Evan Dornbush, Chief Information Security Officer (CISO) and Cyber Security R&D Manager for TechGuard Security
Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, Education, Finance, Government, IT Security, Security, Technology

Evan Dornbush, Chief Information Security Officer for TechGuard Security, to Speak at Golden Networking’s Cyber Security World Conference 2014 New York City

Mr. Evan Dornbush, Chief Information Security Officer (CISO) and Cyber Security R&D Manager for TechGuard Security, LLC, will speak at Golden Networking’s Cyber Security World Conference 2014 New York City (http://CyberSecurityWorldConference.com), unique professional gathering where cybersecurity gurus are set to debate topics such as protecting individuals and companies against cyber-attacks, risks brought by mobile computing, and protecting corporate and national infrastructure against foreign attacks.

Prior to TechGuard Security, Mr. Dornbush was the Senior Network Analyst at Vulnerability Research Labs (VRL) which was acquired by CSC. Mr. Dornbush worked for The United States Department of Defense (Granted TS//SCI) from January 2005 to March 2009, where he was a Computer Network Operator, Systems Engineer and Global Network Exploitation and Vulnerability Analyst.

Mr. Dornbush earned an M.S. and B.A. in Computer Science and a B.A. in Criminal Justice from The George Washington University in 2004, and was a DoD/NFS Cybercorps Scholarship Winner in 2003 and 2004.

Advertisements
Standard
Golden Networking's Cyber Security World Conference 2014 New York City
Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, Finance, Government, IT Security, Technology

How your Company can be the Weakest Link and how the Cybersecurity Framework can Help at Golden Networking’s Cyber Security World Conference 2014 New York City

A chain is only as strong as its weakest link, says Bill Buchanan, The Conversation. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to information security is actually people. Why strive to defeat encrypted passwords stored in computers, when those computers’ human users will turn them over willingly?

A huge problem with most types of digital communications, processing and storage is that it’s often very difficult to differentiate between a true communication and one which has been falsified. This stems largely from the internet’s background as an open, insecure system. In emails apparently from legitimate websites, the email address of the sender can be spoofed, that is, replaced with another that is not the sender’s actual address, as some email relay systems allow this.

Corporations are today targeted as never before, with growth in hacking attacks linked to nation states and overseas governments; in fact, sophisticated and sustained campaigns of phishing have succeeded in stealing information from firms and organizations all over the world. Symantec recorded a 62% rise in data breaches from spear phishing in 2013.

In response to the growing cyber threat, the Cybersecurity Framework, which was drafted by the Commerce Department’s National Institute of Standards and Technology (NIST), represents a tipping point in the evolution of cybersecurity, one in which the balance is shifting to proactive risk-management standards. While its application is voluntary, organizations across industries may gain significant benefits by adopting the guidelines.

Golden Networking‘s Cyber Security World Conference 2014 New York City (http://www.CyberSecurityWorldConference.com) will provide a platform for hundreds of senior executives focused on protecting today’s enterprises to learn more about the Cybersecurity Framework and how to apply it to their organization. Topics that Cyber Security World Conference 2014 will discuss include:

  • Cyber Security Megatrends Security Professionals can’t Ignore Today
  • Designing and Managing Effective Information Security Programs
  • Is Biometrics the Key to Personal and Corporate Security?
  • How Hackers Really Operate to Obtain Financial Data
  • Key Considerations about Security in the Internet of Things Age
  • Strengthening the Security of Industry-wide Technology Infrastructure
  • Cyber Security and its Role in the Overall Security of the United States

About Cyber Security World Conference 2014

Cyber security is never again a term to ignore for individuals or corporations. The daily activities of all Americans, the country’s global economic prominence and worldwide security rely on a safe and resilient cyberspace. Unfortunately, the number of cyber-attacks has increased dramatically over the last years, exposing confidential personal and business data, disrupting critical operations, and imposing exorbitantly high costs on the economy overall.

Just recently, J.P. Morgan Chase, America’s largest commercial bank with $2.39 trillion in assets, announced that about 76 million households and 7 million of small-business customers had been affected by a cyber attack in one of the most sweeping known global breaches. The company said the unknown attackers stole customers’ contact information, which included names, email addresses, numbers and addresses, affected an amount equivalent to almost two-thirds of American households.

A brief walk down memory lane of some the biggest recent cyber-attacks now include Adobe Systems, Automated Data Processing, Citigroup, E*Trade Financial, Fidelity Investments, Home Depot, HSBC, Nasdaq OMX, Neiman Marcus, Target and Wal-mart. It is not unlikely to consider that the information of every American has already been compromised in any of these publicly disclosed attacks.

Renowned information security experts and innovative service providers will present at Cyber Security World Conference 2014 their latest thinking to hundreds of senior executives focused on protecting enterprises and governmental agencies.

Cyber Security World Conference 2014 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Panelists, speakers and sponsors are invited to contact Golden Networking by sending an email to information@goldennetworking.com.

Standard
Kashif Latif, Global Security and GRC Officer for Fidelity Information Services
Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, Finance, Government, IT Security, Technology

Kashif Latif, Global Security Officer of Fidelity Information Services, to Speak at Golden Networking’s Cyber Security World Conference 2014 New York City

Kashif Latif, Global Security and GRC Officer for Fidelity Information Services, will speak at Golden Networking’s Cyber Security World Conference 2014 New York City (http://CyberSecurityWorldConference.com), summit where cybersecurity experts are set to discuss topics such as protecting individuals and companies against cyber-attacks, biometrics as the future of security, risks brought by mobile computing, and protecting corporate and national infrastructure against foreign attacks.

Mr. Latif is responsible to initiate, implement and oversee corporate wide Information Security, Risk and Compliance initiatives and also manage Capco’s GRC program. Mr. Latif has over 15+ years of experience in information security management; IT services management, Portfolio and Program Management and IT Governance roles. Over the years, he has held several senior IT & Security Management positions at leading organizations including Depository Trust & Clearing Corporation, Tokio Marine Management, WestCon International , National Commercial Bank and Saudi Telecom.

Mr. Latif has a powerful business drive and his clarity of vision has carried multiple companies through rapid continuous growth. His hands-on knowledge in both Tools and Technology and Policy and Frameworks Development, Control Gap Assessment, Risk Assessment, Process Maturity Assessment, Program and Project Management, Security Compliance Management makes him adept in this domain. He recently received “The Face of GRC Industry Award” at GRC Summit 2014 for his contribution toward GRC industry specially for designing the first “Continuous Compliance solution” over Metric Stream GRC platform.

Mr. Latif holds a MS in Computer Science from FAST-NUCES and Double Master in Computer Science and Cyber Security from ZABIST. He has been guest lecturer at multiple universities in fields related to Information Security, IT Audit and IT Governance. He also holds a wide variety of industry certifications including CGEIT, CRISC, CISM, CIA and CISA.

About Cyber Security World Conference 2014

Cyber security is never again a term to ignore for individuals or corporations. The daily activities of all Americans, the country’s global economic prominence and worldwide security rely on a safe and resilient cyberspace. Unfortunately, the number of cyber-attacks has increased dramatically over the last years, exposing confidential personal and business data, disrupting critical operations, and imposing exorbitantly high costs on the economy overall.

Just recently, J.P. Morgan Chase, America’s largest commercial bank with $2.39 trillion in assets, announced that about 76 million households and 7 million of small-business customers had been affected by a cyber attack in one of the most sweeping disclosed global breaches. The bank said the unknown attackers stole customers’ contact information, which included names, email addresses, phone numbers and addresses, affected an amount equivalent to two-thirds of American households.

A brief walk down memory lane of some the biggest recent cyber-attacks now include Adobe Systems, Automated Data Processing, Citigroup, E*Trade Financial, Fidelity Investments, Home Depot, HSBC, Nasdaq OMX, Neiman Marcus, Target and Wal-mart. It is not unlikely to consider that the information of every American has already been compromised in any of these publicly disclosed attacks.

Renowned information security experts and innovative service providers will present at Cyber Security World Conference 2014 their latest thinking to hundreds of senior executives focused on protecting enterprises and governmental agencies. Topics that Cyber Security World Conference 2014 will discuss include:

  • Key Considerations about Security in the Internet of Things Age
  • Cyber Security Megatrends Security Professionals can’t Ignore Today
  • Is Biometrics the Key to Personal and Corporate Security?
  • How Hackers Really Operate to Obtain Financial Data
  • Strengthening the Security of Industry-wide Technology Infrastructure
  • Cyber Security and its Role in the Overall Security of the United States
  • Designing and Managing Effective Information Security Programs

Cyber Security World Conference 2014 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Panelists, speakers and sponsors are invited to contact Golden Networking by sending an email to information@goldennetworking.com.

Standard
Cyber Security World Conference 2014 New York City
Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, Finance, Government, IT Security, Technology

A Look at Some Key Federal Cybersecurity Breaches

A $10 billion-a-year federal effort to protect critical data is struggling against an onslaught of cyberattacks by thieves, hostile states and hackers.

An Associated Press report this week finds that federal cybersecurity officials also face another challenge: Too often, government employees and contractors are undermining cyberdefenses by clicking malicious links, losing devices and data, or sharing information and passwords.

Last year, security officials responded to a total of 228,700 cyberincidents involving federal agencies and contract partners.

Read more

Standard