Watch videos and view presentation slides from the 2022 Cyber Security Summit.

VIP All Access ticket holders have VIP access to view all 2022 Summit presentations. A password is required to access the videos. Please reach out to registrations@eventshows.com if you did not receive the email containing the password.

The Technical Sessions are available to the public and do not require a password.

Public Sector Workshop

For full session details, see page 12 in the online 2022 Summit Guide.
The Public Sector presentations are 2022 VIP All-Access Pass only and require a password.

Welcome Kickoff / Operational Excellence

John Israel; Jeff Lubick

What Are The Challenges Most States and Local Government Face Today?

Joe Marshall

Enhancing Statewide Cybersecurity Programs – Building Collaboration and Support Networks

John Israel

The State of the States, Local Governments, Tribes, and Territories

Emily Sochia

States Can Save the World. The All in Approach to Cybersecurity.

Shawn Riley

Insights into Vulnerability Management

Neal Dawson; Nancy Skuta

CISA Grant Program

Chris Gabbard

Implementing Statewide Cyber Plans – State-level Perspectives

Shawn Riley

The Rear View Mirror

Chris Buse

Women in Cyber Tech Sessions

For full session details, see page 16 in the online 2022 Summit Guide.

Free access unless otherwise noted.

Welcome by WiCyS MN and Walking in Fire

Gretchen Block; Judy Hatchett

Goodbye Elevator Pitch. Hello Career Accelerator

Tissa Richards

Navigating Cyber as a Female Leader

Milinda Rambel Stone; Cindi Carter; Sarah Engstrom; Kristy Livingston; Aimee Martin

Women in Cyber Luncheon

Julie Talbot-Hubbard; Nancy Brainerd; Lucia Milică; Jannell Mohn; Beth Singer
Watch video *VIP Access (password required)

Empowering Women: A Look Into their Early/Mid Career

Lindsey Konerza; Alex Bastian; Mandie Grosskopf; Aanchal Manchanda

Being a Better Ally in the Cyber Workplace

Karl Mattson; Kumar Dasani; Shayla Treadwell; Ong Wang

Learning the Dynamics of Leadership; Mindset, Culture & Behavior

Yolanda Hunte; Stephanie Kasten; Rob Marti; Sujatha Sadasivuni

Breaking Ceilings: A Journey to the Top

Tina Meeker; Carolann Shields

Technical Sessions

For full session details, see page 18 in the online 2022 Summit Guide.

Free access.

Enhancing SecOp Practices with MITRE

Chris Boehm

Your CEO NEEDS to KNOW! Uber Breach and More! Cyber Tech translated to Business Strategy

Dan Wolfford; John Mess

How to Streamline Security Operations with Automation

Jay Spann

Navigating Enterprise Security in a Post-Compromise Reality

Kanen Clement

Critical Success Factor #1: Injecting Security into your organization’s DNA and Culture

Drew Koenig

The Role of Modern Asset Management in Cybersecurity

Lenny Zeltser

Panic Patching: Managing the Volume & Velocity of Alerts

Matt Ambroziak; Christian Trujillo

The Data-First Approach; Managing the Tension Between Security and Productivity

Stephen Frethem

Stay SaaSy my friends; Zero Trust in a Modern World

Brandon Potter

ITDR (Identity Threat Detection and Response): Making Sense of the Buzz

Brian Freedman

Breaking into Cyber: A Tale of Two Careers

Jessa Gegax; Will McCloskey

Armchair Cyberwarriors: The First 100 Days of Cybercriminal and Hacktivist Activities Related to the Russian War in Ukraine

Alexander Leslie

Not Your Average Bug Bounty: How an Email, a Shirt, and a Sticker Compromised a High Security Datacenter

Dalin McClellan

Building Your Personal Brand: Navigating A Career in Cybersecurity With Three Unique Approaches

Zinet Kemal; Lee Ann Villella; Wendy Meadley

Industrial Cyber Security Track

For full session details, see page 24 in the online 2022 Summit Guide.

The Industrial Cyber Security Track presentations are 2022 VIP All-Access Pass only and require a password.

Int’l Soc. of Automation: ISASecure Intro & Overview of ISA/IEC 62443 Solution Sets for Systems (3-1, 3-2, 3-3) and Components (4-1, 4-2)

Andre Ristaino

Idaho National Labs (INL) Overview of Cybersecurity Research, ICS COP w/focus on Cyber-CHAMP©

Shane Stailey; Glenn Merrell

Cyber Ranges – For Gaining the Valuable Experience Needed now and Henceforward

Craig Cocciola; Susan Morris

International Society of Automation (ISA) Deeper Dive: Working Group 10 Details and new Technical Report Rollout

Glenn Merrell; Shane Stailey

ABL Virtual Cyber Range Implementation Details

Susan Morris; Craig Cocciola

State of the Art IoT Cybersecurity

Joel Hollenbeck

Securing IT and OT Convergence is a Team Sport

Bryan Gillson

Dunwoody Presentation: New Cybersecurity Initiatives

E.J. Daigle; Julie McFadden

Healthcare & Med Device Seminar

For full session details, see page 26 in the online 2022 Summit Guide.

The Healthcare & Med Device presentations are 2022 VIP All-Access Pass only and require a password.

Frictionless & Secure Patient Care

Brian Kenyon

Approach to Segmenting Medical Devices

Stefan Boehme

A Single Source of Truth in Healthcare Asset Management

Derek Loomis

Medical Device Software End of Life Planning

Judd Larson

Securing and Managing Connected Healthcare From Asset Inventory and Device Utilization to Zero Trust

Ben Stock

Security Resilience Program and Medical Devices

Debra Breummer

Crowdsourced Email Defense

Tonia Dudley

Highlights from the new FDA Premarket Cybersecurity Guidance: Impacts that Medical Device Manufacturers Need to Know

Michelle Jump; Matt Hazelett

Essential Contract Provisions

Eran Kahana

Translating G-speak to C-speak

Andrew Bomett

Cybersecurity for Small Business

For full session details, see page 30 in the online 2022 Summit Guide.

The Small Business presentations are 2022 VIP All-Access Pass only and require a password.

Cyber and Small Business Opening

David Notch; Brian McDonald; Lyle Wright

CISA & DHS Resources for Small Businesses

Karissa Zamora; Chris Gabbard

Securely and Responsibly Disposing of your IT Equipment

Rebecca Duvick

What to Look for in IT and Security Service Providers

David Notch

Tuesday General Session

For session description, see page 34 in the online 2022 Summit Guide.

The General Session presentations are 2022 VIP All-Access Pass only and require a password.

Student Career Breakfast with the CISO of the State of Minnesota

John Israel

Welcome to the Twelfth Annual Cyber Security Summit > The 2022 Theme is Eyes Wide Open!

Eileen Manning; Judy Hatchett; Jeffrey Norem

Stronger Together: Lessons from 21 Years of Intelligence Integration

Andrew Borene

Adversaries Turning to Cyber as Weapon of Choice

Beth Sanner

What if The Browser Was Designed for The Enterprise?

Michael Fey

Here Be Dragons – Navigating An Ocean of Security Frameworks

Tony Sager; Thomas Sager

Learn from Cyber Industry Partners

VIP Lunch > Why CSOs and CISOs are Critical in the Boardroom / And How to Accelerate Your Way to a Board Director Role

Tissa Richards

Technology Alone Cannot Solve our Greatest Cybersecurity Challenges. How to Effectively Leverage Technology to Maximize the Value of Human Creativity, Experience, and Ingenuity

Cody Chamberlain; Cody Wass

Translating Risks to Business Terms: Conveying Complex Risk Topics in Simple Business Language

John Valente; Ivan Fong; Todd Hartman; Melissa Krasnow

Ukraine and the Three Bears (Not A Fairytale)

Mike Kearn

Adapting your Strategy to a Higher Degree of Risk Tolerance

Eli Davis

How Kindness Builds Effective Security Operations

Nathan Caldwell

Identity Governance Transformation Partnership: A Case Study with Edgile & Sleep Number

Mercy Schroeder; Devan Koss; Josh Oldham; Becky Sandberg

Executive Level Cybersecurity Report Cards

Kathy Washenberger

Visionary Leadership Awards Ceremony

Chris Buse

Cyber Warrior Tribute Program at the Visionary Leadership Awards

Domenick Allen

Wednesday General Session

For session description, see page 38 in the online 2022 Summit Guide.

The General Session presentations are 2022 VIP All-Access Pass only and require a password.

Learn about Women In Cybersecurity (WiCyS) Minnesota Chapter

Judy Hatchett; Tina Meeker; Marie Igtanloc

2022 Cyber Security Summit Intern Showcase

Jeffrey Peal; Aynura Berdyyeva; Sherwin Bothello; Joseph Mathias

Narrowing the Gap – A Unilateral Understanding of Engineering and Network Security

Joe Weiss

The Intersection of Privacy and Security: How you can use Existing Security Tools to Build an Adaptive Privacy Program

Jerrod Montoya

Cyber Risk Economics. We Can Be Better.

Jeffrey Norem; Andrew Herbert; Corey Tower

Third-Party Risk: Evolving and Tailoring your Approach to Address this top Attack Vector for your Organization

Gretchen Block

Solving the Unsolvable With Crowdsourced Security

Justin Beachler

Humans are Vital for Cybersecurity

Sean Costigan; Dinos Kerigan-Kyrou; Rois Ni Thuama

Hindsight is 20/20

Jeremy Treadwell

Authorization: The New Frontier of Identity-First Security for Data

Rich Dandliker

Ready Set RUN – the New Offense is a Collective Defense!

BG Terin Williams

Summit Wrap Up and Take Away

Judy Hatchett; Jeffrey Norem

Summit content represents the views of each individual speaker and not necessarily that of the Cyber Security Summit or the speaker’s organization.