SC Congress New York 2017 Agenda

SC Congress NY sessions are designed to explore - at a micro and macro level - specific cybersecurity issues plaguing the industry today. Our carefully selected speakers are senior professionals on the front line of these threats. Their presentations - filled with information and practical advice - provide the critical skills you need to get past the next threat.  

8:30 AM - 9:00 AM

Registration and breakfast

9:00 AM - 9:30 AM

Keynote

  • Interactive discussion with Donald Freese, Federal Bureau of Investigation

This fireside chat will help you understand nation-state adversaries and the evolution of risk management through strategic application of threat intelligence. You will learn disruption strategies regarding intrusions and attacks before they impact your business, as well as ways to develop action plans that create a stronger connection between your enterprise and the FBI.

Speaker(s)

9:30 AM - 10:00 AM

Editorial Spotlight 1

  • The How-Tos of Information Sharing

In this session, you will hear specific recommendations on how to successfully share threat intelligence, ways to forge beneficial relationships with participating industry bodies, and key partnerships you should have in place that can be helpful to you and your organization.

10:00 AM - 10:30 AM

Editorial Spotlight 2

  • Calling All Guards

Organizations face real challenges regarding talent recruitment for their cybersecurity programs. Savvy pros are needed not only to implement the latest tools, but to make sense of the myriad streams of data being gathered and correlated to help thwart and address immediate attacks. Hear how successful organizations are addressing this issue and what you can do to find the talent you need.

10:30 AM - 11:00 AM

Expo Floor Opens - Networking and Beverage Break

11:00 AM - 11:30 AM

4 track Sponsor sessions

11:35 AM - 12:35 PM

Cyber 360 Clinics

  • Cyber 360 Clinic 1 – Automating Threat Intelligence

Hear practical areas to consider when building and managing your threat intel strategy. Gain an understanding on how to ensure you have the right technologies and processes in place, what you should buy and the best options for your budget.

  • Cyber 360 Clinic 2 – RansomEVERYware

Learn key methods for detection and remediation for ransomware through this hands-on workshop.

Speaker(s)

  • Henry Jiang is the chief information security officer (CISO) at Oppenheimer & Co., Inc., responsible for all aspects of firm’s cybersecurity program including governance, risk-management and security operations. Previously, he was the Executive Director of Global Network Infrastructure at Oppenheimer & Co., Inc. In that role, Mr. Jiang was responsible for the design and operation of firm’s data networks and provides integrated cybersecurity controls.
  • Mary N. Chaney, Esq., CISSP, has over 20 years of progressive experience within the fields of Information Security, Privacy and Risk Management and is currently a Senior Director of Corporate Information Security for Comcast Corporation After practicing law for several years in Washington, DC Ms. Chaney served her country as a Special Agent for the FBI in the Los Angeles Field Division. Ms. Chaney investigated cyber-crime and also served as the Information Systems Security Officer. Ms. Chaney obtained her Certified Information Systems Security Professional (CISSP) certification in 2008 and is currently a Senior Director of Corporate Information Security for Comcast Corporation. Prior to Comcast, she taught various security courses at the University of Cincinnati and has led information security teams for both Johnson & Johnson and GE Capital. She graduated from Xavier University in Cincinnati, Ohio with her B.S.B.A in Information Systems. She received her J.D. degree from Thurgood Marshall School of Law and is a licensed attorney in the State of Texas.
  • Cyber 360 Clinic 3 – Managing the Mobile Threat

Gain a clearer perspective on ways to manage mobile threats and where technology and policy must intersect.

  • Cyber 360 Clinic 4 – Indicators of Compromise

Learn how organizations can leverage data from within their organization’s infrastructure to build a stronger kill-chain model and to increase shared information through wider peer relationships while increasing threat indicator performance.

12:35 PM - 1:45 PM

Networking Lunch and Expo Floor

1:45 PM - 2:30 PM

Intelligent Connection Discussion Roundtables

2:30 PM - 3:00 PM

Expo & Afternoon Break

3:00 PM - 3:20 PM

Intelligent Connection wrap up on mainstage

3:20 PM - 4:00 PM

Keynote Panel

  • The Trump Effect on Information Security: Is Less Regulation What We Need?

The new administration is promising an environment of reduced regulation and oversight. That environment, while welcome by some, will increase the need for effective and clear communication between your partners and regulators. Learn ways to make this new paradigm work so that it doesn’t cause additional turmoil for your business.

Speaker(s)

4:00 PM - 6:00 PM

Reboot Northeastern Awards