Identification: 001
Credits: None available.
Identification: SNA2201
Credits: None available.
Join security team leaders for a discussion around of the shifting role of the CISO from Technical Expert to Business Executive. In this session, you will learn from first-hand experience on how you can grow your security team into trusted business executives. Attendees from this session can expect the following actionable take-aways:
Learning Objectives:Identification: SNA2202
Credits: None available.
The cyber threat landscape is unpredictable and features security concerns that must be shared across all levels of the organization. Understanding the significance of recent events gives visibility into the shifting dynamics of adversary tactics, which is critical for staying ahead of and ultimately defeating today's threats. As security teams assess the evolving threat landscape, what changes are actually required, and what can be done about it? Join this session to learn:
Identification: SNA2203
Credits: None available.
To understand the future of privacy, we must examine the history of privacy. By exploring the interplay throughout history between emerging technologies and the human truth of privacy, this session will provide a broad view of the critical importance of the issue in society today.
Identification: SNA2204
Credits: None available.
The digital threat landscape has shifted significantly in the decade post-Stuxnet. Nicole Perlroth connects the line between that singular attack and a world that is struggling to catch up in the global cyber arms race, while outlining the responsibility security professionals at all levels share in defending it.
Identification: SNA22NS01
Credits: None available.
Identification: 002
Credits: None available.
Identification: SNAA2206
Credits: None available.
“Does my cybersecurity insurance cover intrusions related to the Russia/Ukraine war?” “What are my reporting requirements under the Strengthening American Cybersecurity Act of 2022?” “How do recent presidential executive orders impact my data protection program?” “How do I prepare for the upcoming California Privacy Rights Act?” Information security professionals are asking these and many more questions about their duties under the law. In this presentation, a cybersecurity attorney will review current hot topics in information security and data privacy law and answer your questions. At its conclusion, attendees will be able to:
· Understand the cybersecurity legal implications of “hot” and “cold” conflicts around the world
· Appreciate subtleties in complying with new and upcoming data protection laws
· Justify asking for the resources needed to meet cybersecurity legal challenges
Identification: SNA2205
Credits: None available.
Join us for an exclusive preview of the latest (ISC)2 research. Because finding experienced candidates for cybersecurity positions remains a top challenge for many organizations, (ISC)2 set out to learn how hiring managers recruit and support the career development of entry- and junior-level practitioners. Learn how hiring managers are finding talent for entry- and junior-level roles, how long and how much money it takes to train them, and what tasks you can entrust them to tackle on their own.
Learning Objectives:Identification: SNAA2207
Credits: None available.
10 years ago we developed the Orlando Doctrine, a use of force continuum for private cyber conflict. A lot has changed since we last gave an update 5 years ago. I this session, we will explore the recent developments in cyber self-defense and where the Orlando Doctrine fits in the current state of world affairs.