Product security programs are intense;running a successful program at a large-scale organization like Comcast is complexity at the next level. Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Attendees will learn how to properly seize and analyze electronic evidence. At Qualys, Carlton serves to support Enterprise customers on the expanding attack surface journey. King of Prussia, PA, USA. Omni Nashville Hotel. The course will cover protecting the integrity of digital evidence, maintaining the chain of custody, creating forensic images, analyzing evidence, and reporting relevant findings. She leverages her experience, communications skills and interpersonal savvy across all levels to facilitate multiple security control systems, encryption and authentication protocols. Concurrently, he served 23 years as a commissioned Army officer in austere and hostile environments around the globe. Specialties: Presales demonstrations, evaluation, installations, training and support of IT security technology. As clients look for ways to optimize data for better business, empower speed and scale of service, and drive next-gen security, Insight delivers expertise that is grounded, unbiased, and refreshingly straightforward. This event has already passed. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. As the leading independent Identity partner, we free everyone to safely use any technologyanywhere, on any device or app. The ability to control the narrative during a cyber event will shape public perception of the companys preparedness for a cyber event. Prior to CCHS, she spent over 10 years as the Information Security and Privacy Officer at Einstein Healthcare Network. Join us for SecureWorld Philadelphia, one of the top cybersecurity events in the country (April 19th and 20th). The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. We provide invaluable context thats delivered in real time and packaged for human analysis or instant integration with your existing security technology. Ms. Carmel is a member of (ISC)2 where she holds her CISSP, and IAPP where she holds her CIPT. Rebecca skillfully manages the intersection of state, federal, and international regulations that affect the transfer, storage, and collection of data to minimize her client's litigation risks. How do you assess an organizations cyber resilience? Rebecca counsels and aggressively defends public and private corporations, and their boards, during data breaches and responds to state/federal regulatory compliance and enforcement actions. She is a member of InfraGard and has been on the Advisory Council for SecureWorld for many years. When we examine the strategic goals and objectives that organizations undertake to promote their growth and success, we can often identify the interlinkage between business objectives and the services cybersecurity provides. Fri | Apr 28, 2023 | 11:23 AM PDT One of the notable sessions at the SecureWorld Philadelphia conference, April 19-20, was a podcast recording featuring three prominent Philadelphia area cybersecurity experts, in a session titled, "CISOs Riff on the Latest in Cybersecurity. Join our experts as they tackle how to prioritize the threats. Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Only Contrast has sensors that work actively inside applications to uncover vulnerabilities, prevent data breaches, and secure the entire enterprise from development, to operations, to production. Currently, he is the Director of Information Security at Christiana Care Health System (CCHS), one of the largest healthcare providers in the mid-Atlantic region, serving all of Delaware and parts of PA, MD, and NJ. In his current role, Mike continues to help our clients manage and secure their organizations by designing SASE and MDR systems that meet the complex challenges of today's enterprise organizations. Scott Laliberte, President of ISSA Delaware Valley Chapter for over 10 years, has grown the chapter significantly by creating a collaborative community for Cyber Security professionals to share their knowledge and experience and satisfy their CPE needs. Director, Audit and Compliance, CipherTechs, Inc. [Lunch Fireside Chat] BEC Attacks, Crypto, and the Investigative Powers of the Secret Service, Assistant to the Special Agent in Charge, United States Secret Service, Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service, Assistant to the Special Agent in Charge, New York Field Office, U.S. Secret Service, Advisory Council Lunch Roundtable (VIP / Invite Only), Topic: Evaluating Today's Threats and Security Controls, Global Director, Channel Solutions Engineering, CyberArk, Security Engineering Manager, Check Point, Area Vice President, Security Strategy, Deepwatch, Principal Security Engineer, Salt Security, Head of Security Operations, Abnormal Security, Topic: Cloud Security Certification | Open to all attendees, Sr. Later, Mr. Eggleston helped develop an internal compliance approachcomplete with policies and toolsensuring a geographically dispersed health care provider organization (across 19 states) complied with the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Dell Secureworks is a global provider of intelligence-driven information security solutions exclusively focused on protecting its clients from cyberattacks. Michael Meyer, MPSTM, CISSP, CIPP/US, CIPM, FIP, CISM, CRVPM II, CRISC, CISA, is the Chief Risk and Innovation Officer of MRS BPO. Additionally, Krista provides oversight of the security program's day to day operational effectiveness. For more information, contact [email protected]. If you have not already been involved in the membership meetings, we encourage you to do so. Some are new but the old ones work just as well. March 23-24, 2022 | Valley Forge Casino Resort Event Center, Click here to view registration types and pricing (PDF), VP & CISO, Global Infrastructure and Security Solutions, VP, IT Operational Excellence and Governance, Associate Director, Security Operations & Engineering, Sr. Director, IT, Architecture & Product Manager, Director, Information Security & Risk Officer, Manager, Information Security Incident Response, Chief Information Security & Privacy Officer, VP, Global IT Audit, Cybersecurity & Data Management, Global Director, Technology Risk Management & Information Security, Director, Information Security & Compliance, VP, CISO, Global Infrastructure and Security Solutions, Find Out What Other Security Professionals are Saying About SecureWorld, Offering Two Days of Cybersecurity Education. For businesses that cross borders, both national and domestic, this creates distinct challenges to building effective solutions. This powerful tool provides a language to define, track, and categorize attacker tactics, techniques, and procedures (TTPs). In her role as CISO, Anahi has overall responsibility for the organization's cybersecurity and assurance program. She also founded the last mile Technology enabled platform called DeliveryCircle, raised multiple rounds of funding and currently serves as the Chairman of the board. Our panel will share what weve learned in this journey to the cloudfrom doing more with less, to the ever-present insider threat risk, to supporting our DevOps teams like never before. " He is experienced in all facets of IT/IS Security & Risk Management including acquisitions and disaffiliations, and has a track record of developing and implementing security strategies from inception through execution. Philadelphia Alliance for Capital and Technologies (PACT)s vision is to be the go-to resource for fast growing companies, and a driver of entrepreneurship and innovation in the Philadelphia region. With close to a thousand endpoints (in the majority of those surveyed) that included: servers, office PCs, printers, employee-owned devices, smart watches, IoTthe list goes on and on. The company is also a founding member of the Cloud Security Alliance. Todd Bearman is the Chief Information Security Officer for TE Connectivity with responsibility for Information Security globally across nearly 150 countries with 75,000 employees. Roll will discuss how the intelligence community supports national security, the protection of U.S. critical infrastructure, and how partnerships are invaluable to the mission of the intelligence community. Dell SecureWorks solutions enable organizations to fortify their cyber defenses to prevent security breaches, detect malicious activity in real time, prioritize and respond rapidly to security breaches and predict emerging threats. Jordan has represented clients in a variety of sectors, including emerging technologies (blockchain, Internet of Things/IoT, and Artificial Intelligence/AI), pharmaceutical, healthcare, agriculture, adtech, and manufacturing. Our granular visibility across IaaS, SaaS, and various data services enables organizations to ensure effective control over their access privileges and the security of their assets. A lawsuit arguably had been brewing for years in the industry, waiting for the right circumstances, and was finally filed against the C-Suite of SolarWinds, notably the Chief Information Security Officer (CISO). Mike Meltz has worked in the IT Security and infrastructure space for over 25 years and he specializes in the design and implementation of enterprise-level Cybersecurity technologies and business process improvements. The audience will learn how to measure the benefits and costs of its cybersecurity program. Only Netskope understands the cloud and takes a data-centric approach that empowers security teams with the right balance of protection and speed they need to secure their digital transformation journey. This deep dive into the nuances of the program at Comcast will describe how tools, experts and gamification enable secure development at the scale of a Fortune 50 organization. We are making history as we continue to grow the chapter with your membership, and bring exciting programs to you. Overland Park, KS. Vijayas core belief is that innovative technology-based solutions should be at the core of every business model. Differences in digital forensics involving criminal cases, civil cases, and administrative issues, Techniques for properly seizing electronic evidence, Maintaining the integrity of evidence and preventing evidence destruction, Why SOC and security teams are way too limited by legacy SIEM, How Exabeam machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage, What to do to make security operations more successful using a simple maturity model based on outcomes and use cases. Co-Founder & Managing Partner, XPAN Law Partners, Chief Security Officer & Technology Lead, Trexin Group, Advisory Council Lunch Roundtable (VIP / Invite Only), [Panel] The Battle to Control the Endpoints, Platform Marketing & Strategy Director, Recorded Future, Principal Architect, Sales Engineering, Imperva, The Intersection of Cyber Crime + Cyber Defense and What IT Practitioners Can Do, Managing Director, Saperde; Chief of Staff, Philadelphia InfraGard, [Panel] Cyber Resiliency in Today's Ever-Changing Threat Landscape, Board President, WiCyS Delaware Valley Affiliate, National Sales Executive, BTB Security, LLC, Enterprise Cloud Security Product Lead, UnitedHealth Group, Understanding and Managing the Risk of Emerging Technology, Cloud Security Alliance Delaware Valley Chapter (CSA-DV), Cyber Fraud Task Force U.S. Secret Service, DeSales University Cyber Security Program. An understanding of what it takes to create an excellent information security team. Before joining Open Systems as a Senior Sales Engineer, Mike held various technology and strategy leadership roles at companies throughout the United States managing enterprise Infrastructure and Security teams as well as multiple roles as the designated CISO. Going to SecureWorld Philadelphia? Bryan is a 20+ year InfoSec career professional currently serving as CISO for an auto finance company and teaching the next generation of InfoSec pros. He is a transformational change agent, leading teams of top tier consultants, building world-class cybersecurity programs for high-profile global companies throughout a wide range of industries. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. We aggregate, transform and analyze network traffic to solve for critical performance and security needs, including rapid threat detection and response, freeing your organization to drive digital innovation. Rebecca is Vice-Chair Elect for the New Jersey State Bar Association's Bankruptcy Law Section. March 23, 2022 SecureWorld Northeast, 2022 United States | New York, New York March 30, 2022 SecureWorld Kansas City, Kansas, 2022 United States | Kansas, Kansas City April 6, 2022 SecureWorld Charlotte, North Carolina, 2022 United States | North Carolina, Charlotte April 20, 2022 SecureWorld Atlanta, Georgia, 2022 United States | Georgia, Atlanta His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Houston, TX May 18, 2023 Atlanta, GA May 24, 2023 Chicago, IL Jun 8, 2023 Eastern Jun 14, 2023 Manufacturing Aug 23, 2023 Denver, CO Sep 19, 2023 Artificial Intelligence Sep 27, 2023 Detroit, MI Sep 28, 2023 St. Louis, MO Oct 19, 2023 Government Oct 25, 2023 Prior to working at TE Connectivity, Todd was CISO at Towers Watson, as well as Director of Information Security at Commerce Bank (now TD Bank). To book via phone, please call (610) 354-8118 with this exact code, A423SEC, or mention group name SecureWorld. SecureWorld Philadelphia April 10-11, 2019 | Radisson Hotel Valley Forge Register Now EVENT DETAILS Title Sponsor Click here to view registration types and pricing (PDF) Download Now Conference Agenda Day 1 Day 2 Filter by registration level: Open Sessions Conference Pass SecureWorld Plus VIP / Exclusive Wednesday, April 10, 2019 7:00 am Its been almost two years now. In her teenage years, she was a professional hacker, always on the hunt to crack open what seemed impossible, always on the lookout for IT challenges. He focuses on applying these core economic and risk management principles to new cybersecurity architectures and platforms. She has worked for different fortune 100 companies such as CenturyLink, AOL, JP Morgan Chase, and Google. The Chapter conducts events on a monthly basis led by an active, vibrant and dedicated group of volunteers and is actively seeking business partners to help provide value and knowledge to its members. They are after data. Over 20 years of Security leadership experience, in Fusion Centers, Incident Response, Insider Threat, and Attack Surface Management. Philadelphia IMA supports eastern Pennsylvania and southern New Jersey. Lastly, ATSAIC Cerra volunteers her time coaching a CyberPatriot team in the Civil Air Patrol, where she is also the Aerospace Education Officer. Presentation Level: There will be a demo and link to integrations with common security tools so that you can start automating your compliance tasks today. The Philadelphia Chapter of ISACA has a membership base of more than 1,600 individuals primarily located in the Philadelphia and the surrounding suburbs, extending into Delaware and Southern New Jersey. Hopefully, you will walk away with more ideas to take back to your organizations, or you may come away with a sense of Hey, we had that same problem, or Our company is not alone in dealing with these issues.. Cymulate enables you to take data-driven decisions and manage your security resources efficiently. We seek to improve the understanding of cloud security and to promote the interaction of both professionals and students in order to discuss current trends and topics within the industry. They make their money through extortion, via DDoS and ransomware, and through theft via data breaches. Fortune Global Business Technology and Security Leader - I. Starting at the end of 2020, the information security sector saw what could fairly be characterized as a seismic shift in the world of data privacy and cybersecurity as a result of the SolarWinds hacking incident. Imperva is a leading provider of data and application security solutions that protect business-critical information in the cloud and on-premises. DeSales University offers an exciting digital forensics certificate program, composed of four courses, that teaches students how to recover evidence from various types of electronic devices. SecureWorld Events Conferences For more than 22 years, SecureWorld conferences have been connecting, informing, and developing leaders in cybersecurity through in-person regional events and interactive online platforms. Radisson Hotel Valley Forge. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. From major events to those that are more narrowly focused, this list from the editors of CSO, will help you find the security conferences that matter the most to you.We'll keep it updated with. He explains how organizations can begin to build a measurable, monitorable, repeatable approach to a preventive security posture with respect to both framework and architecture. Abel Morales is a Senior Security Engineer based in Atlanta, GA. Mr. Sanders government experience includes over 15 years providing Senior Operations and Program Management consultant services to the US Government across numerous national and international programs. FBI Special Agent Cerena Coughlin is the Employment Recruiter and Applicant Coordinator for the Philadelphia Field Office and local Private Sector Coordinator overseeing InfraGard, a public/private partnership between the FBI and representatives of critical infrastructure. To promote cloud security best practices within the Greater Philadelphia region, to educate about cloud computing, identify its risks, methods to secure it, and to continually provide opportunities for the development of cloud security professionals. Ransomware, Business emails compromise, Cloud mis-configurations, Social Engineering, Insider Threats the list goes on and on. Andrew holds over 22 years of experience in the banking, financial services, and healthcare industries. By shifting the focus on how cybersecurity could enable an organization to bring products to market faster, make it easier for customers to conduct business with the company, create an environment to attract and retain employees and become the vendor of choice to our customers, we can strengthen our relationship with executive leadership and board of directors, become a trusted partner to the business, serve as a trusted advisor to line of business owners and shift the paradigm of cybersecurity from risk reduction cost center to a business enablement service line. Breaches happen and 2021 was a record-breaking year for them. Participating sponsors will announce their Dash for Prizes winners. The CSO guide to top security conferences | CSO Online He has served as a senior project manager and engineer for several federal and municipal governments IT projects, as a network and systems engineer for IBM's Education and Training Division, and as an adjunct faculty member at the Pennsylvania Institute of Technology. Later, Mark received both his Master of social work and his post-baccalaureate certificate in management information systems from Virginia Commonwealth University. Vijaya Rao is a Senior executive with over 25 plus years of experience in the Engineering and Cybersecurity space.
Should You Rinse Canned Beans For Chili,
City Church Alpharetta,
Breaking News Great Falls, Mt,
Articles S