Concurrent Sessions (Select One)

Jun 15, 2022 12:50pm ‐ Jun 15, 2022 1:50pm

Identification: 003

Credits: None available.


Attack Tree-based Threat Modeling - Assessing & Mitigating Risk in an Objective Way

Jun 15, 2022 12:50pm ‐ Jun 15, 2022 1:50pm

Identification: SNAA2208

Credits: None available.

Most cybersecurity technologies deal with the past (logs, forensics) or the present (network monitoring, intrusion detection, anti-virus). Although necessary, these approaches are inherently reactive. Attack tree-based threat risk analysis deals with the future. Customers working in critical defense and aerospace applications have long used attack tree analysis to ensure that their systems' architectures will withstand both present day and future attacks. In the attack tree analysis process, the analyst builds a graphical, mathematical model of the system they wish to protect, and descriptions of the system's adversaries. Analysis reveals the attacks the adversaries are most likely to use and the best countermeasures. It is especially applicable to industrial control system (ICS) security and an ICS example will be presented.

Learning Objectives:
  • Attendees will learn how attack tree models can help them identify and prioritize the controls that will be most beneficial for their systems.
  • Discover how attack tree models can predict how their system is most likely to be attacked.

Networking & Exhibit Hall Break

Jun 15, 2022 1:50pm ‐ Jun 15, 2022 2:20pm

Identification: SNA22NS02

Credits: None available.


Concurrent Sessions (Select One)

Jun 15, 2022 2:20pm ‐ Jun 15, 2022 3:20pm

Identification: 004

Credits: None available.


Security Strategy as a Driver for Awareness & Training

Jun 15, 2022 2:20pm ‐ Jun 15, 2022 3:20pm

Identification: SNAA2209

Credits: None available.

This session will discuss Security Office services and roadmaps as inputs to strategically targeting Security Awareness and Training (A&T) activities. The overall A&T goal is intentionally designed to drive enterprise security culture shift and maximize training effort rather than focus on a security compliance framework. We'll highlight initiatives – SimPhishing program, Ambassador program, Security Academy, Self-service security portal, topical videos, etc. - that are used to achieve this goal, with examples of metrics of success

Learning Objectives:
  • Develop security team roadmaps with strategic intent to drive business deliverables and show ROI
  • Select security awareness activities that align with identified risk areas and security culture objectives
  • Establish and evaluate metrics of security awareness activities

Fireside Chat: The Power of Diverse Voices in Cyber

Jun 15, 2022 2:20pm ‐ Jun 15, 2022 3:20pm

Identification: SNAA2210

Credits: None available.

Statistics show that an increase diversity and inclusion within cyber is imperative to securing diverse communities across the globe. Yet, how does that diversity truly impact and create a more sustainable cyber profession? In this fireside chat, we’ll discover how elevating and creating space for more diverse voices leads to that sustainability. We’ll talk with Anthony Hannon, CISSP, CISM—a leading voice in DEI in cyber—and discuss his journey in the profession and how he has navigated his own sense of belonging in cyber.


Concurrent Sessions (Select One)

Jun 15, 2022 3:30pm ‐ Jun 15, 2022 4:30pm

Identification: 005

Credits: None available.


Data Governance: Mapping Your Way To Success

Jun 15, 2022 3:30pm ‐ Jun 15, 2022 4:30pm

Identification: SNAA2211

Credits: None available.

This presentation will discuss the tug of war between data-centric regulation and risk management, and data-centered growth and opportunities. Participants will experience a unique perspective on governance and compliance that puts it in conflict with business growth and societal expectations, with an organization’s data assets at the center of the conflict. Through imagery, storytelling, and discussion, attendees will learn how to strike a balance between control and growth.

Learning Objectives:
  • Discuss the forces driving change in the data and data governance landscape.
  • Understand the current imperatives for data governance and protection.
  • Identify strategies that can drive success in a data governance process.

Decomposing What's Needed for Security Program Effectiveness

Jun 15, 2022 3:30pm ‐ Jun 15, 2022 4:30pm

Identification: SNAA2212

Credits: None available.

Cybersecurity is about determining what capabilities you have comparing to what is needed, choosing how much of the gap to close, and then accepting or transferring the residual risk. Simple. Yet apparently unattainable. Why? In this session, we will explore the challenge from an executive leadership perspective then break-out the applied fundamentals of decomposition and recomposition of a best-fit stack, how to determine if it is operating effectively, and how to preserve effectiveness based on changes in posture and the dynamic threat landscape.