http://twitter.com/MassTLC/status/524907269583294464
— MassTLC (@MassTLC)Wed, Oct 22 2014 12:57:00http://twitter.com/ARS_technology/status/524913120767385600
— Chris Valliere (@ARS_technology)Wed, Oct 22 2014 13:20:15- Secretary Bialecki @MassEOHED kicks things off @MassTLC security conference #mtlcsecurity pic.twitter.com/ViVedtuf0l
http://twitter.com/ClareMadden81/status/524913869836533760
— Clare Madden (@ClareMadden81)Wed, Oct 22 2014 13:23:13 - Secretary of housing & economic development kicking things off... #MTLCsecurity pic.twitter.com/pMIWwgCpEg
http://twitter.com/RachelEvelyn/status/524913968557879296
— Rachel Round (@RachelEvelyn)Wed, Oct 22 2014 13:23:37 - Keynote panel G.Beuchelt, M.Howell, & K.Swindon discuss the state of cybersecurity & info sharing orgs #MTLCsecurity pic.twitter.com/9pYdSirY1v
http://twitter.com/MassTLC/status/524918097388765187
— MassTLC (@MassTLC)Wed, Oct 22 2014 13:40:01 - #mtlcsecurity too many standards, too much complexity for efficient information sharing. trust model needed.
http://twitter.com/spinzo/status/524918137939316736
— Mike Spinney (@spinzo)Wed, Oct 22 2014 13:40:11 - Listening to the FBI and fed govt talk about cyber threats #mtlcsecurity .@MassTLC Who is safe and for how long?
http://twitter.com/clholbrook17/status/524918167681105920
— Craig Holbrook (@clholbrook17)Wed, Oct 22 2014 13:40:18 - Target breach taught us that information assets are as valuable as physical and capital assets.Not just CIOs issue anymore #mtlcsecurity
http://twitter.com/FluxPM/status/524920506727026689
— Jim Lundy (@FluxPM)Wed, Oct 22 2014 13:49:36 - #MTLCsecurity adversary has unlimited time, unlimited resources and motivation to conduct their cyber espionage programs.
http://twitter.com/spinzo/status/524920766471872512
— Mike Spinney (@spinzo)Wed, Oct 22 2014 13:50:37 - Big thank you to today's platinum sponsor and year round global sponsor @Oracle! #MTLCsecurity
http://twitter.com/MassTLC/status/524967812218257408
— MassTLC (@MassTLC)Wed, Oct 22 2014 16:57:34 - @PartnersNews @WeldPond @DeloitteUS in panel on "who owns security?" #mtlcsecurity pic.twitter.com/WnmopLlu6f
http://twitter.com/beuchelt/status/524928484234522624
— Gerald Beuchelt (@beuchelt)Wed, Oct 22 2014 14:21:18 - Advice: "Take care of your stuff & really participate in development of ecosystem, standards, and actual sharing of info" #MTLCSecurity
http://twitter.com/SecureGirl/status/524927440851054592
— Debbie Umbach (@SecureGirl)Wed, Oct 22 2014 14:17:09 - Human factor, cost, and no return are significant reasons why security programs fail #MTLCSecurity
http://twitter.com/jeffreymcmullin/status/524927553010946048
— Jeff McMullin (@jeffreymcmullin)Wed, Oct 22 2014 14:17:35 - More advice: "You should be reaching out to local reps/agents/companies and establish contacts, prior to an incident." #MTLCSecurity
http://twitter.com/SecureGirl/status/524927688570863617
— Debbie Umbach (@SecureGirl)Wed, Oct 22 2014 14:18:08 - Awareness, vigilance & measurement are the 3 keys to a good security system. @MassTLC #mtlcsecurity
http://twitter.com/LoganGoulett/status/524927793940168705
— Logan Goulett (@LoganGoulett)Wed, Oct 22 2014 14:18:33 - Target breach expanded awareness and responsibility for security to board and other executive levels #mtlcsecurity
http://twitter.com/margot_masstlc/status/524928575531929601
— Margot Rodger (@margot_masstlc)Wed, Oct 22 2014 14:21:39 - Lack of process + not enforcing consequences = security risk @MassTLC #mtlcsecurity
http://twitter.com/leahmagee/status/524929149069455360
— Leah Magee (@leahmagee)Wed, Oct 22 2014 14:23:56 - Relevant metrics are critical to executive buy in for security #mtlcsecurity
http://twitter.com/jeffreymcmullin/status/524929268107972608
— Jeff McMullin (@jeffreymcmullin)Wed, Oct 22 2014 14:24:24 - ROI is hard to show for the cost of security.@MassTLC #mtlcsecurity
http://twitter.com/leahmagee/status/524930208835842048
— Leah Magee (@leahmagee)Wed, Oct 22 2014 14:28:09 - Having skilled security professionals is a significant gap in the security industry #mtlcsecurity
http://twitter.com/jeffreymcmullin/status/524930717038690306
— Jeff McMullin (@jeffreymcmullin)Wed, Oct 22 2014 14:30:10 - Take threat based approach and apply r/y/g status to sensitive data. Dashboards are a good way to communicate with the Board. #MTLCSecurity
http://twitter.com/SecureGirl/status/524932208021491712
— Debbie Umbach (@SecureGirl)Wed, Oct 22 2014 14:36:05 - #mtlcsecurity missed incentive. Force dirs & above to store their & families personal data in same database as customers. Make ROI personal.
http://twitter.com/Skeptic_Scott/status/524932914111594496
— Scott Romanowski (@Skeptic_Scott)Wed, Oct 22 2014 14:38:54 - Really liked Chris W from Veracode discussion on ID the "Crown Jewels" of info and see where they move in the org #mtlcsecurity
http://twitter.com/jeandonnelly12/status/524935322304794624
— jean donnelly (@jeandonnelly12)Wed, Oct 22 2014 14:48:28 - Looking forward to a spot on the panel "Security in the Cloud" at #mtlcsecurity at 2:20. Hope to see some friends and colleagues there!
http://twitter.com/jajoneill/status/524942238997295105
— Jim ONeill (@jajoneill)Wed, Oct 22 2014 15:15:57 http://twitter.com/MassTLC/status/524945400164544512
— MassTLC (@MassTLC)Wed, Oct 22 2014 15:28:31
