Rob Aragao

Rob Aragao

Greater Boston
2K followers 500+ connections

Activity

Join now to see all activity

Publications

  • CISOs Say They Are Paying Close Attention to DNC Hack

    The Wall Street Journal

    CISOs say information sharing is crucial as threat of nation-state sponsored attacks increase.

    See publication
  • Opportunities and Challenges Facing CISOs - CISO Panel

    International Conference on Cyber Security

    The Internet of Things (IoT) is a network of connected devices such as wearables, vehicles, buildings, home appliances and many others. All of these items contain data that must now be protected.

    With the exponential increase in IoT comes the exponential increase in Cyber Threats. Everything from business to social interaction happens on the Internet. Cybersecurity has now become a concern for everyone including Government, Education, Health Care & Private Sector.
    There is no…

    The Internet of Things (IoT) is a network of connected devices such as wearables, vehicles, buildings, home appliances and many others. All of these items contain data that must now be protected.

    With the exponential increase in IoT comes the exponential increase in Cyber Threats. Everything from business to social interaction happens on the Internet. Cybersecurity has now become a concern for everyone including Government, Education, Health Care & Private Sector.
    There is no question that threats have increased. Cyber criminals range from Nation States to an insider. Cyber criminals are looking monetize the information they get their hands on. We face new challenges every day on how to protect ourselves and this is only the beginning. With all this, there is also the challenge and debate on the balance between security and privacy.

    Enterprises must minimize their risk by developing standards & metrics focusing on data protection while also following regulatory compliance rules. With the abundance of cyber threats and data security concerns facing enterprises in the new world of IoT, one must proceed vigilantly.

    The CISO panel will address various opportunities and challenges facing CISOs. It will also provide real life experience from cybersecurity veterans about the role of a CISO which can be challenging but rewarding. Other topics to be discussed include:

    Cyber threats that are facing organizations.Evolving threats.Firm’s exposure.Source of threats.

    Protecting your firm. Cyber strategy. Cloud strategy. Risk management strategy.

    Information sharing on Cyber threats. Education within your enterprise. Collaboration with partners outside the organization. Third party vendor exposure.

    See publication
  • Protecting the Digital Enterprise

    New York State Cyber Security Conference / Annual Symposium on Information Assurance

    For a digital enterprise to be innovative, it must first be safe. HPE Security protects eight of the world's 10 largest companies. So we know from experience that people feel empowered to take risks when they are confident that risks are being well managed overall. It's a balancing act. An innovative environment comes to life when security is built into the fabric of your organization. Pervasive and adaptable security requires deep analytics and 24/7 monitoring. It demands proactive detection…

    For a digital enterprise to be innovative, it must first be safe. HPE Security protects eight of the world's 10 largest companies. So we know from experience that people feel empowered to take risks when they are confident that risks are being well managed overall. It's a balancing act. An innovative environment comes to life when security is built into the fabric of your organization. Pervasive and adaptable security requires deep analytics and 24/7 monitoring. It demands proactive detection and fast responses to threats. Fostering a culture of continuity and compliance requires integrating powerful but agile data protection and governance measures across the whole stack--through people, processes and technology.

    See publication
  • A Vision for Cyber Security Detection Analytics

    ITPalooza CIO Council

    Many organizations are looking at using big data to detect more advanced adversaries. We are collecting more information than ever before, but what are we doing with it? In this talk, we will look at some ways you can use data science and visualization tools to get more out of the data you collect.
    Visualizations will let you see what is happening at a high level: A picture is worth a thousand log entries. There are data science techniques that other industries, such as advertising, have…

    Many organizations are looking at using big data to detect more advanced adversaries. We are collecting more information than ever before, but what are we doing with it? In this talk, we will look at some ways you can use data science and visualization tools to get more out of the data you collect.
    Visualizations will let you see what is happening at a high level: A picture is worth a thousand log entries. There are data science techniques that other industries, such as advertising, have used successfully. We can apply these techniques to find patterns of behavior that are out of the ordinary, and ultimately catch more bad guys.

    See publication
  • Why Cyber Security Research & Collaboration is so Important

    Havard IT Summit, South Florida Infraguard Conference

    This session will discuss ways to better protect, such as having a web portal for submitting vulnerabilities and tracking statuses; working with verified researchers; and forming strong partnerships with vendors to get a better vision into your security risk profile.

Projects

  • South Florida Infraguard Speaking Engagement: The Importance of Cyber Security Research & Collaboration

    Prepare and Defend: A new battleground in the 21st Century. As security threats continue to develop and new trends are exposed that threaten our private and public sector entities, it is imperative that we stay current on Threats, technology and best practices to mitigate any potential loss and disruption. Speakers will represent all sectors and locations covering the challenges of preparing and defending the 21st Century threat landscape. This program will consist of speakers and panel…

    Prepare and Defend: A new battleground in the 21st Century. As security threats continue to develop and new trends are exposed that threaten our private and public sector entities, it is imperative that we stay current on Threats, technology and best practices to mitigate any potential loss and disruption. Speakers will represent all sectors and locations covering the challenges of preparing and defending the 21st Century threat landscape. This program will consist of speakers and panel discussions, upper level FBI, DHS, TSA and Industry Experts, who will address these issues and how the private and public sectors are preparing themselves against such threats.

Languages

  • English

    -

  • Portuguese

    -

Recommendations received

More activity by Rob

View Rob’s full profile

  • See who you know in common
  • Get introduced
  • Contact Rob directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Rob Aragao

Add new skills with these courses