2017 February online Webinar
2017 Webinar, Thursday February 9, 2017 12:00-1:00 pm EST
Agenda
Winn Schwartau has agreed to speak at this meeting.
Winn Schwartau is an expert on security, privacy, infowar, cyber-terrorism and related topics. He is known for his appearances at Defcon as the host of the popular game Hacker Jeopardy, and for his provocative and original ideas and has written more than a dozen works on security topics. In 2002, he was honored as a “Power Thinker” and one of the 50 most powerful people in networking by Network World. In 2008, he was voted one of the 25 Most Influential People in the Security Industry by Security Magazine. |

Martha Coakley, former Attorney General of the Commonwealth of Massachusetts has agreed to speak.
“Cyber Security Belongs in the C-Suite: are you ready?” alongside Christopher Hart, an attorney in the Privacy & Data Security practice at Foley Hoag.
“Cyber Security Belongs in the C-Suite: are you ready?” alongside Christopher Hart, an attorney in the Privacy & Data Security practice at Foley Hoag.
![]() |
Richard Stiennon, Chief Strategy Officer, Blancco Technology Group
World renowned cyber security authority Richard Stiennon is confirmed to address our chapter on September 15. Richard is the very well-known former Vice President of Research at Gartner where his forward-thinking insights and questioning of the corporate status quo earned him Gartner’s Thought Leadership Award in 2003. Richard has written three thought-provoking books on the alarming state of cyber war and its impact on businesses, with his most recent book, There Will Be Cyberwar, was named a Washington Post bestseller in April 2016. Considered to be one of the most prolific security thought leaders, he has spoken at over 28 data security conferences across 3 continents and is frequently quoted in news publications, including The Washington Post, New York Times, USA Today, Christian Science Monitor, Dark Reading, to name a few. |

Presenter:
Dave Karp, Senior Vice President of Global Field Engineering and Technical Enablement, Digital Guardian
Talk Title:
Attacks Are Inevitable – Losing data is NOT
Talk Synopsis
Ask yourself this: if you could only protect one thing, what would it be? Chances are, it’s your data—it’s what the bad guys want. So why isn’t your security team laser-focused on data protection?
While an IT Security Pro’s world is noisy, we need to put on our noise cancelling headphones and blinders to start with what is most important in our organizations… the data.
This session will provide a list of questions to help guide practitioners in prioritizing projects, tasks and alerts. It will also help to give definitions for the different types of data within an organization and how to rank it based on sensitivity, business need and compliance/fines.
After answering these questions and going through the data definitions, attendees will walk away with a prioritized set of data that can be cross-referenced against other IT projects/trends, like BYOD, remote workers, software-defined networking and cloud computing.
Bio
Dave leads sales engineering and technical enablement of a global sales force, working closely with product marketing and product management on go to market strategy and product life cycle management.
Dave has excelled in diverse roles within sales engineering, product management, marketing, consulting and managed services.
Before joining Digital Guardian, Dave’s responsibilities included leading a technical team of Security Evangelists and Solutions Specialists focused on delivering McAfee’s SIEM, participation in the development of products aligned to the Risk and Compliance business unit, and active evangelist for McAfee solutions and offerings. He has published whitepapers on SIEM, correlation, and vulnerability management. In addition, Mr. Karp has taught classes and presented at security conferences across the world; he recently addressed audiences in the U.S., the U.K., Canada, Australia and other countries.
Focus Area:
Enterprise Cyber Security Technologies and/or Strategies
Dave Karp, Senior Vice President of Global Field Engineering and Technical Enablement, Digital Guardian
Talk Title:
Attacks Are Inevitable – Losing data is NOT
Talk Synopsis
Ask yourself this: if you could only protect one thing, what would it be? Chances are, it’s your data—it’s what the bad guys want. So why isn’t your security team laser-focused on data protection?
While an IT Security Pro’s world is noisy, we need to put on our noise cancelling headphones and blinders to start with what is most important in our organizations… the data.
This session will provide a list of questions to help guide practitioners in prioritizing projects, tasks and alerts. It will also help to give definitions for the different types of data within an organization and how to rank it based on sensitivity, business need and compliance/fines.
After answering these questions and going through the data definitions, attendees will walk away with a prioritized set of data that can be cross-referenced against other IT projects/trends, like BYOD, remote workers, software-defined networking and cloud computing.
Bio
Dave leads sales engineering and technical enablement of a global sales force, working closely with product marketing and product management on go to market strategy and product life cycle management.
Dave has excelled in diverse roles within sales engineering, product management, marketing, consulting and managed services.
Before joining Digital Guardian, Dave’s responsibilities included leading a technical team of Security Evangelists and Solutions Specialists focused on delivering McAfee’s SIEM, participation in the development of products aligned to the Risk and Compliance business unit, and active evangelist for McAfee solutions and offerings. He has published whitepapers on SIEM, correlation, and vulnerability management. In addition, Mr. Karp has taught classes and presented at security conferences across the world; he recently addressed audiences in the U.S., the U.K., Canada, Australia and other countries.
Focus Area:
Enterprise Cyber Security Technologies and/or Strategies