Across our nation an array of intuitions, from global giants to small and medium sized businesses, face a wide range of potential risks including an increasing number of sophisticated cyber-attacks. In this session, the Cybersecurity and Infrastructure Security Agency’s (CISA) Executive Assistant Director for Cybersecurity, Eric Goldstein will discuss how CISA, America’s cyber defense agency, is working with the tech community, and in collaboration with industry, developers, and the international community to ensure national security considerations are prioritized throughout a product or software’s entire life cycle. By helping set standards to raise the cybersecurity baseline, ensuring that the supply chains for digital products are secure, and that manufacturers and software developers fix vulnerabilities in their products quickly, collectively we will ensure a more resilient future.
Since its inception in December 2018, the Information and Communications Technology (ICT) Supply Chain Risk Management (SCRM) Task Force has brought together public and private entities to collaborate on identifying challenges and developing actionable solutions to enhance global ICT supply chain resilience. Join members of the Task Force to get an overview of what has been achieved over the past 5 years and what the future holds. Hear about the current efforts to assist small and medium businesses address topics such as SBOM, HBOM and software assurance. Bring your questions for the panel!
Gain insight into how the rise of innovative technologies, the introduction of big data, and the expansion of diverse teams have escalated the intricacies of cybersecurity. Learn how the power of AI can equip CIOs and CISOs to achieve more with less, by fostering synergies among people, processes, and technologies. AI can serve as a bridge connecting various facets of a cybersecurity program. These facets include governance, compliance, risk management, change management, incident management, along with SOC, dashboarding and reporting. This session aims to illuminate how AI bolsters cybersecurity programs, empowering them to address risks in real-time and prioritize security-related activities accordingly.
Implementing Zero Trust can seem daunting for most organizations but breaking down the initiative into smaller manageable portions can result in a smoother implementation. We will discuss how to start and continue your Zero Trust journey by applying practical use cases in your environment. Insights on where to start, potential dependencies to consider, identifying quick wins, and steps needed to convince the business will also be addressed. Zero Trust is not a rip and replace of our security programs today, but it is a modernization of how we do security to protect against existing and future security threats. The implementation of Zero Trust principles is not an option anymore but a requirement to address business model disruptions and future technological advances.
Join (ISC2 senior leadership and Board of Directors representatives as they take your questions about the future of ISC2, the cybersecurity landscape both regionally and globally, industry trends— and what it all means for the association and the ways it supports members.