Cyber Security Summit Blog

3.6.23 > Daniel Cunningham Corporate boards, even in technology companies (see SolarWinds), have been slow in evolving to govern the significant risks of digital business environments; often leaving cybersecurity oversight to the audit committee. Digital disruption and cybersecurity threats, however, continue to evolve rapidly. Cybercrime caused $6 trillion in damage in 2022. [1] That number is predicted to reach $8 trillion in 2023 and $10.5 trillion by 2025. [2] If cybercrime were a country, it would have the third largest economy in the world. [3] Additionally, a company's reputation can be severely damaged, resulting in a loss of customers, partners, ...
3.1.23 > Tina Meeker In recent years, the importance of diversity and inclusion in the workplace has become increasingly clear and while we’ve made progress, we still have a long way to go. Companies are recognizing that a diverse workforce can lead to greater creativity, innovation, and productivity. When it comes to cybersecurity, the need for diversity is particularly crucial. Cybersecurity threats are constantly evolving, and having a team with a variety of backgrounds and perspectives can help organizations stay ahead of these threats. Diversity is Crucial in Cybersecurity. The need for diversity in cybersecurity stems from the fact that ...
2.27.23 > Sean Costigan, PhD In the face of withering cyberattacks and increasing regulatory pressures, security cultures are coming under renewed scrutiny. Ask yourself: do people in your organization feel free to discuss or flag possible cybersecurity problems? For most, the answer is probably no. And the reason is likely because people are afraid of being wrong. People may also fear possibly losing their jobs or the organization’s time or money. Such concerns point to a serious problem: poor security culture. Culture is easy to overlook and hard to get right. While it's a snap for organizations to instill a ...
by Ben Corll, CISO Americas, Zscaler You must secure the contents of a closet. Within the closet are several boxes containing valuable company supplies. The closet door is fortified with 76 locks. It may seem like your job is done, but this task is more complex. Each lock behaves differently, and some interact with others. Some of the older locks may not function at all. Other locks were initially installed on a previous door and moved to the current one without much care. How well each lock functions on the new door is anyone’s guess. Some locks, when unlocked, will ...
by Andrew Borene, Associate Vice President for Research at National Intelligence University > Office of the Director of National Intelligence (ODNI) Stronger Together: Lessons from 21 Years of Intelligence Integration“The cyber domain is emerging as the first choice of battle space for many foreign adversaries of the United States, NATO, and other vital US security partners. These adversaries with deep pockets do not adhere to the system of laws and norms for the free world. They also target infrastructure largely owned and operated by private sector entities. The result is a need for a collaborative US and allied approach to cyberspace ...
by Judy Hatchett + Jeffrey Norem, Summit Co-Chairs Whether you are able to join us in person or virtually this year, we invite you to take a moment behind the scenes with us and share our journey of collaboratively building this year's Summit with our colleagues. What does it take to produce an international Cyber Security Summit?   First, it’s determining a theme which this year is, Eyes Wide Open, sounds like an action-packed movie starring Tom Cruise. With all the events of the last year, maybe it will be one day! What an exciting time to be a cyber security ...
Sept 14, 2022 Why CSOs and CISOs are Critical in the Boardroom And How to Accelerate Your Way to a Board Director Role. If you've ever thought, There's no place on a corporate board for someone with my background, You are wrong Yes, that is the title and here is the full thought … If you've ever thought, There's no place on a corporate board for someone with my background, You are wrong. 88% of boards view cybersecurity as a business risk, according to Gartner. Addressing cyber risk must start at the top: in the boardroom. The time is now ...
by Jeremy Treadwell, COO, Treadwell Agency Sept 14, 2022 Futurist Jeremy Treadwell joins us for Summit next month. Jeremy’s futuristic view will provide us with a forward-thinking approach to what cyber leaders are facing in these uncertain times. JEREMY’S FUTURISTIC VIEW That is usually what most cyber leaders say after falling victim to an attack. As we all know, cybercrime is on the rise, and Cybersecurity Ventures estimates the annual economic toll to be approximately $6 trillion; by 2025. Every organization has a cyber approach to ensure compliance with regulatory requirements, and most companies analyze attack vectors to strengthen critical ...
This month we are highlighting one of our premier keynote speakers, Beth Sanner. While she needs no introduction to cyber industry professionals, her name is known, we thought you might appreciate an update on what she will be sharing with us and her impressive cyber credentials. BETH’S KEYNOTE Adversaries Turning to Cyber as Weapon of ChoiceGrowing global competition and conflict, amplified by Russia’s invasion of Ukraine, are shifting the threat environment for nations and the private sector alike. Many of our adversaries are using, sponsoring, or planning to use cyber-attacks on Western companies and critical infrastructure for a variety of ...
by Tina Meeker, Sr. Director of Information Security, Sleep Number Sept 14, 2022 Next month we have a plethora of amazing cyber programming for our 12th Annual Cyber Security Summit on October 24-26 at the DoubleTree-MSP Hilton here in Minneapolis. We’ve got three days of programming, 100+ sessions and 125+ presenters including professionals from the FBI, CISA, DHS and other key private sector and industry organizations. We’re confident that we have crafted this year’s Summit with speakers and programming with all levels of cyber professionals in mind beginning with our Technical Sessions Day on Monday, October 24th. There are three ...