Please enable Javascript to experience full features of this website.
fullimage

2015 Agenda

 

VIP Reception - Monday, October 19, 2015

5:30 - 6:15 pm Check In and Networking
6:15 - 6:20 pm Welcome
6:20 - 6:25 pm Keynote Introduction
6:25 - 6:45 pm Keynote Speaker
6:45 - 7:00 pm Q & A
7:05 - 7:30 pm Networking

Tuesday, October 20, 2015

7:00 am Check-in Begins + Networking Breakfast
8:00 – 8:15 am Welcome + Year in Review
8:15 – 8:25 am Setting the Stage
8:25 – 8:45 am The New Executive Order: The Impact on Public and Private Sectors

The New Executive Cyber Security Order – What it means and the Impact Across both Public and Private Sectors.

Chris Buse, CISA, CISSP, Assistant Commissioner and Chief Information Security Officer, MN.IT; MS-ISAC Executive Committee Member

 

8:45 – 8:55 am Opening Comments from Title Sponsor
8:55 – 9:40 am Keynote
9:45 – 10:30 am Break in Exhibit Area
10:30 – 11:45 pm Panel Discussion - Cyber Security vs Cyber Warfare

Getting people’s heads around the difference between the two. This is not as much a security issue as it is a warfare issue. How does the Department of Defense interact in this spectrum of response options – talk about where the threats lie from a state perspective. From a state perspective and how corporations are changing their approach using cyber-hunters.

11:45am – 12:30 pm Lunch in Exhibit Hall + Atrium
12:30 - 1:15 pm Keynote
1:15 - 2:30 pm Panel Discussion - Team-Based Cyber Risk Management Programs

Chinese hackers. Organized crime syndicates. Malicious insiders. The NSA. There is no shortage of cyber threats keeping those responsible for safeguarding valuable business and personal data awake at night. To combat these issues, today’s best practices bring together information security, legal and communications functions to work jointly on risk management. Corporate Chief Legal and Information Officers are each responsible for various aspects of data privacy, breach response, information security and all associated policies and must work closely to develop a holistic plan with those responsible for communications.

This has altered the already challenging information governance landscape. It has been a challenge to bring all sides together to develop a joint management structure and plan to effectively manage critical risks. Close collaboration between CIOs and CLOs is vital to building a defense against cyber threats and forming an accurate picture of a company’s true risk profile.

The expert panel will discuss how IT, legal and communications departments can work together to effectively minimize an organization's exposure to cyber-based threats, and how proper planning can help mitigate any damages or loss from such an incident. The panelists will explore a best practices approach to define an organization’s unique risk profile, identify real cyber risk, design a cost-effective holistic security program and, most importantly, be prepared for the inevitable data compromise incident when it occurs.

2:30 - 3:00 pm Break with dessert in Exhibit Area
3:00 - 3:20 pm Keynote - Cyber Response Strategies
3:20 - 4:00 pm Keynote - Critical Security Controls to reduce Cyber Risk

Security controls are essential for reducing cyber threats yet seem daunting and time consuming to implement. Leading threat research highlights how cyber hygiene through security controls could significantly reduce cyber threats. SANS Critical Security Controls (CSC) has emerged as a risk based list of security controls to mitigate the most common and damaging threats with a cost effective and consistent set of prioritized controls. This presentation evaluates threat report trends that emphasize the need for cyber hygiene, and reviews the CSCs top 20 security controls to reduce cyber risk and increase an organization's operational resilience. Use information to maximize communication efforts to business managers to explain the importance and benefit of implementing security controls.

Col. Stefanie Horvath, MSS, Colonel, MN Army National Guard

4:00 - 5:30 pm Networking Reception in Exhibit Area
5:00 - 6:00 pm Hands-on Tool Workshop available to Full Summit attendees

Wednesday, October 21, 2015

7:45 – 8:45 am CEO Breakfast - Invitation Only
8:00 – 9:00 am Check-in + Light Networking Breakfast
9:00 – 9:30 am Welcome + Scholarship Presentation
9:30 – 10:20 am Keynote
10:20 – 11:00 am Networking Break in Exhibit Area
11:00 am– 12:15 pm

Panel Discussion - Cyber Intelligence Sharing – Has the Time Finally Come for Real Collaboration?

This spring President Obama issued an Executive Order to foster better cyber intelligence sharing in the United States. In this session, participants will learn how the new order is transforming our nation’s information sharing ecosystem. They also will garner insight into the impact that this order will have on existing sector-based Information Sharing and Analysis Centers (ISACs).

 

Moderator:

Chris Buse, CISA, CISSP, Assistant Commissioner and Chief Information Security Officer, State of Minnesota; MS-ISAC Executive Committee Member

12:15 – 1:30 pm Networking Lunch
1:30 – 2:45 pm Panel Discussion- Retail and Health Insurance: The Liability Discussion
2:45 - 3:15 pm Break + Dessert in the Exhibit Hall
3:15 - 4:20 pm Keynote
4:20 - 5:00 pm Closing Summit Remarks