Across our nation an array of intuitions, from global giants to small and medium sized businesses, face a wide range of potential risks including an increasing number of sophisticated cyber-attacks. In this session, the Cybersecurity and Infrastructure Security Agency’s (CISA) Executive Assistant Director for Cybersecurity, Eric Goldstein will discuss how CISA, America’s cyber defense agency, is working with the tech community, and in collaboration with industry, developers, and the international community to ensure national security considerations are prioritized throughout a product or software’s entire life cycle. By helping set standards to raise the cybersecurity baseline, ensuring that the supply chains for digital products are secure, and that manufacturers and software developers fix vulnerabilities in their products quickly, collectively we will ensure a more resilient future.
Since its inception in December 2018, the Information and Communications Technology (ICT) Supply Chain Risk Management (SCRM) Task Force has brought together public and private entities to collaborate on identifying challenges and developing actionable solutions to enhance global ICT supply chain resilience. Join members of the Task Force to get an overview of what has been achieved over the past 5 years and what the future holds. Hear about the current efforts to assist small and medium businesses address topics such as SBOM, HBOM and software assurance. Bring your questions for the panel!
During this session, we will explore the current state of CMMC (Cybersecurity Maturity Model Certification) and investigate the path forward. CMMC has been a topic of discussion for many years now, but where does the program actually stand today? With the updates, we will provide insights and predictions about the evolving landscape of rulemaking and provide steps you can take to ensure your organization is ready as soon as the rules become active. Join this session to learn what organizations will need to do to meet the CMMC requirements, what is involved in the process, and when to expect the final requirements to be in place!
In July 2023, the Biden-Harris administration unveiled the National Cyber Workforce and Education Strategy (NCWES), a comprehensive approach to addressing the critical shortage in the cybersecurity workforce. ISC2 is one of the many partners involved in this strategy, and recently provided witness testimony in a hearing before the House Homeland Security subcommittee on cybersecurity and infrastructure, to examine ways to grow the national cybersecurity pipeline. Join ISC2’s Tara Wisniewski, EVP for Advocacy, Global Markets and Member Engagement and other strategic partners as they delve into the imperative actions that need to be taken in both the public and private industry sphere, to address the cybersecurity workforce gap, and discuss the importance of a collaborative approach.
Gain insight into how the rise of innovative technologies, the introduction of big data, and the expansion of diverse teams have escalated the intricacies of cybersecurity. Learn how the power of AI can equip CIOs and CISOs to achieve more with less, by fostering synergies among people, processes, and technologies. AI can serve as a bridge connecting various facets of a cybersecurity program. These facets include governance, compliance, risk management, change management, incident management, along with SOC, dashboarding and reporting. This session aims to illuminate how AI bolsters cybersecurity programs, empowering them to address risks in real-time and prioritize security-related activities accordingly.
Implementing Zero Trust can seem daunting for most organizations but breaking down the initiative into smaller manageable portions can result in a smoother implementation. We will discuss how to start and continue your Zero Trust journey by applying practical use cases in your environment. Insights on where to start, potential dependencies to consider, identifying quick wins, and steps needed to convince the business will also be addressed. Zero Trust is not a rip and replace of our security programs today, but it is a modernization of how we do security to protect against existing and future security threats. The implementation of Zero Trust principles is not an option anymore but a requirement to address business model disruptions and future technological advances.
Compliance is an arduous manual process. The traditional approach to producing compliance artifacts and meeting regulatory requirements is time-consuming. Automating large parts of compliance can give your organization a continuous view of its risk profile and free up resources for higher-value work. A new standard, OSCAL, was created by NIST to automate compliance artifacts. In this session, security teams will learn how an innovative and technological breakthrough OSCAL standard transforms the ATO process towards a continuous compliance posture.Learning Objective:
Join ISC2 senior leadership and Board of Directors representatives as they take your questions about the future of ISC2, the cybersecurity landscape both regionally and globally, industry trends— and what it all means for the association and the ways it supports members.
Today’s rapidly changing technology and regulatory landscapes are leaving organizations struggling with the challenges associated with embracing emerging technology while identifying and managing the risks they pose. The proliferation of cloud computing is just one example in our recent past. Artificial intelligence is now challenging the way we think about cybersecurity risk amid challenging new regulatory requirements. How do you manage an evolving cybersecurity landscape while taking advantage of new technologies? Learn to keep the focus on risk management for the business as you weigh the opportunities with the risks to keep your organization compliant with new and emerging regulations while managing the risk that matters.Learning Objectives: