{"id":137716,"date":"2021-11-09T11:22:20","date_gmt":"2021-11-09T16:22:20","guid":{"rendered":"http:\/\/www.bu.edu\/tech\/?page_id=137716"},"modified":"2021-11-09T11:45:33","modified_gmt":"2021-11-09T16:45:33","slug":"2021-attendees","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/tech\/services\/security\/education\/camp\/archives\/sc-2021\/2021-attendees\/","title":{"rendered":"2021 Attendees"},"content":{"rendered":"<div class=\"container\">\n<div class=\"main-content\">\n<table>\n<tbody>\n<tr class=\"header\">\n<td>Name<\/td>\n<td>Title<\/td>\n<td>Institution<\/td>\n<\/tr>\n<tr>\n<td>douglas alves<\/td>\n<td>information security intern<\/td>\n<td>salem state<\/td>\n<\/tr>\n<tr>\n<td>Felix Arauz<\/td>\n<td>Unit Computing Manager<\/td>\n<td>Rutgers Univeristy<\/td>\n<\/tr>\n<tr>\n<td>Kae Audette<\/td>\n<td>InfoSec Ed &amp; Consulting<\/td>\n<td>Harvard University<\/td>\n<\/tr>\n<tr>\n<td>Kae Audette<\/td>\n<td>InfoSec Ed &amp; Consulting<\/td>\n<td>Harvard University<\/td>\n<\/tr>\n<tr>\n<td>Brian Baldeck<\/td>\n<td>Communication and Documentation Specialist<\/td>\n<td>Boston University<\/td>\n<\/tr>\n<tr>\n<td>John Bandy<\/td>\n<td>CISO<\/td>\n<td>Samford University<\/td>\n<\/tr>\n<tr>\n<td>Keith Barros<\/td>\n<td>Senior Director, Information Security<\/td>\n<td>Seton Hall University<\/td>\n<\/tr>\n<tr>\n<td>Joe Bazeley<\/td>\n<td>CISO<\/td>\n<td>Wesleyan University<\/td>\n<\/tr>\n<tr>\n<td>Donny Bazluke<\/td>\n<td>Network\/Security Analyst<\/td>\n<td>Vermont State Colleges<\/td>\n<\/tr>\n<tr>\n<td>Dustin Bessette<\/td>\n<td>Associate Program Chair of CIS<\/td>\n<td>Post University<\/td>\n<\/tr>\n<tr>\n<td>Ashwin Bijur<\/td>\n<td>System Administrator<\/td>\n<td>Rutgers University<\/td>\n<\/tr>\n<tr>\n<td>Dan Bilodeau<\/td>\n<td>IT Endpoint Operations<\/td>\n<td>University of Massachusetts Amherst<\/td>\n<\/tr>\n<tr>\n<td>Caroline Bodager<\/td>\n<td>Desktop Support Administrator<\/td>\n<td>Wellesley College<\/td>\n<\/tr>\n<tr>\n<td>Robert Bodley<\/td>\n<td>IT<\/td>\n<td>Brandeis University<\/td>\n<\/tr>\n<tr>\n<td>Amanda Bordenca<\/td>\n<td>Cybersecurity EDP Systems Analyst<\/td>\n<td>Middlesex Community College<\/td>\n<\/tr>\n<tr>\n<td>Rich Borroff<\/td>\n<td>DCE Assoc. Director of IT\/School Security Officer<\/td>\n<td>Harvard University, Division of Continuing Education<\/td>\n<\/tr>\n<tr>\n<td>Caitlin Bosch-Duffy<\/td>\n<td>Security Analyst<\/td>\n<td>Tufts university<\/td>\n<\/tr>\n<tr>\n<td>Eric Boughton<\/td>\n<td>Information Security Officer<\/td>\n<td>Fitchburg State University<\/td>\n<\/tr>\n<tr>\n<td>Craig Bowden<\/td>\n<td>Associate Network and Security Engineer<\/td>\n<td>Bowdoin College<\/td>\n<\/tr>\n<tr>\n<td>Jordan Bradford<\/td>\n<td>Systems Administrator<\/td>\n<td>Boston College<\/td>\n<\/tr>\n<tr>\n<td>Frances Brian<\/td>\n<td>Information Security and Compliance Analyst<\/td>\n<td>UMass Medical School<\/td>\n<\/tr>\n<tr>\n<td>Jared Buckingham<\/td>\n<td>Technology Support Specialst<\/td>\n<td>Bates College<\/td>\n<\/tr>\n<tr>\n<td>Sarunas Burdulis<\/td>\n<td>Systems Administrator<\/td>\n<td>Dartmouth College<\/td>\n<\/tr>\n<tr>\n<td>Sean Cahillane<\/td>\n<td>Security &amp; Compliance Assistant<\/td>\n<td>University of Massachusetts Amherst<\/td>\n<\/tr>\n<tr>\n<td>Patrick Cain<\/td>\n<td>Fixer of Other Peoples Bugs<\/td>\n<td>Boston College<\/td>\n<\/tr>\n<tr>\n<td>Tim Cary<\/td>\n<td>System Administrator<\/td>\n<td>Smith College<\/td>\n<\/tr>\n<tr>\n<td>Thomas Cesso<\/td>\n<td>Chief Information Security Officer<\/td>\n<td>Salem State University<\/td>\n<\/tr>\n<tr>\n<td>William Chase<\/td>\n<td>Information Security Lead<\/td>\n<td>University of Massachusetts<\/td>\n<\/tr>\n<tr>\n<td>Kelly Chiang<\/td>\n<td>IAM Analyst I<\/td>\n<td>Boston University<\/td>\n<\/tr>\n<tr>\n<td>Ben Collins<\/td>\n<td>Principal Secuirty Specialist<\/td>\n<td>University of Massacusetts Office of the President<\/td>\n<\/tr>\n<tr>\n<td>Ryan Cook<\/td>\n<td>IT Security Analyst<\/td>\n<td>MIT<\/td>\n<\/tr>\n<tr>\n<td>Steven Cooper<\/td>\n<td>Information Security Analyst II<\/td>\n<td>Southern New Hampshire University<\/td>\n<\/tr>\n<tr>\n<td>David Corbett<\/td>\n<td>BUMC InfoSec Officer<\/td>\n<td>Boston University<\/td>\n<\/tr>\n<tr>\n<td>David Crowell<\/td>\n<td>IAM Engineer<\/td>\n<td>Boston University<\/td>\n<\/tr>\n<tr>\n<td>Tien Dao<\/td>\n<td>Network Support Associate<\/td>\n<td>Harvard University<\/td>\n<\/tr>\n<tr>\n<td>Leonard David<\/td>\n<td>Netwk\/Sys Admin<\/td>\n<td>UMASS-Boston<\/td>\n<\/tr>\n<tr>\n<td>Ben DeGennaro<\/td>\n<td>Asst. Director<\/td>\n<td>Boston University<\/td>\n<\/tr>\n<tr>\n<td>Ramon Delacruz<\/td>\n<td>IT Manager<\/td>\n<td>Harvard SPH &#8211; CBAR IT<\/td>\n<\/tr>\n<tr>\n<td>Nick DiFranco<\/td>\n<td>Security Engineer<\/td>\n<td>Salem State University<\/td>\n<\/tr>\n<tr>\n<td>Tony DiTulio<\/td>\n<td>Systems Administrator<\/td>\n<td>University of New Hampshire<\/td>\n<\/tr>\n<tr>\n<td>Mikal Doles<\/td>\n<td>Information Security Engineer<\/td>\n<td>Tufts University<\/td>\n<\/tr>\n<tr>\n<td>Regis Donovan<\/td>\n<td>Network wrangler<\/td>\n<td>Tufts University<\/td>\n<\/tr>\n<tr>\n<td>Doug Downham<\/td>\n<td>Information Security Analyst<\/td>\n<td>University of Massachusetts Amherst<\/td>\n<\/tr>\n<tr>\n<td>Gretchen Eliason<\/td>\n<td>Database Administrator<\/td>\n<td>Williams College<\/td>\n<\/tr>\n<tr>\n<td>Will Enestvedt<\/td>\n<td>Unix Team Manager<\/td>\n<td>Johnson &amp; Wales University<\/td>\n<\/tr>\n<tr>\n<td>Mike English<\/td>\n<td>Director of Network Services<\/td>\n<td>Brooks School<\/td>\n<\/tr>\n<tr>\n<td>Brian Epstein<\/td>\n<td>CISO<\/td>\n<td>Institute for Advanced Study<\/td>\n<\/tr>\n<tr>\n<td>Len Evenchik<\/td>\n<td>Professor<\/td>\n<td>Boston College<\/td>\n<\/tr>\n<tr>\n<td>Jade Fitzgerald<\/td>\n<td>Senior Security Engineer<\/td>\n<td>Brandeis University<\/td>\n<\/tr>\n<tr>\n<td>Jason Fong<\/td>\n<td>Information Security Analyst<\/td>\n<td>Tufts University<\/td>\n<\/tr>\n<tr>\n<td>Mitchell Forbes<\/td>\n<td>Intern Cyber Security<\/td>\n<td>MWRA<\/td>\n<\/tr>\n<tr>\n<td>Warren Frame<\/td>\n<td>Lead Systems Engineer<\/td>\n<td>Harvard University<\/td>\n<\/tr>\n<tr>\n<td>Lora Fulton<\/td>\n<td>Manager, Security Operations<\/td>\n<td>Boston University<\/td>\n<\/tr>\n<tr>\n<td>sainath reddy Gaddam<\/td>\n<td>DevOps Engineer<\/td>\n<td>HBS Online<\/td>\n<\/tr>\n<tr>\n<td>Daniel Galvin<\/td>\n<td>Principal Security Specialist<\/td>\n<td>University of Massachusetts President&#8217;s Office<\/td>\n<\/tr>\n<tr>\n<td>Ray Gandy<\/td>\n<td>Chief Information Security Officer<\/td>\n<td>Bryant University<\/td>\n<\/tr>\n<tr>\n<td>Rick Gansler<\/td>\n<td>Solutions Architect<\/td>\n<td>Worcester Polytechnic Institute<\/td>\n<\/tr>\n<tr>\n<td>Stephen Gaughan<\/td>\n<td>Research Informatics Specialist<\/td>\n<td>Dartmouth College<\/td>\n<\/tr>\n<tr>\n<td>Tom Gillon<\/td>\n<td>Director, Network and User Services &amp; CISO<\/td>\n<td>County College of Morris<\/td>\n<\/tr>\n<tr>\n<td>Will Glesnes<\/td>\n<td>Network\/Security Engineer<\/td>\n<td>MIT Media Lab<\/td>\n<\/tr>\n<tr>\n<td>Gregory Godino<\/td>\n<td>Information Security Analyst<\/td>\n<td>Brown University<\/td>\n<\/tr>\n<tr>\n<td>James Goebel<\/td>\n<td>Research Computing Manager<\/td>\n<td>Boston University, College of Engineering<\/td>\n<\/tr>\n<tr>\n<td>Daniel Gomes<\/td>\n<td>Director, Data Center<\/td>\n<td>Salem State University<\/td>\n<\/tr>\n<tr>\n<td>Joshua Gomez<\/td>\n<td>Security Operations Manager<\/td>\n<td>Southern New Hampshire University<\/td>\n<\/tr>\n<tr>\n<td>sandhya Gopavarapu<\/td>\n<td>DevOps Engineer<\/td>\n<td>Harvard Business School Online<\/td>\n<\/tr>\n<tr>\n<td>Greg Gorman<\/td>\n<td>Sr. Physical Security Prog. Mgr.<\/td>\n<td>Harvard University<\/td>\n<\/tr>\n<tr>\n<td>Brandi Groft<\/td>\n<td>Sr. Systems Administrator<\/td>\n<td>Whitehead Institute for Biomedical Research<\/td>\n<\/tr>\n<tr>\n<td>Timothy Gwynne<\/td>\n<td>Information Security Engineer<\/td>\n<td>Tufts University<\/td>\n<\/tr>\n<tr>\n<td>Vicki Hall<\/td>\n<td>Network Solutions Director<\/td>\n<td>HArvard University<\/td>\n<\/tr>\n<tr>\n<td>Nathan Hall<\/td>\n<td>Interim Chief Information Security and Data Privacy Officer<\/td>\n<td>Harvard University<\/td>\n<\/tr>\n<tr>\n<td>Nick Hannon<\/td>\n<td>Sr Infosec Architect<\/td>\n<td>Swarthmore College<\/td>\n<\/tr>\n<tr>\n<td>Christopher Hartley<\/td>\n<td>Lead Security Engineer<\/td>\n<td>The Ohio State University<\/td>\n<\/tr>\n<tr>\n<td>Elizabeth Harvey-Forsythe<\/td>\n<td>Senior Systems Engineer<\/td>\n<td>MIT Media Lab<\/td>\n<\/tr>\n<tr>\n<td>Erik Hemdal<\/td>\n<td>Adjunct Instructor<\/td>\n<td>Brandeis University<\/td>\n<\/tr>\n<tr>\n<td>Maria Higuera<\/td>\n<td>Application Developer<\/td>\n<td>Wesleyan University<\/td>\n<\/tr>\n<tr>\n<td>Michael Hilborn<\/td>\n<td>Director, Platform Engineering &amp; Operations<\/td>\n<td>Harvard Business School Online<\/td>\n<\/tr>\n<tr>\n<td>Harry Hoffman<\/td>\n<td>Associate Vice President and CISO<\/td>\n<td>Northeastern University<\/td>\n<\/tr>\n<tr>\n<td>David Hoover<\/td>\n<td>Systems Administrator<\/td>\n<td>Rutgers University Libraries<\/td>\n<\/tr>\n<tr>\n<td>Matt Howe<\/td>\n<td>Systems Analyst<\/td>\n<td>Bates College<\/td>\n<\/tr>\n<tr>\n<td>Maria Huang<\/td>\n<td>Cybersecurity Engineer<\/td>\n<td>Bentley University<\/td>\n<\/tr>\n<tr>\n<td>Noah Hulbert<\/td>\n<td>Manager of IT Field Support Services<\/td>\n<td>The Harvard TH Chan School of Public Health<\/td>\n<\/tr>\n<tr>\n<td>Brian Huntley<\/td>\n<td>Director of Network Services and Information Security<\/td>\n<td>Clarkson University<\/td>\n<\/tr>\n<tr>\n<td>Anne Isakson<\/td>\n<td>Enterprise Application Administrator<\/td>\n<td>Emerson College<\/td>\n<\/tr>\n<tr>\n<td>Eric Jacobsen<\/td>\n<td>Executive Director, Information Security<\/td>\n<td>Boston University<\/td>\n<\/tr>\n<tr>\n<td>Linda Johnson<\/td>\n<td>IT Controls<\/td>\n<td>Harvard Medical School<\/td>\n<\/tr>\n<tr>\n<td>Matthew Johnson<\/td>\n<td>Sr Information Security Analyst<\/td>\n<td>Northeastern University<\/td>\n<\/tr>\n<tr>\n<td>Siobhan Kelleher<\/td>\n<td>House of BC, First of her name, Master of Sarcasm, Ruler of WAFs<\/td>\n<td>Boston College<\/td>\n<\/tr>\n<tr>\n<td>Brian Kelly<\/td>\n<td>Cybersecurity Program Director<\/td>\n<td>EDUCAUSE<\/td>\n<\/tr>\n<tr>\n<td>Mark Klitzke<\/td>\n<td>IT Support Specialist<\/td>\n<td>Mt Holyoke College<\/td>\n<\/tr>\n<tr>\n<td>Patrick Klupa<\/td>\n<td>Manager of Business Information Systems<\/td>\n<td>Whitehead Institute for Biomedical Research<\/td>\n<\/tr>\n<tr>\n<td>Beth Knauss<\/td>\n<td>Information Security Compliance Program Manager<\/td>\n<td>Tufts University<\/td>\n<\/tr>\n<tr>\n<td>Lorna Koppel<\/td>\n<td>Director Information Security<\/td>\n<td>Tufts University<\/td>\n<\/tr>\n<tr>\n<td>Lisa Lancor<\/td>\n<td>Chairperson &amp; Professor of Computer Sciencw<\/td>\n<td>Southern Connecticut State University<\/td>\n<\/tr>\n<tr>\n<td>James Lau<\/td>\n<td>Sys App Admin<\/td>\n<td>Boston University<\/td>\n<\/tr>\n<tr>\n<td>Timothy Lazarus<\/td>\n<td>Information Security Operations Engineer<\/td>\n<td>Tufts University<\/td>\n<\/tr>\n<tr>\n<td>Dennis Levine<\/td>\n<td>System Security Admin<\/td>\n<td>Emerson College<\/td>\n<\/tr>\n<tr>\n<td>Torean Lewis<\/td>\n<td>Consultant<\/td>\n<td>BU Alum<\/td>\n<\/tr>\n<tr>\n<td>Philip Lombardi<\/td>\n<td>Director of Academic Computing &amp; Media Services<\/td>\n<td>Bryant University<\/td>\n<\/tr>\n<tr>\n<td>David Ludwig<\/td>\n<td>IT Director of Applications and Infrastructure<\/td>\n<td>St Lawrence University<\/td>\n<\/tr>\n<tr>\n<td>Turlach MacDonagh<\/td>\n<td>DevOps<\/td>\n<td>Harvard Business School Online<\/td>\n<\/tr>\n<tr>\n<td>Sara Macnamara<\/td>\n<td>Information Security Operations Engineer<\/td>\n<td>Harvard Business School<\/td>\n<\/tr>\n<tr>\n<td>Josh Madeley<\/td>\n<td>Manager of Professional Services<\/td>\n<td>Mandiant<\/td>\n<\/tr>\n<tr>\n<td>Bob Mahoney<\/td>\n<td>Sr. Security Compliance Analyst<\/td>\n<td>Virtru Corp<\/td>\n<\/tr>\n<tr>\n<td>Paul Majkut<\/td>\n<td>Secured Research Infrastructure Manager &amp; Assoc. Facility Security Officer<\/td>\n<td>University of Connecticut<\/td>\n<\/tr>\n<tr>\n<td>David Mak<\/td>\n<td>Identity Services Specialist<\/td>\n<td>Northeastern University<\/td>\n<\/tr>\n<tr>\n<td>Alexan Mardigian<\/td>\n<td>Information Security Engineer<\/td>\n<td>Boston University<\/td>\n<\/tr>\n<tr>\n<td>Dave Marion<\/td>\n<td>IT Security<\/td>\n<td>BSU<\/td>\n<\/tr>\n<tr>\n<td>Emily Martins<\/td>\n<td>Information Security<\/td>\n<td>UMMS<\/td>\n<\/tr>\n<tr>\n<td>Paul Matos<\/td>\n<td>Info Tech Supp Assoc<\/td>\n<td>Harvard University Health Services<\/td>\n<\/tr>\n<tr>\n<td>Thomas McGrath<\/td>\n<td>Director<\/td>\n<td>Stonehill College<\/td>\n<\/tr>\n<tr>\n<td>Alexander Merck<\/td>\n<td>Security Architect<\/td>\n<td>Duke University<\/td>\n<\/tr>\n<tr>\n<td>Dr. Davis Mirilla<\/td>\n<td>Information Security Officer<\/td>\n<td>middlesex Community College<\/td>\n<\/tr>\n<tr>\n<td>Robert Monteith<\/td>\n<td>Auditor<\/td>\n<td>MIT<\/td>\n<\/tr>\n<tr>\n<td>Mike Murray<\/td>\n<td>Project Manager<\/td>\n<td>Boston University<\/td>\n<\/tr>\n<tr>\n<td>Jeffrey Neri<\/td>\n<td>Network Administrator<\/td>\n<td>Goodwin University<\/td>\n<\/tr>\n<tr>\n<td>Richard Normandin<\/td>\n<td>Lead Information Security Architect<\/td>\n<td>Boston University<\/td>\n<\/tr>\n<tr>\n<td>Chris North<\/td>\n<td>Director of Infrastructure<\/td>\n<td>Champlain College<\/td>\n<\/tr>\n<tr>\n<td>Tomas Nudd<\/td>\n<td>CISO<\/td>\n<td>USNH<\/td>\n<\/tr>\n<tr>\n<td>Paul Palei<\/td>\n<td>Systems Engineer<\/td>\n<td>RLE MIT<\/td>\n<\/tr>\n<tr>\n<td>Matt Pasquale<\/td>\n<td>System Administrator<\/td>\n<td>Amherst College<\/td>\n<\/tr>\n<tr>\n<td>Brian Pedranti<\/td>\n<td>Infrastructure Manager<\/td>\n<td>Harvard TH Chan School of Public Health<\/td>\n<\/tr>\n<tr>\n<td>Yoal Peguero<\/td>\n<td>Security Analyst<\/td>\n<td>Boston University<\/td>\n<\/tr>\n<tr>\n<td>Jesus Peralta<\/td>\n<td>Information Security Intern<\/td>\n<td>Harvard TH Chan School of Public Health<\/td>\n<\/tr>\n<tr>\n<td>ernie perez<\/td>\n<td>Director, EdTech<\/td>\n<td>Boston University<\/td>\n<\/tr>\n<tr>\n<td>Michael Perriello<\/td>\n<td>Help Desk Manager<\/td>\n<td>Olin College<\/td>\n<\/tr>\n<tr>\n<td>Sean Pettis<\/td>\n<td>Director of Infrastructure and Security<\/td>\n<td>Springfield Technical Community College<\/td>\n<\/tr>\n<tr>\n<td>Tylor Phan<\/td>\n<td>IAM Analyst II<\/td>\n<td>Boston University<\/td>\n<\/tr>\n<tr>\n<td>Aprillia Powers<\/td>\n<td>IT Policy and Compliance Administrator<\/td>\n<td>Harvard Medical School<\/td>\n<\/tr>\n<tr>\n<td>Tammy Pruneau<\/td>\n<td>IAM Associate Director<\/td>\n<td>Boston University<\/td>\n<\/tr>\n<tr>\n<td>chris pycko<\/td>\n<td>IT IV<\/td>\n<td>University of New Hampshire<\/td>\n<\/tr>\n<tr>\n<td>Nicole Raukohl<\/td>\n<td>Information Security Communications Specialist<\/td>\n<td>Boston University<\/td>\n<\/tr>\n<tr>\n<td>Ruth Rauluk<\/td>\n<td>Director of Risk Management<\/td>\n<td>Five Colleges Inc<\/td>\n<\/tr>\n<tr>\n<td>Lawrence Robcke<\/td>\n<td>Information Security<\/td>\n<td>Pace University<\/td>\n<\/tr>\n<tr>\n<td>Andy Ross<\/td>\n<td>Info Sec Mgr<\/td>\n<td>Harvard Chan School of Public Health<\/td>\n<\/tr>\n<tr>\n<td>Pathik Sangani<\/td>\n<td>DevOps Engineer<\/td>\n<td>Harvard Business School<\/td>\n<\/tr>\n<tr>\n<td>Brian Savage<\/td>\n<td>Enterprise Architect<\/td>\n<td>Boston College<\/td>\n<\/tr>\n<tr>\n<td>Derek Semon<\/td>\n<td>Information Security Analyst<\/td>\n<td>Pace University<\/td>\n<\/tr>\n<tr>\n<td>Helen Shen<\/td>\n<td>Software developer<\/td>\n<td>Tufts University<\/td>\n<\/tr>\n<tr>\n<td>Walt Smith<\/td>\n<td>Technology Specialist<\/td>\n<td>Hartwick College, Oneonta NY<\/td>\n<\/tr>\n<tr>\n<td>Ed Smith<\/td>\n<td>Unit Computing Manager<\/td>\n<td>Rutgers University<\/td>\n<\/tr>\n<tr>\n<td>Jason Stack<\/td>\n<td>System Administrator<\/td>\n<td>Raritan Valley Community College<\/td>\n<\/tr>\n<tr>\n<td>Paul Stauffer<\/td>\n<td>IT Manager<\/td>\n<td>Boston University Computer Science<\/td>\n<\/tr>\n<tr>\n<td>Jeff Stich<\/td>\n<td>Information Security Analyst<\/td>\n<td>Tufts University<\/td>\n<\/tr>\n<tr>\n<td>Carter Stubbs<\/td>\n<td>IT Audit Manager<\/td>\n<td>MIT<\/td>\n<\/tr>\n<tr>\n<td>Nick Talbot<\/td>\n<td>Information Security Engineer<\/td>\n<td>NYIT<\/td>\n<\/tr>\n<tr>\n<td>Paul Thompson<\/td>\n<td>doctoral dissertation chair<\/td>\n<td>Capitol Technology University<\/td>\n<\/tr>\n<tr>\n<td>Maria Toyofuku<\/td>\n<td>Dir of IT and Enterprise Initiatives<\/td>\n<td>Five College Consortium<\/td>\n<\/tr>\n<tr>\n<td>chad tracy<\/td>\n<td>Director of Information Security, Privacy and Compliance<\/td>\n<td>Bates College<\/td>\n<\/tr>\n<tr>\n<td>Minh-Hieu Tran<\/td>\n<td>Junior Information Security Analyst<\/td>\n<td>Northeastern University<\/td>\n<\/tr>\n<tr>\n<td>Majid Vahid<\/td>\n<td>IAM Architecture<\/td>\n<td>Boston Unversity<\/td>\n<\/tr>\n<tr>\n<td>James Valente<\/td>\n<td>Associate Director of Info Security<\/td>\n<td>Salem State University<\/td>\n<\/tr>\n<tr>\n<td>Cuong Vu<\/td>\n<td>Security<\/td>\n<td>Bridgewater State University<\/td>\n<\/tr>\n<tr>\n<td>Melissa Walker<\/td>\n<td>Security Engineer<\/td>\n<td>Boston University<\/td>\n<\/tr>\n<tr>\n<td>Brian Walsh<\/td>\n<td>Associate Technology Consultant<\/td>\n<td>Boston College<\/td>\n<\/tr>\n<tr>\n<td>Lucy Wang<\/td>\n<td>Head of Library Digital Services<\/td>\n<td>Bridgewater State University<\/td>\n<\/tr>\n<tr>\n<td>Rich Wenger<\/td>\n<td>Eresource Systems Mamager retired<\/td>\n<td>MIT Library<\/td>\n<\/tr>\n<tr>\n<td>Paul Wernau<\/td>\n<td>IT Security Engineer<\/td>\n<td>MIT<\/td>\n<\/tr>\n<tr>\n<td>TETYANA WHITE<\/td>\n<td>Network Engineer<\/td>\n<td>Tufts University<\/td>\n<\/tr>\n<tr>\n<td>Kendall Winters<\/td>\n<td>TSE II<\/td>\n<td>Harvard University<\/td>\n<\/tr>\n<tr>\n<td>Bob Xavier<\/td>\n<td>AVP for Systems, Networks &amp; Information Security<\/td>\n<td>Berklee College<\/td>\n<\/tr>\n<tr>\n<td>Charles Yang<\/td>\n<td>sr. security eng.<\/td>\n<td>Brandeis University<\/td>\n<\/tr>\n<tr>\n<td>Emilie Ying<\/td>\n<td>Technical Architect<\/td>\n<td>HBS<\/td>\n<\/tr>\n<tr>\n<td>Joe Zurba<\/td>\n<td>Information Security &amp; IT Compliance Officer<\/td>\n<td>Harvard Medical School<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Name Title Institution douglas alves information security intern salem state Felix Arauz Unit Computing Manager Rutgers Univeristy Kae Audette InfoSec Ed &amp; Consulting Harvard University Kae Audette InfoSec Ed &amp; Consulting Harvard University Brian Baldeck Communication and Documentation Specialist Boston University John Bandy CISO Samford University Keith Barros Senior Director, Information Security Seton Hall University&#8230;<\/p>\n","protected":false},"author":4352,"featured_media":0,"parent":135697,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/137716"}],"collection":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/users\/4352"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/comments?post=137716"}],"version-history":[{"count":1,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/137716\/revisions"}],"predecessor-version":[{"id":137719,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/137716\/revisions\/137719"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/135697"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/media?parent=137716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}