Board Member Joins Thought Leaders From White House, NIST and FCC

BOULDER, Colo.—February 20, 2014— LogRhythm, The Security Intelligence Company, has organized a panel discussion on the role of cyber legislation in critical infrastructure protection that is part of the program at RSA Conference 2014. The panel discussion will take place in San Francisco on Thursday, February 27, at 8 a.m. pacific time at the Moscone Center.

Former Department of Defense CISO and current Cyber Security Strategies President and CEO and LogRhythm Board Member Robert Lentz will join representatives from the White House, National Institute of Standards and Technology (NIST) and the Federal Communications Commission (FCC) on the panel. They will discuss the intersection of national security and corporate responsibility, while debating the federal government’s role in mandating that enterprises comply with certain cyber defense initiatives. They will also analyze the effectiveness of current actions by the government – including President Obama’s 2013 executive order and NIST proposed controls.

What:
“Cyber Legislation: National Security & Corporate Responsibility Collide” panel discussion

When:
Thursday, February 27, 2014, 8:00 – 9:00 a.m. pacific time

Who:
Robert Lentz, former Department of Defense CISO and current Cyber Security Strategies president and CEO and LogRhythm board member Adam Sedgewick, senior advisor, Information Technology Laboratory, National Institute of Standards and Technology Clete Johnson, chief counsel for cybersecurity, Federal Communications Commission Ryan Gillis, director of legislative affairs and cybersecurity policy, National Security Council Staff at the White House Byron Acohido, Pulitzer Prize-winning security journalist (moderator)

Where:
Room 2009, Moscone Center, San Francisco

For more information about LogRhythm, or to schedule a briefing at RSA Conference 2014, please contact Lesley Sullivan at [email protected] or visit LogRhythm at booth # 1001.

About LogRhythm

LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency.

With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks. Learn more at logrhythm.com.

Comments are closed.