Welcome to our Annual Conference Security Summit.

 

Climb aboard and learn about the latest techniques for prevention, detection, and response to crucial security challenges.

 

Scroll down to learn more.

Our Annual Conference Security Summit was a huge success!

 

Our speakers have generously made their presentations available.
Click to see the list and download.

 

Scroll down for more details about the Security Summit.

Don't get derailed by security issues.

NJEDge.Net

ANNUAL CONFERENCE

Security Summit

Princeton Marriott at Forrestal

100 College Road East

Princeton, NJ

About the Security Summit

Join NJEDge.Net’s Security Resource Group for an exploration of crucial security challenges facing New Jersey’s institutions. Share ideas with the people on the front lines of protecting their institutions. Learn from some of the companies helping them.

 FIND SOLUTIONS FOR:

 

Data protection • vulnerability points • cloud encryption • Microsoft Office weaknesses • DoS • compromised credentials • broken authentication • API • phishing • fraud • APT • shared services • misconfiguration • change management

Speakers

Mike Geraghty, Acting Director of Cybersecurity

 

Mike Geraghty has been the Director of the New Jersey Cybersecurity and Communications Integration Cell (NJCCIC), the State’s Information Sharing and Analysis Organization (ISAO) since July 2016. Prior to his appointment, he served as the Chief Information Security Officer (CISO) of the Hudson’s Bay Company, Chief Information Officer of the National Center for Missing and Exploited Children, and Vice President of High Technology Investigations at Prudential Financial. Previously, Mr. Geraghty served 12 years with the New Jersey State Police, where he led the formation and development of the High Technology Crimes Investigation Unit. He has lectured extensively throughout the world on the topic of cybersecurity, high tech investigations and computer forensics, providing technical and investigative assistance to law enforcement agencies both domestically and internationally, including the FBI, Secret Service, Department of Homeland Security, Naval Intelligence, New Scotland Yard, and the Royal Newfoundland Constabulary Service. He has provided expert testimony before congress and in federal, state, and international courts on computer crime investigations and forensics. Geraghty is also a past president of the Northeast Chapter of the High Technology Crimes Investigation Association and has held leadership roles in the National Strategic Policy Council on Cyber and Electronic Crime.

Dave Weinstein,
CTO for the State of New Jersey

 

Dave Weinstein is the Chief Technology Officer (CTO) for the State of New Jersey, a newly-established cabinet post in the Administration of Governor Chris Christie.  As CTO, Dave is responsible for the administration of the New Jersey Office of Information Technology.

Prior to this June 2016 appointment, Dave previously served as New Jersey’s Chief Information Security Officer and Cybersecurity Advisor with the New Jersey Office of Homeland Security and Preparedness.  Outside of Trenton, Dave was a senior civilian at the United States Cyber Command in Fort Meade, Maryland, as well as a cyber risk consultant with Deloitte and Touche.

Dave has been recognized by Forbes as a “top 20 cyber policy expert” and his analysis and commentary has been featured in numerous media and academic publications, including the Georgetown Journal of International Affairs, Foreign Affairs, Foreign Policy, CNN.com, The Boston Globe, and The Huffington Post.  Dave is a Cybersecurity Fellow with New America and an “Influencer” for the Christian Science Monitor’s security and privacy project.  He is the author of the forthcoming chapter “Information Sharing at the State and Local Level,” published in Cyber Insecurity: Navigating the Perils of the Information Age (Rowan & Littlefield Publishers, Inc.).

Security Summit: Schedule Overview

Click here for a detailed schedule of the Security Summit events and locations.

WEDNESDAY 11/16

12pm

 

12:30-6:30pm

 

2pm

 

2:30-3:40pm

 

4-5:15pm

Lunch

 

Conference Registration (Outside Alexander Ballroom)

  
Security Summit Welcome

 

"Leveraging VDI Technology to Improve Institutional Security Posture"

 

"Defending Your Castle from Attacks"

5-5:45pm

 

5:45-6:45pm

 

6:30-9pm

 

7-8:30pm

 

8:30-10:30pm

Community College CIO Meeting

 

Yoga

 

Executive Dinner (By invitation only)

 

Attendee Dinner

 

Reception

THURSDAY 11/17

7am-4:30pm

 

6:30-8:15am

 

8am-6pm

 

8:15

 

 

8:45am

 

9:45-10:30am

 

10:30-12:45

 

 

12:45-2pm

 

2-3:40pm

On-Site Registration

 

Breakfast

 

Vendor Exhibits

 

Michael Reekie, NJEDge.Net
Demetrios Roubos, Stockton University

 

"Establishing a Right-sized Information Security Program"

 

Train stop for snacks

 

Security Discussion: Michael Geraghty, Acting Director of Cybersecurity, NJ Homeland Security

 

Attendee Luncheon

 

General Session III

The Charles McMickle Award for Excellence and Innovation

The Laskaris Leadership Award

 

 

 

 

 

 

 

3:40-4:40pm

 

4:40-5:40pm

 

5:40-7pm

 

7-8:30pm

 

8-10:30pm

(General Session III, continued)

“Cybersecurity in New Jersey”
David Weinstein, CTO for the State of NJ

 

“A New Train Route for NJEDge”
Samuel Conn, Ph.D., CEO & President, NJEDge

 

Train stop to visit vendors

 

"Fun with Certificates"

 

Reception

 

Dinner

 

Social Program

FRIDAY 11/18

7am-12:30pm

 

7-8:15am

 

8-2:30pm

 

8:30am

 

 

9:15am

On-Site Registration

 

Breakfast

 

Vendor Exhibits (Door Prizes)

 

Michael Reekie, NJEDge.Net,
Demetrios Roubos, Stockton University

 

"Network-Based Identity Management: Solving Problems You Didn’t Know You Had"

10:30-11:15am

 

11:15-12:30pm

 

 

12:30-1:40pm

 

1:45-2:45pm

 

 

2:45-3:15pm

Train Stop for Vendor Exhibits

 

"Changing our Attitudes on Information Security: From Red Light to Yellow Light"

 

Lunch

 

"Been Hacked? Hardening Your Web Server is Easier Than You Think"

 

Join General Session for Closing and Grand Prize Drawing

Sessions

Click on each session title to see details.

  • Been hacked? Hardening your web server is easier than you think

    Higher Ed relies on open-source web and application servers for both internal and external constituents. Many of the steps required for security are not complicated. Yet in many cases, they go unimplemented, leaving the deployment vulnerable to easy attacks, while some of the securing steps are pure policy-driven rather than technical. We will look at a deployment scenario with CentOS/Apache realm and discuss the easy steps to secure it.

    Moe Rahman, Brookdale CC

  • Changing our attitudes on information security: From red light to yellow light

    Why do most faculty, staff and students hate the Office of Information Security? Why don't we get the respect we deserve from other business units around campus? Let's take a hard look at what we are doing wrong and change the face of information security in our institutions. We'll investigate whether current information security practices are serving our end users or just alienating them. Through introspection and deep meditation, we'll better understand how we can stop being the red light on the information superhighway and become the yellow light instead.

    Brian Epstein, Institute for
    Advanced Study

  • Fun with certificates, Part II: Elliptic Curve Cryptography

    It is critical to understand the technologies we use to protect data. When trying to convey the importance of digital encryption, questions may arise about the hows and whys of this technology.  This presentation explains symmetric and asymmetric cryptography in a way that the non-technical person can understand.  Assisted by fun hands-on tools, we will run through an example of Elliptic Curve Cryptography while learning its origins and applications. Using this type of presentation helps convince people that security technology is important and increases compliance.

    Brian Epstein, Institute for
    Advanced Study

  • Defending your castle from attacks

    Lessons learned from combating Phishing and Ransomware, plus how to train your end users

    In today’s brave new world of constant security attacks, we need to be on alert. The presenter will discuss techniques he uses to "defend the castle" from the daily attacks. Learn about  new cutting-edge tools strategies you can put in place to mitigate this ever-increasing risk.

    Len DeBotton,

    Berkeley College

  • Leveraging Virtual Desktop Infrastructure technology to improve institutional security posture

    VDI is a unique technology which can be leveraged to promote a culture of security the likes of which haven't been seen since the days of mainframe computing. Virtualized Desktops can be automatically recycled, providing IT administrators with the opportunity to provide a fresh image/instance to their end-users at login. VDI can also be used to broker secure remote access to protected information systems. This versatile technology has many features and use-cases.

    Demetrios Roubos, Stockton University

  • Network-Based Identity Management: Solving problems you didn’t know you had

    As wireless connectivity and user devices continue to expand, scalable security solutions are crucial. Today’s deployments can scale from simple authentication to enforcing network access policies and quarantining bad actors on your network, while providing consistent wired/wireless access to authorized users. In this session, we will discuss cases applicable to higher education—specifically, how William Paterson University was able to provide context and enforce policy within its network.

    James DeRose,

    William Paterson University of New Jersey

  • Establishing a right-sized information security program for higher educational institutions

    An effective information security and risk management system is the intersection of people, process and technology, creating a repeatable and sustainable lifecycle that helps an organization address the ever-changing threat and vulnerability landscape. We will identify the critical components of a security program and demonstrate how they can fit into any organization, regardless of size or industry. Included will be a sample of leading information security frameworks, standards and control structures, as well as discussions on how and where to get started in your organization.

    John A. Otte,

    Principal Security Strategist, ePlus Technology Inc.

NJEDge.Net Annual Conference

November 16-18, 2016

SECURITY SUMMIT

Sign me up!

 Copyright © 2016 NJEDge.net