Small Business, Big Threat – Cyber Awareness Conference

Comments: 0

 

Early Bird Registration - $50 ($75 after Sept. 28)

Register Button

 

 

Join us October 5th to hear:

Candan Bolukbas,  Chief Technology Officer, NormShield ("we give you a seat at the hacker's table")
Candan is a certified Ethical Hacker, a certified secure programmer, certified incident handler and a certified computer hacking forensic investigator; holds many advanced certifications on cybersecurity.

 

 
Phil Panzarella, Co-founder and Partner,  5th Grade Simple (5GS)

Phil is a passionate entrepreneur, leader, mentor, fund raiser, philanthropist and catalyst for change; and thrives on building teams and delivering lasting sustainable.

 

Richard Tracy, Chief Security Officer, Telos Information
Richard pioneered the development of innovative and highly scalable enterprise risk management technologies which are industry standards in Federal government and financial services sectors; and is the principal inventor listed on four patents and seven patents pending.

 

Joey M. Alonso, President, Quortum
Joey is a CERT-Certified Insider Threat Vulnerability Assessor and Insider Threat Program Manager experienced in government and corporate Insider Threat program assessments, development, and training. He has 22 years in Navy intelligence community, with extensive skills in Human Intelligence (HUMINT)

 

Reeshad Dalal, Chair, Psychology Department, George Mason University
Reeshad is an expert on employee performance (primarily counterproductive/deviant and citizenship behavior), job attitudes and mood/emotions, and the impact of situations on performance, decision-making.
Gary Baldino, Partner, Baldino's Lock & Key
Gary is an expert in all areas of lock systems, physical security alarms, CCTV, access control, and more for residential and commercial locksmith needs in Maryland, Washington, D.C., or Northern Virginia.

 

Presentations include:
  • Psychology of Hackers
  • Threat Prevention for Small Businesses
  • Mobile Security
  • Handling and Responding to a Data Breach
  • Cyber Plan for Businesses
  • Managing Employee Behavior