Concurrent Sessions (Select One)

Jun 15, 2022 8:00am ‐ Jun 15, 2022 9:00am

Identification: 001

Credits: None available.


Infosec Leaders Need to Up Their Executive Game...Here's How - Sponsored by IANS Research

Jun 15, 2022 8:00am ‐ Jun 15, 2022 9:00am

Identification: SNA2201

Credits: None available.

Join security team leaders for a discussion around of the shifting role of the CISO from Technical Expert to Business Executive. In this session, you will learn from first-hand experience on how you can grow your security team into trusted business executives. Attendees from this session can expect the following actionable take-aways:

Learning Objectives:
  • Identify which skills differentiate strategic security leaders from technical experts
  • Understand where to focus the professional growth roadmap for the cybersecurity organization
  • Learn how can CISOs shift their leadership tactics as a business executive

Adapt and Persevere: Preparing for Next-Level Threats - Sponsored by CrowdStrike

Jun 15, 2022 8:00am ‐ Jun 15, 2022 9:00am

Identification: SNA2202

Credits: None available.

The cyber threat landscape is unpredictable and features security concerns that must be shared across all levels of the organization. Understanding the significance of recent events gives visibility into the shifting dynamics of adversary tactics, which is critical for staying ahead of and ultimately defeating today's threats. As security teams assess the evolving threat landscape, what changes are actually required, and what can be done about it? Join this session to learn: 

  • What security teams need to know - and do - in an increasingly ominous threat landscape 
  • How to implement the right combination of security tools to stop an adversary with speed
  • Effective security strategies and practical recommendations to stay ahead of next-level threats

The History and Future of Privacy

Jun 15, 2022 9:05am ‐ Jun 15, 2022 10:05am

Identification: SNA2203

Credits: None available.

To understand the future of privacy, we must examine the history of privacy. By exploring the interplay throughout history between emerging technologies and the human truth of privacy, this session will provide a broad view of the critical importance of the issue in society today.


Cybersecurity in the Post-Stuxnet Era

Jun 15, 2022 10:10am ‐ Jun 15, 2022 11:10am

Identification: SNA2204

Credits: None available.

The digital threat landscape has shifted significantly in the decade post-Stuxnet. Nicole Perlroth connects the line between that singular attack and a world that is struggling to catch up in the global cyber arms race, while outlining the responsibility security professionals at all levels share in defending it.


Networking & Exhibit Hall Break

Jun 15, 2022 11:10am ‐ Jun 15, 2022 11:40am

Identification: SNA22NS01

Credits: None available.


Concurrent Sessions (Select One)

Jun 15, 2022 11:40am ‐ Jun 15, 2022 12:40pm

Identification: 002

Credits: None available.


Hot Topics in Cybersecurity Law: Your Questions Answered

Jun 15, 2022 11:40am ‐ Jun 15, 2022 12:40pm

Identification: SNAA2206

Credits: None available.

“Does my cybersecurity insurance cover intrusions related to the Russia/Ukraine war?” “What are my reporting requirements under the Strengthening American Cybersecurity Act of 2022?” “How do recent presidential executive orders impact my data protection program?” “How do I prepare for the upcoming California Privacy Rights Act?” Information security professionals are asking these and many more questions about their duties under the law. In this presentation, a cybersecurity attorney will review current hot topics in information security and data privacy law and answer your questions. At its conclusion, attendees will be able to:
· Understand the cybersecurity legal implications of “hot” and “cold” conflicts around the world
· Appreciate subtleties in complying with new and upcoming data protection laws
· Justify asking for the resources needed to meet cybersecurity legal challenges

Learning Objectives:
  • Understand the cybersecurity legal implications of “hot” and “cold” conflicts around the world
  • Appreciate subtleties in complying with new and upcoming data protection laws
  • Justify asking for the resources needed to meet cybersecurity legal challenges

Research: Best Practices for Hiring and Developing Junior Cybersecurity Practitioners

Jun 15, 2022 11:40am ‐ Jun 15, 2022 12:40pm

Identification: SNA2205

Credits: None available.

Join us for an exclusive preview of the latest (ISC)2 research. Because finding experienced candidates for cybersecurity positions remains a top challenge for many organizations, (ISC)2 set out to learn how hiring managers recruit and support the career development of entry- and junior-level practitioners. Learn how  hiring managers are finding talent for entry- and junior-level roles, how long and how much money it takes to train them, and what tasks you can entrust them to tackle on their own.

Learning Objectives:
  • Share best practices cybersecurity hiring managers are using to recruit and develop entry- and junior-level staff
  • Explore fresh insights into how quickly entry- and junior-level staff start contributing to a security team on their own
  • Explore what tasks cybersecurity hiring managers feel are appropriate for staff at entry, junior or more experienced levels

The Orlando Doctrine Ten Years Later - The Right to Cyber Self-Defense

Jun 15, 2022 12:50pm ‐ Jun 15, 2022 1:50pm

Identification: SNAA2207

Credits: None available.

10 years ago we developed the Orlando Doctrine, a use of force continuum for private cyber conflict. A lot has changed since we last gave an update 5 years ago. I this session, we will explore the recent developments in cyber self-defense and where the Orlando Doctrine fits in the current state of world affairs.