Meetings Stub Page [mx-stub]
Creating a Comprehensive Security Posture
7:30am – 9:00am Registration and Coffee
9:00am – 10:0am Policy & Compliance Tools and Tips
Speakers:
Patty Patria, Chief Information Officer, Becker College
Greg Rodenhiser, Information Security Analyst, College of the Holy Cross
This session will review the various security policies you are required to have, along with the all of the other important policies you should think about implementing at your institution.
10:00am - 10:15am Break
10:15am – 11:15am Security Awareness and Training
Speaker: Greg Rodenhiser, Information Security Analyst, College of the Holy Cross
While there are differing viewpoints on the value of security awareness and training, it will never go away. This module will cover strategies and tips for awareness and training methods for ends users and technical staff, along with tested and proven techniques for increasing the security mindset of those we serve.
11:15am -12:15pm Defending the Network: Technology Needed for Monitoring, Detection and Prevention
Speaker: Tim LaGrant, Technical Director, Becker College
Security threats come in many forms. Do you have all of the tools you need to properly defend your institution from modern day threats? This session will provide an overview of the various network based technologies that are needed in today’s world to monitor, manage and defend against attacks. We will cover the different types of attacks that can affect your network, and explain which tools can help you keep problems at bay.
12:15pm – 1:15pm Lunch
1:15pm – 2:15pm What do you do, Once you have Experienced a Breach?
Speaker: Sherry Horeanopoulos, Information Security Officer, Fitchburg State University
This session is all about that breach, ‘bout that breach. When you discover a data loss situation, what do you do and in what order? In this session we will discuss the process of forensics (without the fancy tools) and how to gather the right information, and report it the correct way to the proper authorities. In this session, we will review a real breach and how it panned out for Fitchburg State University and the affected parties, as well as some suggestions for making notification a less painful process for the people who have to field the calls once the letters have gone out.
What does a real-world breach cost and can you keep that expense to a reasonable amount? Quite frankly, having a small data breach is excellent practice for one that could be devastating to both the budget and the reputation of the institution.
2:15pm – 3:15pm Round Table Q&A with all Speakers
3:15pm End