November 17, 2015 
7:30-11 a.m.
Crowne Plaza in Nashua, NH

About the event

NH Business Review’s TechTalk NH is an informational forum for businesspeople concerned with technology-related issues that affect their business. In partnership with the NH High Tech Council, this inaugural event will focus on cybersecurity – why small businesses are targeted for cyber attacks and what can be done to protect your business and employees. 

TechTalk NH is designed to provide business owners, IT managers and executive level professionals a platform to ask questions and receive answers regarding technology in the workplace.  The forum will be kicked off with a keynote presentation, followed by a panel discussion and Q&A session.  Approximately 150 attendees are expected and will have the opportunity to network with sponsors and peers during designated time slots.

Topics include:

  • Developing and implementing a security plan
  • Is my current anti-virus software enough coverage?
  • Why small businesses are a target?
  • Ransomware and other virus attacks – how they work and what to do if it happens to you
  • Why your suppliers and vendors could present a security threat to you

Agenda (subject to change)

7:30 – 8:30 a.m.     Networking Breakfast & Exhibits
8:30 – 8:35 a.m.     Opening Remarks
8:35 – 9:35 a.m.     Keynote address - Don Ulsch
9:35 – 9:50 a.m.     Q&A with Don Ulsch
9:50 – 10:00 a.m.   Networking Intermission
10:00 – 10:55 a.m. Panel Discussion
10:55 – 11:00 a.m. Closing Remarks

Exhibitors

  • AuthEntry
  • Daystar Computer Services
  • DSCI
  • ERP Guru
  • IT Secure
  • Neoscope IT
  • Paradigm Consulting
  • TeamLogic IT
  • White Mountain IT Services

Keynote Speaker: Don Ulsch, Sr. Managing Director of PricewaterhouseCoopers LLP

Don has more than 30 years of experience in the fields of forensic investigations, cybercrime, national security, and information security management. Working with many of the more established and well known corporate brands, as well as U.S. and international law enforcement and the intelligence community, he has led many cyber breach investigations and advised executive management on breach management strategy and cyber risk preparedness.  Don’s cyber breach investigative work spans across multiple industries from financial services and defense, to retail, manufacturing, and health care.

Don is also Chair of the 2015-2016 American Bar Association Criminal Justice Section Cyber Crime Privacy Subcommittee.  He has appeared on Fox News as a cybercrime and breach analyst and on other television and radio programs. The author of many articles, he has been cited in books, as well as academic and military studies on cyber risk.  Don has authored two books himself: Threat! Managing Risk in a Hostile World (The IIA Research Foundation, July 2008) and Cyber Threat! How to Manage the Growing Risk of Cyber Attacks (John Wiley & Sons, July 2014).

Panelists

Mark Benton, Product Manager, Systems Engineering

Mark Benton has been with Systems Engineering for over five years. Mark brings over 30 years of experience working with and managing technology. Prior to joining SE, Mark had roles such as CIO, COO, and built a software-as-a-service "SaaS" organization. While working at a major U.S. railroad, he developed applications including one to graphically display the effects of train handling and terrain on the longitudinal forces in a moving freight train. Mark joined Systems Engineering in 2010 and his role as Product Manager where his focus to assist in developing and enhancing cloud- and security-based product and services technologies. Mark is also an active Board Member of the Maine Cyber Security Cluster.

 

Peter La Monica, Department Chair & Associate Professor of Computer Science, Manchester Community College

As an expert computer forensic analysis for the USPIS, Peter La Monica was a pioneer in mobile device analysts. He assisted federal, state and local law enforcement agencies with computer and mobile forensics and was a key contact for criminal investigations for crimes against children, mail fraud and other crimes involving computers. He completed more than 400 computer forensic and cell phone analyses. Mr. La Monica has developed computer-related training for technology resellers as well as training for the more technology-challenged. He has been teaching part time at colleges and corporate training centers since 1982 and joined the Manchester Community College faculty as a full time Associate Professor in 2012.

 

Cameron G. Shilling, Director of the Litigation Department & Chair of Privacy and Data Security, McLane Middleton

In his 18 years as a lawyer, Cameron has managed, litigated and resolved numerous commercial matters involving business, technology, and employment issues in New Hampshire, Massachusetts, New England, and around the country. Cameron’s aptitudes with technology and commercial litigation have enabled him to develop an extensive body of knowledge and skill with electronic discovery. Data privacy is another focus of Cameron’s practice, including creating and implementing privacy policies, terms of use agreements, information use and social media policies, advising clients about workplace privacy, social media, and consumer privacy, and handling data privacy claims asserted against companies. 

 

Larry Cushing, Vice President of Sales Engineering, DSCI

Larry has been designing and supporting computing infrastructure for over 20 years. He has been certified with Microsoft since 1996, starting with Windows NT 4.0. His resume includes management and engineering roles with international and domestic Fortune 500 companies. His experience incorporates long-term technology planning and budgeting for clients of all sizes.

Sponsors

Bronze Sponsor
DSCI


General Sponsor
IT Secure

 

General Sponsor
IT Secure

 

Become a sponsor

Sponsorship opportunities are available. Please contact Kim Lencki for more information or click here.


Edit ModuleEdit ModuleShow Tags
Edit ModuleShow Tags
Edit Module
Edit ModuleShow Tags
Edit ModuleShow Tags
Edit ModuleShow Tags
Edit ModuleShow Tags