Back to Results
First PageMeta Content
Electronic warfare / Hacking / Military technology / Computer security / United States Department of Homeland Security / Idaho / Idaho National Laboratory / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Security / Public safety / Cyberwarfare


2014 Annual ACSC Conference LEFT OF BOOM How and Where to Invest Across the Kill Chain
Add to Reading List

Document Date: 2014-12-30 11:22:29


Open Document

File Size: 1,79 MB

Share Result on Facebook

City

Boston / /

Company

EMC Inc. / Goodwin Procter LLP / Liberty Mutual Group John Serafini / CyberArk Katie Moussouris Chief Policy Officer / Akamai Technologies Udi Mokady / Optimizing Cybersecurity Investments / Mandiant/FireEye Inc. / Google / Artificial Intelligence Laboratory / Foley Hoag LLP / State Street Corporation / Puneesh Chaudhry / Veracode For / Chris Wysopal / /

Country

United States / Israel / /

Facility

Boston University / Northeastern University / Worcester Polytechnic Institute / University of Massachusetts Amherst ACSC Annual Conference November / University of Massachusetts / Massachusetts Institute of Technology / University of Massachusetts Amherst / Harvard University / /

IndustryTerm

internal and external communications / venture capital / supply chain / self-healing systems / internet connectivity / long-term solutions / stolen devices / secure infrastructure / technology talent / technology areas / bank accounts / realworld solutions / mobile technology / cyber supply chain / cybersecurity solutions / software suppliers / law enforcement / real-time monitoring / technology play / e-health / security solutions / /

OperatingSystem

Android / /

Organization

Israeli Consulate / University of Massachusetts / School of Management / Harvard University / Northeastern University / MA office of Housing and Economic Development Northeastern / National Action / U.S. Department of Homeland Security / University of Massachusetts Amherst / Federal Reserve Bank / Massachusetts Institute of Technology / Federal Bureau of Investigation / Federal Reserve Bank of Boston / University of Massachusetts Amherst ACSC Annual Conference / Worcester Polytechnic Institute / U.S. Department of Homeland Security Panelists / office of the CISO / Boston University / /

Person

David Kaeli / James Caulfield / Allied Minds Jack / Michael Stewart / Michael Chertoff / Lowell Break / Copiun / Christopher Perretta / Chris Perretta / William Guenther / Harrison Dimmig / Joseph Bonavolonta / Greg Bialecki / Yehuda Yaakov / Piper Alex / Gus Coldebella / Thomas Quinn / Alex Lanstein / Christopher Hart Associate / Greg Dracon / Michael Chertoff Plenary / Howard Shrobe / Tushar Swamy / Andy Ellis / John McKenna / Neel Shah / Katie Moussouris / Mel Bernstein / Christopher Sloan / /

Position

Wilson President Emeritus / Board Member / Assistant Vice President and Senior Corporate Counsel / Liberty Mutual Group / Jim Halpert Head / US Privacy / Vice President / Co-Founder / Chief Executive Officer / Director and Principal Research Scientist / Yonatan Striem-Amit Chief Technology Officer / Editor in Chief / Acting General Counsel / Secretary / Senior Director of Trust / Engineer / global cyber leader / Assistant Vice President / Vice President and Chief Information Officer / RUNNER / Chief Technology Officer / Co-Chair Data Protection / Chief Security Officer / Chairman / Consul General / President and CEO / Striem-Amit Chief Technology Officer and Co-Founder / Executive Vice President / Senior Vice President and Chief Information Security Officer / Cybersecurity Solution Chair / Executive Chairman and Co-Founder / The Chertoff Group / Vice President and Information Security Officer / Professor of Higher Education / /

ProvinceOrState

Massachusetts / /

Technology

PKI / ATM / Android / BYOD technology / existing protocol / smartphones / /

SocialTag