Schedule

Schedule subject to change.

Note: Meeting rooms may change, so please refer to the on-site program for final locations

1 results
Download Agenda Editable Agenda

Tuesday, March 26, 2019

  • CREF Track: Cybersecurity: Keeping up

    Location: Reunion Ballroom AB,
    Lobby Level


    Speaker(s)

    Thomas A. Dryden, Chief Information Security Officer, Berkadia

    Brian V. Cummings, Client Partner, Cyber Security Practice, Tata Consultancy Services

    Breakout Session,

    CREF Track

    Cybersecurity threats continue to evolve, as do the best practices around identification, mitigation and regulation. Come learn how cybersecurity is impacting commercial and multifamily finance and how firms are responding.

    Speaker(s)

    Thomas A. Dryden, Chief Information Security Officer, Berkadia

    Thomas Dryden is the Chief Information Security Officer for Berkadia Commercial Mortgage, a Berkshire Hathaway and Jeffries Financial Group Company. Berkadia is a leading commercial mortgage originator, consistently in the top multi-family origination rankings for Fannie Mae and Freddie Mac. Berkadia is also one of the top Master and Primary Servicer of commercial mortgages, with emphasis on GSE, Life Company, and CMBS portfolios. Mr. Dryden has over 15 years of tenure with Berkadia, holding technology leadership positions with Berkadia and its predecessor companies, including Capmark Finance and GMAC Commercial Mortgage. He attended Pennsylvania State University and has been recognized as a Certified Information Security Manager (CISM) by ISACA.

    Brian V. Cummings, Client Partner, Cyber Security Practice, Tata Consultancy Services

    Brian has been at TCS since June 2007 following 9+ years at KPMG in its Information Risk Management Practice. He is a 30+ year IT Audit, information- and cyber-security professional with know-how that spans mainframe to cloud to containerized applications. He is a Published Author who challenges conventional thinking, and a thought leader for FastPath Security Implementation; Classification-based Security Implementation; Aggressive Security Vigilance; and Enterprise "Will to Protect".

Our Sponsors

Diamond

Gold

Silver

Bronze

Host