{"id":128679,"date":"2020-06-29T14:03:40","date_gmt":"2020-06-29T18:03:40","guid":{"rendered":"http:\/\/www.bu.edu\/tech\/?page_id=128679"},"modified":"2020-06-29T14:10:32","modified_gmt":"2020-06-29T18:10:32","slug":"sc2019","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/tech\/services\/security\/education\/camp\/archives\/sc2019\/","title":{"rendered":"2019"},"content":{"rendered":"<table width=\"885\">\n<tbody>\n<tr>\n<td width=\"80&quot;\">8:30<\/td>\n<td width=\"520\">On Site Registration and Check-in<\/td>\n<td width=\"1050\"><\/td>\n<\/tr>\n<tr>\n<td>9:00<\/td>\n<td>Welcome<\/td>\n<td width=\"650\"><\/td>\n<\/tr>\n<tr>\n<td>9:10<\/td>\n<td><span>Kristopher Grahame<\/span><\/td>\n<td width=\"1050\"><span>Foreign Influence Briefing<\/span><\/td>\n<\/tr>\n<tr>\n<td>10:00<\/td>\n<td>Corey Shultz<\/td>\n<td width=\"597\">NIST Framework WithinHigh Education &amp; CDC for Education<\/td>\n<\/tr>\n<tr>\n<td>10:50<\/td>\n<td>Break<\/td>\n<td width=\"597\"><\/td>\n<\/tr>\n<tr>\n<td>11:10<\/td>\n<td><span>Rob Black, CISSP<\/span><\/td>\n<td width=\"597\"><span>Quantitative Cybersecurity Risk<\/span><\/td>\n<\/tr>\n<tr>\n<td>12:00<\/td>\n<td>Lunch<\/td>\n<td width=\"597\"><\/td>\n<\/tr>\n<tr>\n<td>13:00<\/td>\n<td>Tracy Schroeder, Chief Data Officer of Boston University IS&amp;T<\/td>\n<td width=\"597\">Welcome and thank you from BU&#8217;s\u00a0Chief Data Officer for Information Services &amp; Technology<\/td>\n<\/tr>\n<tr>\n<td>13:10<\/td>\n<td><span>Tara Hughes<\/span><\/td>\n<td width=\"597\"><span>You\u2019re All a Bunch of Phonies! Imposter Syndrome and Information Security<\/span><\/td>\n<\/tr>\n<tr>\n<td>14:00<\/td>\n<td><span>Brent Hobby<\/span><\/td>\n<td width=\"597\"><span>Common Sense Need Not Apply: Scope, Compliance, and Security<\/span><\/td>\n<\/tr>\n<tr>\n<td>14:30<\/td>\n<td>Break<\/td>\n<td width=\"597\"><\/td>\n<\/tr>\n<tr>\n<td>14:50<\/td>\n<td><span>Reid Gilman<\/span><\/td>\n<td width=\"597\"><span>Attempting Not To Drown in Data: EDR Edition<\/span><\/td>\n<\/tr>\n<tr>\n<td>15:35<\/td>\n<td>Panel Discussion<\/td>\n<td width=\"597\"><span> Information Security from the Other Side of the Table<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 16px;\">16:15<\/td>\n<td style=\"font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 16px;\">Closing<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>8:30 On Site Registration and Check-in 9:00 Welcome 9:10 Kristopher Grahame Foreign Influence Briefing 10:00 Corey Shultz NIST Framework WithinHigh Education &amp; CDC for Education 10:50 Break 11:10 Rob Black, CISSP Quantitative Cybersecurity Risk 12:00 Lunch 13:00 Tracy Schroeder, Chief Data Officer of Boston University IS&amp;T Welcome and thank you from BU&#8217;s\u00a0Chief Data Officer for&#8230;<\/p>\n","protected":false},"author":4352,"featured_media":0,"parent":18974,"menu_order":8,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/128679"}],"collection":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/users\/4352"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/comments?post=128679"}],"version-history":[{"count":3,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/128679\/revisions"}],"predecessor-version":[{"id":128682,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/128679\/revisions\/128682"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/18974"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/media?parent=128679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}