Cyber:Secured Forum 2019 Topics
Securing Cybersecurity Talent
Finding qualified physical security talent is as difficult as ever, with many security integrators reporting finding and/or developing valuable technicians as their highest current business priority. Add to that the increasing demand for project managers and technicians that speak the language of cybersecurity, and it becomes an uphill battle on two fronts. How can security integrators upskill their workforce, augment their talent pool with cybersecurity specialists and determine when outsourcing or finding partners makes the most business sense? How much cybersecurity expertise is enough in an organization’s workforce portfolio? Leading cybersecurity certification and accreditation organizations will address these concerns.
Often, the first response to a cyber breach is finger pointing. How do manufacturers ensure that all aspects of their products, the software layer, the advanced chipsets and the cloud-based add-on services won’t end up being the reason their brand is damaged because of a vulnerability? How do security integrators assess the cyber accountability of a supplier and hold them responsible throughout the duration of a partnership? Hear from industry leaders how codification, cooperation and transparency around cybersecurity can be baked into partnerships.
Responding to a Breach
Your customer calls and says they saw on the nightly news that a component in your security solution has been compromised. What now? What steps do you take to make sure that the threat is contained? How do you launch damage control? Is there a plan that can turn this perceived threat to company reputation into an opportunity for your cybersecurity brand? Hear from experts involved in these scenarios and how they persevered through the chaos.
How Cyber-Physical Hackers Think
Hackers follow a methodology to evaluate options, plan and execute their attacks. While connected devices are still being implemented, dynamic attacks can leverage disconnected systems and processes to gain trust to other systems and processes – going from one seemingly innocuous system to a critical one they couldn’t access directly. Only focusing on hardening IP cameras, strengthening network defenses or “air-gapping” your network won’t help you from skilled attackers. Explore the world of how hackers think, the process they go through and how different elements of the attack surface affect one another.
What CISOs Want
Offices of the chief information security officer (CISO) and the chief security officer (CSO) are increasingly being intertwined in leading organizations. As security devices have become indistinguishable from commercial Internet of Things (IoT) devices and the data captured and stored are used more and more for non-security purposes, the CISO and CSO risk profiles are converging. It is now on the security solutions provider to speak the language of information security risk mitigation as new characters begin appearing in the sales pitch room. A diverse sampling of CISOs offer their thoughts on what means the most to them in a security deployment.
Technologies Empowering Cyber-Physical Convergence
Artificial intelligence, blockchain and quantum computing have all been mentioned in trade and general business press as the next big disruptor. But how quickly do implementors of security need to understand and weave these technologies in their solutions? Technology evangelists from leading technology platform organizations discuss these technologies and others including the security problems that they solve as well as the new attack surfaces and risk that they contribute.
Protecting an Organization’s IP From International Espionage
Over the past decade, hundreds of millions, if not billions, of dollars of valuable data and the future opportunity it embodies has been stolen from American industry. Despite huge investments in cybersecurity, breaches and data thefts continue to increase. How can technology and simple governance practices remove the financial motivation for breaches by rendering the ultimate targets of the attack useless, even if successfully stolen? How can security integrators make these solutions part of their product portfolio? Security researchers will discuss “deterrence by denial” and how it can protect your customer’s crown jewels.
Insuring and Protecting Yourself From Liability
How does cybersecurity insurance protect an organization from liability and damages in this climate where a breach is imminent? Moreover, what steps and monitoring activities can an organization take to protect themselves from having a devastating threat occur in the first place? Cyber-focused legal minds will walk you through cases from very well-known organizations and how they have navigated the legal landmines inherent in the cyber-physical landscape.
Securing Cloud Deployments and Their IoT Endpoints
Cloud based security solutions have resulted in efficiencies in security operations. However, deploying an application in the cloud is not without cybersecurity challenges. The National Institute of Standards and Technology framework, right-sizing your provider, active system monitoring, multi-factor authentication, updating and patching and using secure APIs are all considerations that any solution provider must give important thought to to have a secure deployment. Seasoned cloud security experts will navigate these challenges.
Identifying the Right Person to Lead Your Cybersecurity Program
How do you know that the right person is leading your cybersecurity program? Just because a person is a high-performing engineer or technical systems architect doesn’t necessarily mean they are the right person to lead your cybersecurity operations. However, with a strong plan and capable team in place, even inexperienced leaders can communicate the mission of cybersecurity across an organization. Professionals with experience building high-functioning cybersecurity teams will walk us through the pitfalls with an eye toward success stories for the industry.
Past Agenda (2018 Conference)
The complete 2019 agenda will be released soon. To help you understand the scope and depth of content presented by speakers at Cyber:Secured Forum, view the 2018 conference agenda published below.