Threat Alert Icon

THREAT ALERTS

Reimagining Cybersecurity Banner Image

REIMAGINING CYBERSECURITY

12TH ANNUAL SUMMER CYBERSECURITY CONFERENCE

ABOUT THE CONFERENCE


iSECURE is hosting its in-person 12th Annual Summer Cybersecurity Conference this August in Rochester, New York. This conference is designed to educate and collaborate. We will be featuring speakers from our premier partners, as well as opportunities to network with partners and peers.

Three speakers will be featured at the iSECURE Cybersecurity Conference “Reimagining Cybersecurity”, and the day will conclude with a roundtable discussion.

How has the threat landscape transformed? How has cybersecurity been reimagined?

Light breakfast, lunch and cocktail hour are included.

When: Wednesday, August 3, 2022
Where: The Harro East Ballroom
155 N Chesnut Street
Rochester, New York
Theme: Reimagining Cybersecurity

Register now for our annual event to save your seat.
Attendee Registration

HOST

Agenda:
  • 8:00 a.m. - Registration & Light Breakfast
  • 8:45 a.m. - Welcome & Introductions Presentation: Reimagining Cybersecurity
  • 9:20 a.m. - Sharing Enemies with Your Vendors, Chris Poulin of BitSight
  • 10:30 a.m. - Break & Vendor Booth Showcase
  • 10:45 a.m. - How the Bad Guys Manipulate Your Users, Frank Welder of Arrow Electronics
  • 11:45 a.m. - Lunch
  • 12:45 p.m. - Anatomy of a Breach, Fran Malloy of IBM Security
  • 2:15 p.m. - Cybersecurity Panel with Moderator Michael Melore, of IBM Security
  • 3:30 p.m. - Open Bar & Vendor Booth Showcase

*As more information comes available, our agenda will be updated.

A SPEACIAL THANK YOU TO OUR SPONSORS

Bitsight Logo
IBM Security Logo
Help Systems Logo
Zscaler Logo
Arrow Logo

SPEAKERS

Chris Poulin
CHRIS POULIN
Deputy CTO / Director, Technology & Strategy
BitSight

Presentation: "Sharing Enemies with Your Vendors"


Ransomware is the latest top-of-mind threat for many organizations. Security teams are actively engaged in putting processes and controls in place to prevent ransomware compromises—or at least be prepared for them eventuality—but your supply chain partners may be your weakest link.

How do you know?

Join BitSight’s Chris Poulin as he shares the latest data-driven insights and best practices to identify and protect yourself from ransomware attacks against your own infrastructure as well as from your third parties.
Frank Welder
FRANK WELDER
Technical Solutions Architect
Arrow Electronics

Presentation: "How the Bad Guys Manipulate Your Users"


  • We Expect Ransomware
  • How do the bad buys use your users? What’s involved in Privilege Management?
  • Can Automation Help?
Fran Malloy
FRAN MALLOY
Principal Security Technical Leader
IBM Security

Presentation: "The Anatomy of a Breach"


Join Fran Malloy as he shares a candid firsthand experience of managing a highly public breach. You’ll hear how his teams aligned for multi-channel commerce cybersecurity through their eCommerce sites, retail locations, distribution center, and call centers supporting sister companies and his organization as they:
  • Discovered the breach
  • Undertook the forensic investigation
  • Determined scope and time frame
  • Developed the containment process
  • Met communication expectations (e.g. legal, customers, employees, management, PR/Media)
  • Navigated the layout of fines and fees faced as it pertained to the breach

CYBERSECURITY PANEL

Michael Melore
MICHAEL MELORE
Senior Cybersecurity Advisor, Certified Information Systems Security Professional
IBM Security

Moderator of the Panel
Mark Morgado
MARK MORGADO
Enterprise Infrastructure Director
Bryant & Stratton College
Bing Paesang
BING PAESANG
Director of IT
LeChase Construction
Sean Kelly
SEAN KELLY
Director, Cyber Governance Risk and Controls
Highmark Health
Daniel Altieri
DANIEL ALTIERI
Partner
Harter Secrest & Emery LLP.