Technology ONLY event, must be a Tech Company

  • 19 Feb 2015
  • 5:30 PM - 8:30 PM
  • RGP: Resources Global Professional, 7 Times Square, 26th Floor, 42nd & Broadway, NY, NY

Registration


Registration is closed

This meeting is limited to Technology ONLY Companies. You must preregister, pay and and be on the security list or you will not get in the door. There will be no substitutes with 24 hours of the event and no refunds.

Cyber Security 

Our roundtable discussion will focus on the growing concern of Cyber Security. Technology is the engine that works to support the maintenance of an effective risk management framework. However, it also represents a significant risk when not properly maintained, secured and supported by effective control standards. 

With the growing dependency on modern technology and social and digital media, companies and individuals are becoming more vulnerable to cyber attacks and security breaches.

Our Guest Speaker 

Tom Brennan, Principal Consultant at ProactiveRISK

ProactiveRISK Inc., is a veteran owned business that has contributed to international security standards, and best practices.

For over two decades Tom Brennan has been a trusted advisor and an active contributor to the information assurance communities including: 

• Open Web Application Security Project (OWASP)-Global Vice Chairman / Chapter Leader
• Council of Cyber Security - Roles & Control Committee Member
• (ISC)2 Application Security Advisory Council (ASAC) - Committee Member
• International Legal and Technology Association (ILTA) LegalSEC committee Member
• New Jersey Science and Technology Institute (NJIT) Capstone - Senior Advisor

Prior to ProactiveRISK, Tom Brennan served in roles that included Global Director of Threat Intelligence & Research at Trustwave SpiderLabs, Manager of WhiteHat Security, Datek Online (Ameritrade), Senior Software Developer at ADP and CS1/ICT Committee Member for the US Department of Homeland Security.

Mr. Brennan has broad experience and expertise which includes cyber security, evaluating an organization’s existing Software Development Life Cycle (SDLC), penetration testing, hacking, building and improving software security assurance programs, security standards development, enterprise vulnerability management and security incident response and forensics.


www.join24-7.com


 

copyright 2011 all rights reserved - 24-7 Networking Sales, LLC.


Powered by Wild Apricot Membership Software