Security concerns continue to dominate the industry. No company is safe from these virtual thieves. This event features Jeff Horan, Manager of Information Security & Compliance at Veracode, who will present a tabletop exercise on how to respond when a ransomware attack occurs.
At our next monthly meeting you and your colleagues and friends will have an opportunity to walk through steps in a security breach scenario, learning about preventative actions and how to react to mitigate the threat. Join us for this lively and interactive meeting taking place on Thursday, April 7th from 5:30pm – 8:00pm at the Boston University Amphitheater in Boston, MA!
The meeting will take place in the Hariri Building in the Questrom School for Business at BU, 595 Commonwealth Avenue, Boston.
The food and drinks will be on the 4th floor and the meeting will be on the 2nd floor in room 208. Parking garage (free parking) is in the garage beneath the building.
Aqueduct is the sponsor of this monthly meeting.
Jeff is Manager of Information Security & Compliance at Veracode. He has a wide range of experience in systems & software development, with former governmental accountability for data security. Prior to Veracode Jeff was Senior Security Analyst with Iron Mountain’s Global Security Services division at its Boston, Massachusetts company headquarters. Previous to Iron Mountain, Jeff was an executive at the Massachusetts Bay Transportation Authority (MBTA) and was responsible for bringing the CharlieCard System into PCI Compliance. Before the MBTA, Jeff was a development manager for Symantec’s Gateway Security and Enterprise Firewall product lines. He was a staff engineer on the Solaris OS & Networking “ON” team at Sun Microsystems for 15-years (1987-2001) during the build out of the Internet. In addition to serving on several boards & committees in his community, Jeff is a commercially-rated pilot and Angel Flight volunteer. Jeff holds a B.S. summa cum laude from Northeastern University. Jeff reports to Bill Brown, Veracode’s Chief Information Officer (CIO) and Chief Information Security Officer (CISO).