Thursday, May 4, 2017
8 a.m. to 3 p.m.
325 University Drive
Hershey, PA 17033
2017 Annual Information Technology Security Conference—data breaches from both external and internal threats continue to be the highest priority for IT professionals—the bad guys are ever-evolving and attacks are more sophisticated and advanced.
While the media hypes high profile incidents, for most companies that's not the reality of what they're experiencing. This event covers the straight story on what is really occurring out there and how to handle it. The morning part of the program is technical and covers the latest trends and solutions companies should follow. In the afternoon, we have invited two top attorneys to cover the latest information on court decisions that impact network systems, as well as the strategies needed by IT when working with legal counsel.
The Pennsylvania Chamber's IT events—renowned for bridging the gap between compliance theory and meeting the practical daily demands of technology security—present some of the most knowledgeable and dynamic speakers. Our presenters—capable of answering any level of IT security question—bring the strongest technical backgrounds to explain how to stay ahead of today's threats to keep your systems safe and secure:
- Network and Application Penetration Testing—Detecting Vulnerabilities—testing helps companies identify "real world" attack scenarios and opportunities for hackers to compromise the systems. We will describe details on penetration tests; how to build an effective, low-cost penetration system using a Raspberry Pi, the credit card-sized single-board computer developed in the United Kingdom by the Raspberry Pi Foundation for teaching basic computer science; and how to evaluate your penetration testing results.
- Protecting Enterprise Data from Insider Threats—insider threats can be some of the most malicious attacks. Even if you've taken measures to safeguard your network, additional steps are needed to protect your systems from this highly dangerous threat. We will discuss enforcement of your electronic security policies; the principle of least privilege; how to evaluate if you have an insider threat problem; and special precautions to take with third party vendors or contractors.
- Insights from the 2017 Verizon Data Breach Investigations Report—an early look at cyber security's most comprehensive investigations report. This is the straight story on what is really occurring out there directly from Verizon's RISK Team: the latest, most comprehensive analysis of more than 100,000 security incidents in 82 countries. No locale, industry or organization was bulletproof when it came to the compromise of data.
- Navigating the Interrelationship Between Employment Law and Data Security—employment law interacts with and impacts an array of issues facing today's IT professionals, from employee electronic device use to evidence handling to privacy and safeguarding intellectual property. We will discuss recent court decisions impacting IT on social media, electronic device use and "The Internet of Things"; how to best work with legal counsel to meet their requests; key data security policies that should be in place; allowing employees to connect their smart phones to your system vs. providing the phone as a corporate asset; recommendations to help prevent the most common IT security mistakes companies are making that expose them to legal problems.
Network with your peers from across the state who are facing similar issues, and visit with exhibitors offering an exciting array of technologies.
Contact the Event Hotline for further information regarding this event: 877 866-8965