About The Conference
Is it any wonder why Cyber Crime is on the rise and the major target is small and medium sized business? These businesses are targeted by cyber criminals because they are the most vulnerable and exposed, making it an easy target. Given the increased pace and complexity of the threats, these businesses must adopt and adapt the appropriate approaches to cyber security that will require increased engagement to protect critical business assets without constraining innovation and growth.
On behalf of the America’s SBDC of New Jersey, we are producing this conference. We have hand selected these professional speakers, who have deep experience related to these matters, to educate the business community how to avoid, manage and handle the cyber-risk. We are seeking to collaborate with your organization to promote this event among your membership.
The America’s Small Business Development Centers (SBDC) of New Jersey presents Cyber Security Conferences 2015 to be held at Ramapo College of New Jersey, Mahwah, NJ on August 13, 2015, 8am – 1pm. The event is produced by Centaur Strategies, LLC, hosted by The Small Business Development Center of Bergen County, The Small Business Administration, Ramapo College of New Jersey and other stakeholders.
On behalf of the America’s SBDC of New Jersey, we are producing this conference. We have hand selected these professional speakers, who have deep experience related to these matters, to educate the business community how to avoid, manage and handle the cyber-risk. We are seeking to collaborate with your organization to promote this event among your membership.
The America’s Small Business Development Centers (SBDC) of New Jersey presents Cyber Security Conferences 2015 to be held at Ramapo College of New Jersey, Mahwah, NJ on August 13, 2015, 8am – 1pm. The event is produced by Centaur Strategies, LLC, hosted by The Small Business Development Center of Bergen County, The Small Business Administration, Ramapo College of New Jersey and other stakeholders.
Subject Matter ExpertiseNJ Office of Homeland Security & Preparedness
Steven Gutkin, Associate Director, was appointed to his current position at OHSP in August, 2014. He began with OHSP in July 2012 and served in the roles of Deputy Chief and Chief of the Planning Bureau until December 2013. Steve served as Chief of the Critical Infrastructure Protection Bureau from January 2014 until his current appointment. Prior to joining OHSP, he served as Executive Director for the Regional Catastrophic Planning Team (NY-NJ-CT-PA) and was responsible for managing more than 20 planners tasked with developing numerous regional disaster plans through FEMA’s Regional Catastrophic Preparedness Grant Program and managing a $27 million budget. Steve previously retired at the rank of Deputy Chief of Police after more than 20 years of service with the Fairfield Police Department. He is a graduate of the FBI National Academy (219th Session) and holds a Bachelor of Science degree in Human Services. Symantec
Jeff Barto is a strategist and advocate in Symantec’s Trust Services and Website Security Solutions group. He’s passionate about establishing and projecting fundamental trust on the internet. Jeff’s experience within the IT security and mobile space spans 14 years, largely at Symantec, Norton and Hewlett-Packard. Also carrying battle scars from marketing technology and running customer contact organizations, Jeff delivers a unique and engaging perspective for maximizing the business value – and rewards – of trust, confidence and security. IBM
David G. Munson is the Global Sales Director within IBM's Security Business Unit. He responsible for global product sales for IBM's Security Intelligence, Data, People, and Applications Security product segments. Dave has more than 30 years of IT industry experience in sales, sales leadership, and M&A leadership positions. He is a graduate of the Boston University School of Management, and holds an MBA from the Stern School of Management at New York University. ADP
Bill O’Connell is the VP of Gobal trust Assurance for ADP, one of the world's largest providers of human capital management solutions. Bill leads a global team responsible for all client security communications, training and awareness. Prior to ADP, Bill lead his own consulting practice and also worked for Deloitte on strategic information security road maps for CISO's and CIO's of global Fortune 500 firms. Bill is a graduate with a BS and MBA from University of Maryland and holds numerous security and technology certifications including CISA, CISSP, ITIL and PMP. AIG
Shiraz Saeed is currently the Cyber Liability Product Specialist for the Financial Lines Division of AIG Property & Casualty. He has a B.B.A. in Finance from Hofstra University and a M.B.A. from Pace University Lubin School of Business. He has been with AIG since 2010 and has been underwriting/distributing/developing the Cyber Liability products that AIG has to offer, for the past 5 years. He is a leader within the AIG Cyber Specialist Team and is also the lead instructor for training program related to Cyber Liability within and outside of AIG. This background gives him a keen understanding and a pulse of the risks that small, mid-size and large businesses face. SecLingua
Matthew Barry Smith has a multifaceted range of healthcare experiences marked by leading edge business developments and has been involved in higher education as an educator and administrator. Mr. Smith is the co-founder, President and CEO of SecLingua, Inc., a healthcare cybersecurity firm headquartered in Shelton, CT. Prior to his current position, Mr. Smith was a member at Merle Sloss and Associates, LLP, a private consulting firm and served as an advisor to two Connecticut-based private equity/venture firms as well as an advisor to several healthcare companies. He was Managing Director, Investments at Connecticut Innovations, Inc. (Rocky Hill, CT), a venture capital firm, and served on the Board of Directors of several CI portfolio firms. Moritt, Hock & Hamroff, LLP
Steven Rubin has 15 years of experience in consulting clients on patent related matters. In the cybersecurity space, he relies on his technology background in counseling clients and creating written information security plans (WISPs). The WISP may be used by companies to mitigate the risk of, and potentially limit exposure from, a data breach. Steve also serves as part of a multi-disciplinary team that can be called into action when a company is sued for actions associated with a data breach. He focuses his practice on technology relating to electronics and computer science. Steve has his J.D. from Hofstra University and a B.S. in Electrical Engineering, (magna cum laude), from New York Institute of Technology. Delaney Computer Services
Richard Delaney is a tenacious IT services veteran, with over 20 years of experience with IT infrastructure and network security management. Many of those years were spent focusing on network security from the enterprise to small business markets. Richard gained his enterprise tenure as a Senior Network Engineer Analyst in the Network Operations Group at Liberty Travel. In 2004 Richard Delaney and a team of talented pros, founded Delaney Computer Services, Inc. The core team has expertise on a broad perspective of IT governance, cyber security issues, infrastructure management and service delivery. Centaur Strategies
Jeanmarie Tenuto, CEO of Centaur Strategies, holds an MBA in Marketing and has operated Centaur Strategies since 1997. Centaur Strategies is a strategic marketing and business management company. We are trusted advisers to the local -to- global business community. We have deep functional and industry expertise with a geographic reach that responds locally, regionally, nationally or globally. We assist our clients to overcome difficulties while building capabilities and skills at the everyday, operational level. By studying the real issues and problems behind the problems, we assert pragmatic suggestions and execute feasible solutions with measurable impact. We work with our clients every step of the way so that we are fully engaged in your culture and achievable, outlined goals. When our projects are completed the answers are put into place so you carry forward with continuing the work. |
Topics of InterestNJ Cybersecurity & Communications Integration Cell (NJCCIC)
www.cyber.nj.gov Cybersecurity is a collective responsibility and New Jersey's digital density demands close and constant collaboration across sectors and industries. The goal is to promote shared and real-time awareness of cyber threat for New Jersey's citizens, local governments, businesses, and critical infrastructure owners and operators. The NJCCIC bridges the information divide between local, state, federal, public, and private sector insitutions to reduce New Jersey's cyber risk and respond to emergent incidents. What's "Trust " got to do with it?
2015 Internet Security Threat Report, Volume 20 The Internet Security Threat Report provides an overview and analysis of the year in global threat activity. The report is based on data from the Symantec Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Security Analytics for Business
New technological capabilities come with new vulnerabilities. How do you keep up with attacks when there is a shortage of IT security skills and rising costs to secure your data? How fast can you address an attack when your solutions aren’t integrated? IBM offers a deep enterprise security portfolio customized to your company’s needs. Unmatched in ability to help you disrupt new threats, deploy security innovations and reduce the cost and complexity of IT security, IBM can safeguard your most critical data from compromise. Protecting Your Employees
Establishing and maintaining the trust and confidence of clients is critical and needs to be a part of the value system for any company. The privacy and security must be of the highest importance while reducing risk. ADP employs industry recognized security safeguards to help protect the personal information provided to them from loss, misuse, or unauthorized access or alteration. With over 610,000 clients, safeguarding clients’ data by using the latest tools, tactics, techniques and procedures, cyber security has become its core competency. The Need for Insurance
In a rapidly changing landscape, CyberEdge® provides clients with an end-to-end risk management solution to stay ahead of the curve of cyber risk. CyberEdge provides the insurance coverage, tools, and continued access to emerging best practices – learned from our years covering this risk and from the cyber experts we work with – necessary for clients to assess and mitigate potential vulnerabilities to sensitive data breaches, computer hacking, employee error, and more. Innovation in Cyber Healthcare
SecLingua, Inc. was created by a “meeting of the minds” between a successful corporate technology designed and patented by Pitney Bowes. In 2012, Shelton-based SecLingua, Inc.,obtained the worldwide rights to this unique Pitney Bowes Secure Evidence Platform (SEP) for the healthcare industry including medical devices. SecLingua, Inc. offers proven trusted data security for healthcare industry participants that exceed current and proposed processing compliance standards for medical information by providing Confidentiality, Integrity and Authenticity (C,I,A). Know Your Cyber Law
A "Written Information Security Plan" (WISP) may help reduce potential legal liability, show reasonableness of your cyber-security approach, make your data more secure, be used for compliance with certain standards (e.g. ISO 27001) and serve as a market differentiator. Steven will discuss how a WISP is a written memorialization to protect the areas of exposure, relevant legal and regulatory requirements and vulnerable assets. I.T. & Computer Security
One of the most tested and proven security strategies used today is known as Defense in Depth . This concept focuses on the coordinated and organized use of multiple security countermeasures to keep a database safe from intrusive attackers. Basically, this concept is rooted in the military philosophy that a multi-layered and complex defense is more difficult to infiltrate than a single-barrier protection system. The Defense in Depth strategy gives network administrators peace-of-mind and confidence that their network is secure through the usage of a Multi-Layered Defense plan. Communications in a Crisis
Fazio Heating & Cooling, a small business based outside of Pittsburgh, had its credentials stolen which allowed criminals access into its system. This allowed the criminals ultimately access into customers systems stealing data of 70 million customers and 40 million credit cards and debit cards from retailer giant Target. For crisis communications, it is your responsibility to minimize and plan for this risk. You have a responsibility to your customers, clients, members, employees and your organization to take this initiative. You don’t need to be a major brand or organization to have this risk threaten your very livelihood. A data breach hack is a risk to any organization, no matter its size or industry. Preparing ahead of time for a data breach and having the crisis communications plan in place will allow the flexibility for you to address the concerns and needs in a timely and effective manner while minimizing more aftermath and (collateral) damage. |
Register Now. Admission is FREE with Advanced Registration.
Hosted & Sponsored by
America's Small Business Development Centers New Jersey
is funded in part through a cooperative agreement with the U.S. Small Business Administration (S.B.A.).
©2015 America s SBDC New Jersey
is funded in part through a cooperative agreement with the U.S. Small Business Administration (S.B.A.).
©2015 America s SBDC New Jersey