Preliminary Schedule Subject to Change
Join Suneeta Hazra, Chief of the Criminal Division and Judy Smith, Chief of the Cybercrime and National Security Section of the Colorado U.S. Attorney’s Office, as they discuss cybercrime trends and developments. They will discuss the cyber threat landscape nationally as well as locally, including cyber threats that you may not know about that impact your daily routines. They will also share the motivation behind the creation of the office’s Cybercrime and National Security Section and provide insight into how the U.S. Attorney’s Office can assist private and government partners.
Join our panel of cyber-physical technology experts as they analyze how the internet of things (IoT), blockchain, mesh networks and other “smart” technologies promise to disrupt the security of cyber-physical systems. Learn how the physical security industry can and should prepare to incorporate these technologies securely within their product offerings.
What does it mean for a vendor/manufacturer to be a good cyber partner? Listen to leaders from security-industry vendors discuss what they feel is critical to the cyber success of the security integrator and the end-user client. Learn what they are doing to make themselves and their products cyber hardened to provide you viable options for your business.
Findings from the industry’s first detailed physical security threat model have revealed that the security industry is at a crucial crossroads. With end-users building and deploying their own security solutions to circumvent the shortfalls of traditional industry solutions, the industry urgently needs take a collective action regarding cybersecurity. Explore what gaps exist on the road toward cyber maturity and what specific practices the industry will need to adopt to preserve the confidence of their customers and partners.
Regardless of whether you are a multinational company or a small business, today’s global business environment involves vast, interconnected networks – with critical business information being shared across companies and geographies. How can your company ensure it is effectively protecting your own confidential information and that of customers and other stakeholders? How do you know if your suppliers and third parties have the business processes and protections in place for strong cybersecurity? This session provides practical ways to navigate the risks, regulations and guidance for protecting confidential corporate information and addressing cyber risk management.
As physical security sprints faster and faster toward becoming indistinguishable from the larger internet of things (IoT), it is important to recognize how traditional physical security will interact securely as part of a system of smart application domains such as smart buildings, smart cities and smart grids. The forthcoming NIST Cyber-Physical Systems Framework, scheduled for release in May 2018, further expands upon the current NIST Cybersecurity Framework to focus on the nexus of the cyber and physical worlds. Get a first look at the revised framework and the tools needed to apply it to projects.
What do CISOs look for when selecting solution partners for their business? How can the physical security industry meet the cybersecurity requirements of organizations that cannot afford to be impacted by cyber threats? Find out what it takes to properly assess the cyber risk of third-party vendors and what some of the best strategies and practices are that CISOs should employ to make the process as mature and efficient as possible.
Explore how industry standards can be a part of an organization’s cybersecurity strategy to assess software vulnerabilities and weaknesses, minimize exploitation, address known malware, review security controls and increase security awareness. Find out what work has been done and what’s on the horizon when it comes to advancing a standards-based approach for testable cybersecurity criteria for network-connectable products and systems.
Whether you call them “white hat” or “ethical”, hackers are providing value to organizations by improving the cyber resiliency of connected products and services. Learn what terms like red-teaming and penetration testing mean, and how the security industry can benefit from them and other initiating programs offering bounties to hack their systems before malicious actors do.