Corporate EspionageFeaturedTechnical Surveillance Countermeasure Specialist

Investing in the Counterespionage Toolkit with Information Technology Experts

By September 24, 2012July 25th, 2013No Comments

Michael Guadagno and Associates to attend conference on how to thwart threats of cyber-espionage

Counterespionage TSCM Conference in New York
On October 3rd, the Michael Guadagno and Associates team travels to upstate New York’s Niagara Falls to participate in the 12th Annual Technology and Homeland Security Forum. The team prefers to think of it as adding to their counterespionage cyber-intelligence toolkit. Organizers are expecting around 400 people ranging from IT executives to law enforcement leaders concerned about cyber-security and securing their computer systems against viruses, malware, and identity thieves.

Michael Guadagno, TSCM“Cyber- security is a real threat,” said Michael Guadagno, founder and principal of Michael Guadagno & Associates. “Just take a look at the news: the biggest companies, despite having a large IT infrastructure, still find their data compromised. We all need to take the proper precautions to keep our information safe,” he said.The team provides counterespionage investigation services including electronic eavesdropping detection, bug sweeps, counterespionage consulting, counter surveillance, cyber technical surveillance countermeasures (TSCM), and TSCM surveys.Mr. Guadagno is licensed, bonded, insured, and is board certified in the electronic countermeasures profession.

Who’s who of attendees?

The Forum, sponsored by Niagara and Erie County, InfoTech Niagara and Buffalo Infragard has an impressive list of attendees. The list includes not only recognizable names in the information security business, like Symantec and 1Labs (IBM company), but police agencies ranging from the local county level to larger Police Agencies and the FBI, as well as our team of experts at Michael Guadagno & Associates.

“Continuing education is what sets our company apart,” said Guadagno. “Protecting our clients from cyber-attacks is becoming a core competency for our company, and we look forward to sharing this expertise with our clients in the future,” continued Guadagno.

KNOWLEDGE IS POWER

Educational sessions of most interest to our clients

“Embracing BYOD (Bring Your Own Device) -Driving Productivity without Sacrificing Protection”

The rise of mobile and wireless devices like smart phones and tablets means corporations, governmental agencies and healthcare systems alike, need to ensure they have the appropriate security infrastructure in place to guard against BYOD threats. We will examine ways IT security can be improved through mobile-device management (MDM), mobile- application management (MAM), and mobile-information management (MIM).

“BYOD – Bring Your Own Device (to work)”

Organizations are increasingly faced with employees wanting access to applications and the associated data through a greater variety of devices –not necessarily owned by that organization. We will discuss some of the issues and solutions associated with enabling access for these devices, maintaining/managing this myriad of end points, while maintaining security of the organization’s data and ensuring authorized end-users can use the applications.

“FBI Cyber Task”

Investigator Leonard Guagliano, of the Niagara County Office, is a member of the FBI-Buffalo Cyber Task Force. Guagliano investigates the entire spectrum of cybercrime, to include Internet fraud/Internet crimes and Internet related crimes against children.