response Trends with Mandiant
- What to expect from the regulators?
- What resources are out there that can help?
- How does intrusion tolerance change our landscape?
- Are there automated processes that can help?
- How does this relate to business continuity?
- 2:30 Registration Open
- 3:05 Welcome Commence Event, general announcements and agenda overview
- 3:15 Harvard Presentation
- 4:00 Break
- 4:20 Mandiant Presentation
- 5:00 Break
- 5:15 Panel welcome and introduction
- 5:20 Panel Discussion
- 5:50 Wrap Up Thank you
- 6:00 Networking Hour
When: October 20, 2016 from 3pm – 6pm, followed by a networking hour from 6pm – 7pm
Where: Federal Reserve Bank, 600 Atlantic Avenue, Boston, MA
If you are interest in becoming an event sponsor, please contact us.
SecureWorld 2016 was another great event for our local chapter. The SecureWorld coordinators are always supportive and accommodating!
For many of us, this event is one of the best networking opportunities we get and at a great price. This year was our 4th year having a booth and it may have been our most successful one as far as getting new people to sign up for our chapter communications. Please congratulate the team!
(ISC)2 Eastern MA Chapter Booth: (pictured in this photo, from left to right) Emily Hronik (Cyber 360, Inc), Mark Aiello (Cyber 360, Inc) and Christina Mazzone (Partners Healthcare and our Chapter Vice President)
During our Chapter meeting on the first day of the event, Mark Aiello, President of Cyber 360 Inc, presented “Show Me the Money”, in which he discussed the findings of the (ISC)2 Global Information Security Workforce Study (GISWS) and his professional experience in finding qualified candidates for Information Security in various business sectors. He had expressed that having certifications is beneficial, but one that stands out is the Certified Information Systems Security Professional (CISSP) which is managed by (ISC)2.
Mark also spoke about the conundrum of finding qualified candidates to backfill the workforce. More often than not, the company sets high requirements for the candidate that often mimic the resume of the employee that just left. Some companies need to remind themselves that they shouldn’t replace their responsibilities of management, training and employee mentoring for finding a candidate that does not really need any of that to get started. If you have strong training and mentorship programs, you can mold a less senior employee that has a strong ambition into a highly technical one that will meet and exceed your requirements over time. The employee may even become more loyal and will payback what is invested into them several times over!
Topic: Show Me the Money!
Speaker: Mark Aiello, President, Cyber 360 Inc.
An overview of the ISC2 Global Information Security Workforce Study (GISWS) and how to apply its findings for personal gain.
When: Tuesday, March 29th at 2:15pm-3:00pm
Where: Hynes Convention Center, Room 200
Open to All Attendees – Join us for a refreshment break, industry discussion and networking!
We hope to see you there!