Concurrent Sessions (Select One)

Apr 7, 2022 11:30am ‐ Apr 7, 2022 12:20pm

Identification: 003

Concurrent Sessions (Select One)

Apr 7, 2022 1:00pm ‐ Apr 7, 2022 1:55pm

Identification: 004

Cyber Resiliency and the Power of a Diverse Ecosystem

Apr 7, 2022 1:00pm ‐ Apr 7, 2022 1:55pm

Identification: SL2209

In October 2021, (ISC)2 released its “In Their Own Words: Women and People of Color Detail Experiences Working in Cybersecurity” report which outlines many of the contributing factors behind why diversity in all its forms (gender, age, ethnicity, skill set, etc.) is a rarity in the cybersecurity industry and has been for decades.

We know that the current cybersecurity workforce gap stands at more than 3.1 million trained professionals worldwide, according to the 2020 (ISC)² Cybersecurity Workforce Study. While the number of professionals in the industry grew by more than 700,000 in 2020, women and people of colour continue to be grossly underrepresented. So, how do we tackle this global and hard pressing issue that is directly tied to a more safe and secure cyber world?

In the UK, the new national cyber strategy has outlined and encouraged a ‘whole-of-society approach to building cyber resilience.’ It will take the whole of government, private industry, academia and NGOs—the entire diverse ecosystem—to partner together to strengthen our cybersecurity, which is directly tied to increasing diversity within the cyber profession.

In this session, you’ll hear from leading cyber experts as they discuss what this diverse ecosystem means, who must be involved in this ‘all-hands-on-deck’ inclusion effort, and how we must build diversity, equity and inclusion efforts into new and deeper partnerships to not only ensure a more inclusive cyber profession, but a safer cyber world.

Learning Objective:
  • Understand the UK's priorities to build a diverse and inclusive cyber workforce. Learn from best practices and case studies from different players in the cyber ecosystem.


Crowdsourced Security - For better or for worse

Apr 7, 2022 1:00pm ‐ Apr 7, 2022 1:55pm

Identification: SL2210

As crowdsourced security approaches its 10 year anniversary we look at how it's changed the pentesting landscape to date. We'll cover pros and cons of crowdsourced security compared to traditional pentesting and where it can be best leveraged within your business (if at all). The recent weaponization of crowdsourced security in the Ukraine conflict will also be examined as an example of how crowdsourced security can go wrong and the collateral damage this can cause to innocent bystanders.

Learning Objectives:
  • Understand what crowdsourced security is
  • Learn the pros and cons of crowdsourced security compared to traditional pentesting
  • Appreciate how crowdsourced security can go wrong if used incorrectly


Ransomware Incident Response Plan: How to Prepare. How to Respond. - A Real World Example

Apr 7, 2022 2:05pm ‐ Apr 7, 2022 3:00pm

Identification: SL2212

With ransomware on the rise, understanding how a ransomware attack actually operates is key to preparing your organization's defenses. In this session, we'll explain how a ransomware attack progresses from initial credential compromise to escalated privileges, exfiltrated data and ultimately the ransomware deployment and ransom demand. Watch a step-by-step example of how to - Effectively respond when an attack is detected; - Gather evidence to craft a contextual response that remediates the attack; - Better secure your environment against future attacks


(ISC)² Insights

Apr 7, 2022 3:30pm ‐ Apr 7, 2022 4:30pm

Identification: SL2213

As we wind down for the day with appetizers and drinks, join (ISC)²'s CEO Clar Rosso and CISO Jon France as they take questions from attendees on what's going on inside (ISC)², what's going on in the world of cybersecurity, industry trends and what this means (ISC)² and how it's supporting its member.