Connecting the Dots between Regulatory Compliance and Cybersecurity

Oct 25, 2023 11:35am ‐ Oct 25, 2023 12:30pm

Credits: None available.

Regulatory requirements are changing at a fast pace in today’s world. This session will empower InfoSec and technology risk professionals with a methodology for preparing their organizations to respond to new and enhanced cyber regulations. We’ll walk through a regulatory gap analysis methodology used at large organizations and how the process works among different organizational teams, including public policy, legal, technology and InfoSec. You’ll learn to lead and expedite regulatory gap analysis and integration with risk management methodologies.

Learning Objectives:
  • Recognize the impact of cyber regulations and changes to cybersecurity programs.
  • Apply a methodology for shifting regulatory compliance to the left in SDLC.
  • Prepare an action plan for regulatory change management process integration with cybersecurity programs using the new EU DORA regulation as a use case.

Five by Five: Cyber Leadership

Oct 25, 2023 11:35am ‐ Oct 25, 2023 12:30pm

Credits: None available.

Five presenters with five slides and five minutes will each share their ideas and insights on cybersecurity topics, focusing on cyber leadership, GRC and emerging technologies. Join us for these rapid-fire sessions and a chance to pose your questions in a moderated Q&A session. THE CRITICAL ROLE OF LEADERSHIP IN EFFECTIVE INCIDENT RESPONSE Speaker: Karen MacDougal, Information Technology Specialist, Broward County Aviation Department Cybersecurity incident response requires a coordinated effort by multiple stakeholders within an organization. This presentation will look at the leadership stakeholders who should be involved in incident response. HOW TO DEFINE AND BUILD THREAT INTELLIGENCE CAPABILITY Speaker: Claudio Cilli, Professor, University of Rome This presentation will define threat intelligence, distinguishing between threat data and how it can be processed into intelligence. UNDERSTANDING YOUR TRADE SECRETS FOR DATA BREACH AND RANSOMWARE DEFENSE Speaker: David Patariu, Attorney, Veneable Learn why trade secrets are critical to your organization and gain insights into how to protect them in data breach and ransomware scenarios. TOP 5 CISO FINDINGS OF 2022/2023 Speaker: Mark Arnold, vCISO Practice Lead, Lares Consulting This presentation looks at the top five most frequently observed CISO findings from the Lares Advisory Services Team’s tracking of emerging trends and suggests solutions to the most common challenges, including the selection of framework, threat modeling and tactical assessments. WHY EVERY COMPANY NEEDS A SECURITY EVANGELIST Speaker: Mark Sayewich, Director of Customer Security, Guidewire Software Explore the role of Customer Security Evangelists (CSEs) and take home practical steps for implementing a program. Learn how CSEs improve customer security and mitigate cyber threats.


Cyber Risk Management from a CISO’s Perspective

Oct 25, 2023 11:35am ‐ Oct 25, 2023 12:30pm

Credits: None available.

Discover how to weigh the balance between cyber risk and operational requirements. We’ll discuss how to select a security framework and develop a vulnerability management strategy tailored to your organizational needs. Learn to recognize the impact of laws and regulations on security programs, and the importance of written information security policies and procedures.
Learning Objectives:
  • Apply risk-aware decisions for a balanced cyber risk management strategy.
  • Select security frameworks that are most appropriate for organizational requirements.
  • Develop a formal written information security program and define the reality of approving security exceptions.

AI Functionality in Applications: Beware of the Risks

Oct 25, 2023 11:35am ‐ Oct 25, 2023 12:30pm

Credits: None available.

AI technology is being embedded in popular applications from Microsoft, Adobe and Google. As the content you create and store in these applications is data mined to facilitate AI-type creative support, your intellectual property may be at risk. We will examine ways to reduce that risk in this session.

Learning Objectives:
  • Call out the ways AI technology is being embedded in popular applications from Microsoft, Adobe and Google.
  • Recognize how AI leverages content you created to enhance productivity.
  • Recommend ways to reduce risks to your intellectual property from data mining by AI applications

Endpoint Security in the Age of Remote Work

Oct 25, 2023 11:35am ‐ Oct 25, 2023 12:30pm

Credits: None available.

Delve into the challenges of securing remote endpoints. This session will cover device management, secure access, data protection and employee training. By analyzing real-world case studies and best practices, you’ll gain actionable insights for protecting remote endpoints. We’ll also touch on long-term strategies and future trends in remote or hybrid work settings. Focusing on practical solutions and lessons learned, this presentation aims to equip cybersecurity professionals with the knowledge and tools necessary to safeguard their organization’s endpoints in a predominantly remote work landscape.
Learning Objectives:
  • Define the unique challenges and opportunities presented by remote work in the context of endpoint security and adapt cybersecurity strategies to address these concerns effectively.
  • Describe the essential technologies and solutions for securing remote endpoints - including device management, secure remote access, data protection and employee training - by examining real-world experiences and best practices.
  • Assess and improve an organization's endpoint security strategy, with a focus on implementing actionable steps for enhanced protection in the age of remote work.

Global Voices from N. America: On the Road Again – Mapping NIST’s Journey to Cybersecurity Framework 2.0

Oct 25, 2023 11:35am ‐ Oct 25, 2023 12:30pm

Credits: None available.

Join key influencers, policy makers and thought leaders from around the globe to hear their perspectives on regional cybersecurity issues impacting all corners of the world. Seize the opportunity to get answers to your questions from our featured guests. Hear the latest details about the road to the recently released draft NIST Cybersecurity Framework (CSF) 2.0—a document first developed in 2014 to help organizations manage their cybersecurity risk. Gain insights into some of the major changes that were unveiled in NIST’s latest draft publication, discover how to contribute feedback, and get an overview of the international impacts NIST has seen since throughout the years. Attendees will also learn about what’s next along the journey to the CSF 2.0 in the coming years—and what new stops are planned along the way.

ISC2 Quickfire Talk: ISC2 Chapters

Oct 25, 2023 12:30pm ‐ Oct 25, 2023 12:35pm

Credits: None available.

Introducing the Quickfire 5-Minute Talk – the ultimate power-packed presentation experience! Taking place at the ISC2 booth, our speakers will share information on topics such as Adaptive Learning, Member Benefits, How to get published with ISC2 and more! It's a dynamic, information-packed journey that's perfect for today's fast-paced world. Be captivated, enlightened, and motivated in just 5-minutes!

ISC2 on Point with Careers: How to Get the Penetration Testing Experience You Need

Oct 25, 2023 12:50pm ‐ Oct 25, 2023 1:35pm

Credits: None available.

In this session, you’ll hear from an experienced pentester and educator on how to get the pentesting experience recruiters are looking for and how to demonstrate and document your skills. He’ll share the proven strategies that have helped his former students, mentees and other career advice-seekers obtain a job in pentesting. You’ll learn the importance of networking, personal branding and content creation in landing your ideal job.

Learning Objectives:
  • Gain the hands-on pentesting experience required in a pentesting role.
  • Demonstrate and document your skills and experience for current and prospective employers.
  • Recognize the value of professional networking through social media, conferences and cybersecurity user groups.

ISC2 Quickfire Talk: How to Become an ISC2 Content SME

Oct 25, 2023 1:00pm ‐ Oct 25, 2023 1:05pm

Credits: None available.

Introducing the Quickfire 5-Minute Talk – the ultimate power-packed presentation experience! Taking place at the ISC2 booth, our speakers will share information on topics such as Adaptive Learning, Member Benefits, How to get published with ISC2 and more! It's a dynamic, information-packed journey that's perfect for today's fast-paced world. Be captivated, enlightened, and motivated in just 5-minutes!

ISC2 on Point with Careers: Build Cyber Confidence from the Ground Up

Oct 25, 2023 3:05pm ‐ Oct 25, 2023 4:00pm

Credits: None available.

Leadership development and growth can be a trial. Learn how to tap into experiences and apply them to new situations for a deep impact throughout your career. It may not be easy to hear that mistakes have been made, but the way we accept the truth and respond to the information can reshape the outcome. From budgeting and teambuilding to working through situations with difficult partners, get insights that keep the road ahead feeling full of new possibilities.

Learning Objectives:
  • Describe how to build cyber teams and delegate responsibility.
  • Recognize the importance of continuity for processes and roles.
  • Demonstrate objectivity when working with people who see things differently or create friction.