The InfraGard Albany Chapter is hosting an Educational Seminar covering the critical topic of Incident Response Planning and Practice. This session will be of benefit to all audiences, technical and non-technical, leadership or practitioners.
InfraGard panel on Computer Incident Response Planning. Hear how subject matter experts across the public sector, private sector and FBI prepare for, identify and contain computer intrusions every day. Listen as they discuss their top considerations when creating a solid response plan. Have an opportunity to ask for their perspective. With your attendance you’ll receive documents and an InfraGard Incident Response training certificate of attendance.
Roderick Link, Computer Scientist, FBI
Seven years experience as FBI Albany’s Computer Scientist. He has served as the division’s primary subject matter expert on digital forensics, cryptanalysis, network, memory and malware analysis.
Samantha Baltzersen, Supervisor of the Cyber Squad, FBI
Special Agent in the FBI for over 16 years. She was a certified FBI Forensic Examiner for seven years who conducted incident response and digital forensic examinations in the New York, Washington, and Portland Field Offices.
Karen Sorady, NYS Chief Information Security Officer
NYS government for more than 30 years, serving for the past 15 years in the State’s central cyber security office. Her office is charged with providing for the protection of the state government’s cyber security infrastructure.
Ed Golden, Director of Information Security Services and Chief Information Security Officer, TwinState Technologies
Retired Army Intelligence Officer and former defense contractor for Northrop Grumman Corporation. He has over 34 years of experience supporting military and Department of Defense operations. He has served as both a Project Manager and Cyber Operations Center Manager supporting US Army Cyber Command.
Rob Zeglen, Information Security Practice Leader, NYSTEC
More than 25 years of experience in IT and security. Broad range of expertise in cybersecurity and associated technologies
Who Should Attend:
Open to anyone. All audiences, technical and non-technical, leadership or practitioners are welcome.