Credits: None available.
Regulatory requirements are changing at a fast pace in today’s world. This session will empower InfoSec and technology risk professionals with a methodology for preparing their organizations to respond to new and enhanced cyber regulations. We’ll walk through a regulatory gap analysis methodology used at large organizations and how the process works among different organizational teams, including public policy, legal, technology and InfoSec. You’ll learn to lead and expedite regulatory gap analysis and integration with risk management methodologies.
Credits: None available.
Five presenters with five slides and five minutes will each share their ideas and insights on cybersecurity topics, focusing on cyber leadership, GRC and emerging technologies. Join us for these rapid-fire sessions and a chance to pose your questions in a moderated Q&A session. THE CRITICAL ROLE OF LEADERSHIP IN EFFECTIVE INCIDENT RESPONSE Speaker: Karen MacDougal, Information Technology Specialist, Broward County Aviation Department Cybersecurity incident response requires a coordinated effort by multiple stakeholders within an organization. This presentation will look at the leadership stakeholders who should be involved in incident response. HOW TO DEFINE AND BUILD THREAT INTELLIGENCE CAPABILITY Speaker: Claudio Cilli, Professor, University of Rome This presentation will define threat intelligence, distinguishing between threat data and how it can be processed into intelligence. UNDERSTANDING YOUR TRADE SECRETS FOR DATA BREACH AND RANSOMWARE DEFENSE Speaker: David Patariu, Attorney, Veneable Learn why trade secrets are critical to your organization and gain insights into how to protect them in data breach and ransomware scenarios. TOP 5 CISO FINDINGS OF 2022/2023 Speaker: Mark Arnold, vCISO Practice Lead, Lares Consulting This presentation looks at the top five most frequently observed CISO findings from the Lares Advisory Services Team’s tracking of emerging trends and suggests solutions to the most common challenges, including the selection of framework, threat modeling and tactical assessments. WHY EVERY COMPANY NEEDS A SECURITY EVANGELIST Speaker: Mark Sayewich, Director of Customer Security, Guidewire Software Explore the role of Customer Security Evangelists (CSEs) and take home practical steps for implementing a program. Learn how CSEs improve customer security and mitigate cyber threats.
Credits: None available.
Credits: None available.
AI technology is being embedded in popular applications from Microsoft, Adobe and Google. As the content you create and store in these applications is data mined to facilitate AI-type creative support, your intellectual property may be at risk. We will examine ways to reduce that risk in this session.
Credits: None available.
Credits: None available.
Credits: None available.
Credits: None available.
In this session, you’ll hear from an experienced pentester and educator on how to get the pentesting experience recruiters are looking for and how to demonstrate and document your skills. He’ll share the proven strategies that have helped his former students, mentees and other career advice-seekers obtain a job in pentesting. You’ll learn the importance of networking, personal branding and content creation in landing your ideal job.
Credits: None available.
Credits: None available.
Leadership development and growth can be a trial. Learn how to tap into experiences and apply them to new situations for a deep impact throughout your career. It may not be easy to hear that mistakes have been made, but the way we accept the truth and respond to the information can reshape the outcome. From budgeting and teambuilding to working through situations with difficult partners, get insights that keep the road ahead feeling full of new possibilities.