NEACS 2016
North East Annual Cybersecurity Summit
October 7, 2016 
8:00 AM – 4:00 PM
Trumbull Marriott Merritt Parkway
180 Hawley Lane, Trumbull CT 06611

Register for NEACS 2016

NEACS
A Security Conference for Business & Security Leaders

Register for NEACS 2016
Register for NEACS 2016
The North East Annual Cybersecurity Summit (NEACS) is the premier cybersecurity resource for business executives and technology professionals. For the 4th consecutive year, NEACS (formerly the Annual CT Business Security Summit) will connect attendees with leading subject matter experts in security, privacy, and risk management. NEACS provides attendees with insights on current cybersecurity risks and threats, as well as business and technology strategies to protect against and respond to cyber-attacks, data breaches, and fraud.

This annual conference brings together the best and the brightest for three days of dialogue, networking, and cutting-edge insight. This dynamic event is carefully crafted to deepen our collective understanding of the challenges and opportunities facing boardrooms, Business Leaders, Security Leaders and technologists today and in our future. There will be high impact sessions on a broad range of topics.


About NEACS
NEACS 2016 is presented by a coalition of local chapters from renowned international associations for audit and security professionals.  The NEACS 2016 coalition comprises:
International Information System Security Certification Consortium,
Inc. (ISC)2
– Connecticut Chapter
The Institute of Internal Auditors (IIA)
Westchester/ Fairfield County Chapter
Information Systems Audit and Control Association (ISACA)
Greater Hartford and New York Metropolitan Chapters
What’s New for 2016
This year’s conference will be limited to 250 quality attendees with:
  • 2 Keynotes
  • 3 Full tracks = 12-16 sessions
  • 1 or 2 Panels
  • Networking throughout the Conference during Networking Breaks
  • 2 Workshops on topics anyone involved with security must understand – Powershell & Darknet.
                                    
                       a)     Powershell: Attackers now use built-in components of Windows that are extremely powerful but relatively obscure compared to specialized tools or malware previously used by attackers. Attackers can remain persistent in an environment and evade detection for much longer by using these advanced techniques.
                     b)    Darknet: The Darknet is an underworld stretching from popular social media sites to the most secretive corners of the encrypted web. This world frequently appears in newspaper headlines, but is little understood and rarely explored. This workshop is a revelatory examination of the Internet today and its most innovative and dangerous subcultures: trolls and pornographers, drug dealers and hackers, political extremists and computer scientists, Bitcoin programmers and self-harmers, libertarians and vigilantes.