Cybersecurity: Crucial Collaborations

Similar documents
Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Cyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

G7 Bar Associations and Councils

Cybersecurity: Federalism as Defense-in-Depth

Cybersecurity and Commercial Aviation

Turning Risk into Advantage

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

Security Program Design:

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

CYBERSECURITY. The Intersection of Policy and Technology YOU RE HERE TO MAKE A DIFFERENCE ṢM

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION

THE POWER OF TECH-SAVVY BOARDS:

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

The University of Queensland

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Cybersecurity. Securely enabling transformation and change

MAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world

4A Healthcare Data Security & Privacy

CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust

Cyber and Supply Chain Policy Issues

Advanced Technology Academic Research Council Federal CISO Summit. Ms. Thérèse Firmin

Cyber Security: Threat and Prevention

NERC Staff Organization Chart Budget 2019

NERC Staff Organization Chart

Defensible Security DefSec 101

NERC Staff Organization Chart Budget 2019

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

RICK RAMPOLLA WHO WE ARE. ITDM Security Operations, Publix Super Markets Inc.

RCISC_11014 Prospect Brochure_V3.indd 1

Cybersecurity and Hospitals: A Board Perspective

National Cyber Security and Cyber Terrorism Summit

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017

Cyber Security in Timothy Brown Dell Fellow and CTO Dell Security

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

IT Risk Management and Cybersecurity Summit

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Cyber Security Strategy

Programme. Legal Instruments for the Internet Economy. Building Capacity and Implementing Regulation. Malta, 14 th to 19 th September, 2015

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

Cyber Security Congress 2017

Cybersecurity & Privacy Enhancements

CALIFORNIA CAREER DEVELOPMENT ASSOCIATION 2016 SOUTHERN CA REGIONAL CONFERENCE

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

CYBERSECURITY. Protecting Against the Financial, Regulatory and Reputational Impacts of Cyber Attack

HPH SCC CYBERSECURITY WORKING GROUP

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON

NERC Staff Organization Chart Budget 2018

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Adversary Playbooks. An Approach to Disrupting Malicious Actors and Activity

What It Takes to be a CISO in 2017

OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30

The public sector s cybersecurity imperative

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.

Risk Advisory Academy Training Brochure

5 th Annual Identity Management Symposium

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

Cyberbit Range. A Global Success Story by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary

MNsure Privacy Program Strategic Plan FY

Objectives and Agenda

SPECIALIST CYBER SECURITY SERVICES & CYBER VULNERABILITY HEALTH CHECK FOR SMALLER COMPANIES

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility

Cybersecurity is a Journey and Not a Destination: Developing a risk management culture in your business. Thursday, May 21, 2015

Cybersecurity and the Board of Directors

The State of Cybersecurity and Digital Trust 2016

Leading the Digital Transformation from the Centre of Government

CYBER RESILIENCE & INCIDENT RESPONSE

Angela McKay Director, Government Security Policy and Strategy Microsoft

CYBER SOLUTIONS & THREAT INTELLIGENCE

Welcome to the Second Annual Intelligence & National Security Forum

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1

Creating a Cybersecurity Culture: (ISC)2 Survey Responses

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

System Chief Business Officer - B. J. Crain The Texas A&M University System Position Description--January 13, 2010

Membership

Cybersecurity, Trade, and Economic Development

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency

The Center of Innovation: Creating an Innovation

How to Assess the Financial Impact of Cyber Risk

Bringing Cybersecurity to the Boardroom Bret Arsenault

EY Consulting. Is your strategy planning for the future or creating it? #TransformativeAge

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Evolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha

Cyber Security and Cyber Fraud

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Investigating Insider Threats

Transcription:

assazzz

Cybersecurity: Crucial Collaborations Day One Thursday, January 18, 2018 Registration and Continental Breakfast: : 8 8:30 am Opening Remarks 8:30 8:40 am 8:40 9:40 am The Next Wave:The Fully Engaged Board and the Quantification of Cybersecurity Value True organization-wide, cross-functional cybersecurity strategy requires a fully engaged board and leadership that can quantify the return on cybersecurity investments. Understand the latest developments on both fronts and how to bring them to your organization. Larry Clinton, President and Chief Executive Officer, Internet Security Alliance 9:40 10:50 am The Cross-Functional Challenge of Measuring Risk Appetite Measuring, and making decisions based on, cyber risk appetite poses unique challenges in assessing and communicating constantly-evolving threats. Gain insights on the collaborations and communications required to fully integrate cybersecurity into risk management. G. Sonny Cave, EVP, General Counsel, Chief Compliance & Ethics Officer, Chief Risk Officer and Corporate Secretary, ON Semiconductor Talvis Love, SVP ecommerce, Enterprise Architecture & Chief Information Security Officer, Cardinal Health Morning Networking Break: 10:50 11:05 am 11:05 am 12:20 pm Scenario 1: Third Party Risk and IP Under Attack In interactive role-playing exercises conducted over the two days of the conference, attendees will work through security, privacy, legal, communications, and other business decision points arising from cyber-attack scenarios, and learn from cybersecurity leaders across functions. Our first scenario explores choices around third party risk and defense of intellectual property and trade secrets. Pamela Passman, President and CEO, Center for Responsible Enterprise and Trade (CREATe.org) Craig Moss, Chief Operating Officer, Center for Responsible Enterprise and Trade (CREATe.org) 12:20 1:00 pm Insiders and Immune Systems: When Rules and Signatures Don t Work Rules and signatures struggle to keep pace with rapidly evolving cyber attacks. From insiders to sophisticated external attackers, the reality of cyber security often is that the threat is already inside. Specialists from the University of Cambridge developed a new approach to such threats, using unsupervised machine learning and probabilistic mathematics to establish an accurate understanding of normal behavior in an organization, across every network, device, and user; it spots abnormal activity as it emerges, and takes action to curb the threat. In this session, see real-world examples of unknown threats detected and contained through this technology, and explore its relevance to resource allocation and mitigation of risk. Brad Hong, Cyber Security Regional Manager, Darktrace Dan Fein, Senior Cyber Technology Lead, Darktrace Lunch: 1:00 2:00 pm 2:00 pm 2:45 pm Case Study: How Microsoft Transformed its Cyber Security Governance Explore the reasons behind, the process of, and the results emerging from Microsoft s transformation of its cyber security governance. Lisa Reshaur, Ph.D., Senior Director, Governance, Risk, Continuity and Compliance, Digital Security and Risk Engineering, Microsoft 2:45 3:30 pm The Cybersecurity-Privacy Partnership As cyberatacks lead to ever-larger breaches of private data, the missions of privacy and cybersecurity become increasingly interconnected. Yet the language, metrics and goals of each function may not always align. Explore actionable strategies for robust, effective collaborations that advance critical cybersecurity and privacy goals. Lydia Payne Johnson, Chief Privacy Officer, Freddie Mac Afternoon Networking Break: 3:30-3:45 pm 3:45 4:30 pm Transcending Silos with a Compliance Framework Learn how to use a compliance framework to break through silos around cybersecurity, privacy, and ethics and compliance, coordinating not only on response but on training and defense. Paul Flanagan, Assistant Professor, Drexel University Thomas R. Kline School of Law; Former Executive Director of Compliance and Privacy Services, Drexel University For sponsorship opportunities, please contact michael.felden@conferenceboard.org

4:30-5:15 pm Conference Board Research: Digital Transformation and Evaporating Boundaries In this interactive session, attendees will build from the Conference Board research study, Driving Digital Transformation: Why Culture and Structure Matter to explore the particular security challenges and opportunities raised by the push to facilitate open-source, boundary-defying collaborations among internal and external stakeholders. Mary Young, Principal Researcher, The Conference Board Closing Remarks: 5:15-5:25 pm Day Two Friday, January 19, 2018 Continental Breakfast: 8:00 8:30 am Opening Remarks: 8:30 8:40 am 8:40 10:00 am Scenario 2: Ransomware In our Day 2 interactive role-playing exercise, we explore who is part of the decision-making and response, before, during and after a ransomware attack. Robert Clyde, Vice Chair, Board of Directors, ISACA 10:00 10:45 am How Your Business Becomes Russia s Business: Understanding the Players, Methods and Motives behind Russian Cyberattacks Russian political cyber- and information warfare have captured the headlines, but they are one part of a larger cybercriminal enterprise against which your organization is likely to be vulnerable. Understanding their capabilities and methods provides special insights into current threats and how to defend against them. Ambassador David J. Smith, Professor of Cybersecurity Policy, Utica College Dr. Khatuna Mshvidobadze, Adjunct Professor of Cybersecurity, Utica College Morning Networking Break: 10:45-11:00 am 11:00 11:45 am The Battle for Cybersecurity Talent: Creative and Collaborative Solutions Research indicates that the challenges of recruiting cybersecurity talent are only going to intensify in the near term. Are there alternatives to fighting over a too-small talent pool? Learn of new initiatives and creative, actionable solutions to bolster your organization s cybersecurity talent. Robert Clyde, Vice Chair, Board of Directors, ISACA 11:45 12:30 pm Case Study: Public-Private Partnerships in IoT Innovation Learn how BD manages and benefits from a network of partnerships with the FDA, DHS, and the security research community in the development of innovative and secure IoT devices. Edison Alvarez, Sr. Manager, Product Security Engineering, BD Lunch: 12:30 1:30 pm 1:30 2:30 pm Strengthening Lines of Communication: Information Sharing among Business, Government, and Academia Cybersecurity leaders from the private sector, public sector, and academia discuss why and how to enhance information sharing on cyber threats. Moderator: Jason Healey, Senior Research Scholar, School for International and Public Affairs, Columbia University; Senior Fellow, Cyber Statecraft Initiative of the Atlantic Council Panelists: Anthony Ferrante, Former Director for Cyber Incident Response & Cybersecurity Policy, National Security Council D. Frank Hsu, Clavius Distinguished Professor of Science, Dept. of Computer and Information Science, Fordham University Talvis Love, SVP ecommerce, Enterprise Architecture & Chief Information Security Officer, Cardinal Health Lydia Payne Johnson, Chief Privacy Officer, Freddie Mac 2:30 3:15 pm Building a More Defensible Cyberspace: The New York Cyber Task Force Report How can cyberspace be made more defensible without sacrificing the utility, flexibility, and convenience that has made the Internet so essential? The members of the NY Cyber Task Force sought to address this question with a focus on leverage: those innovations across technology, operations, and policy which grant the greatest defender advantage at the least cost and greatest scale. The resulting report, drawing from a wide range of sectors and based on lessons from five decades of past efforts, brings new insights, particularly on the importance of operational innovations such as information sharing and organizational structures.

Learn how to take advantage of these findings in your organization. Jason Healey, Senior Research Scholar, School for International and Public Affairs, Columbia University; Senior Fellow, Cyber Statecraft Initiative of the Atlantic Council Afternoon Networking Break: 3:15 3:45 pm 3:45 4:30 pm The Human-Centric Future of Cybersecurity Learn how behavior-based security - an approach that sees the human factor as a design imperative instead of a necessary evil - is changing the future of cybersecurity. Jim Routh, Chief Security Officer, Aetna Closing Remarks: 4:30 4:45 pm For sponsorship opportunities, please contact michael.felden@conferenceboard.org

REGISTRATION INFORMATION Online Email customer.service@conferenceboard.org Phone 212.339.0345 8:30 am 5:30 pm ET, Monday Friday Seminar Pricing: Members $1,795 Non Members $1,995 Fees do not include hotel accommodations. Location The Conference Board Conference Center 845 Third Avenue (Between 51st and 52nd), 3rd Floor New York, NY 10022 Customer Service: 212.339.0345 Cancellation Policy Full refund until three weeks before the meeting. $500 administration fee up to two weeks before the meeting. No refund after two weeks before the meeting. Confirmed registrants who fail to attend and do not cancel prior to the meeting will be charged the entire registration fee. Team Discounts per Person For a team of three or more registering from the same company at the same time, take $300 off each person s registration. One discount per registration. Multiple discounts may not be combined. 2018 The Conference Board, Inc. All rights reserved. Program subject to change. January 2018