In October 2021, (ISC)2 released its “In Their Own Words: Women and People of Color Detail Experiences Working in Cybersecurity” report which outlines many of the contributing factors behind why diversity in all its forms (gender, age, ethnicity, skill set, etc.) is a rarity in the cybersecurity industry and has been for decades.
We know that the current cybersecurity workforce gap stands at more than 3.1 million trained professionals worldwide, according to the 2020 (ISC)² Cybersecurity Workforce Study. While the number of professionals in the industry grew by more than 700,000 in 2020, women and people of colour continue to be grossly underrepresented. So, how do we tackle this global and hard pressing issue that is directly tied to a more safe and secure cyber world?
In the UK, the new national cyber strategy has outlined and encouraged a ‘whole-of-society approach to building cyber resilience.’ It will take the whole of government, private industry, academia and NGOs—the entire diverse ecosystem—to partner together to strengthen our cybersecurity, which is directly tied to increasing diversity within the cyber profession.
In this session, you’ll hear from leading cyber experts as they discuss what this diverse ecosystem means, who must be involved in this ‘all-hands-on-deck’ inclusion effort, and how we must build diversity, equity and inclusion efforts into new and deeper partnerships to not only ensure a more inclusive cyber profession, but a safer cyber world.
As crowdsourced security approaches its 10 year anniversary we look at how it's changed the pentesting landscape to date. We'll cover pros and cons of crowdsourced security compared to traditional pentesting and where it can be best leveraged within your business (if at all). The recent weaponization of crowdsourced security in the Ukraine conflict will also be examined as an example of how crowdsourced security can go wrong and the collateral damage this can cause to innocent bystanders.Learning Objectives:
With ransomware on the rise, understanding how a ransomware attack actually operates is key to preparing your organization's defenses. In this session, we'll explain how a ransomware attack progresses from initial credential compromise to escalated privileges, exfiltrated data and ultimately the ransomware deployment and ransom demand. Watch a step-by-step example of how to - Effectively respond when an attack is detected; - Gather evidence to craft a contextual response that remediates the attack; - Better secure your environment against future attacks
As we wind down for the day with appetizers and drinks, join (ISC)²'s CEO Clar Rosso and CISO Jon France as they take questions from attendees on what's going on inside (ISC)², what's going on in the world of cybersecurity, industry trends and what this means (ISC)² and how it's supporting its member.