Complimentary and open to all, each hour-long webinar examines one vexing challenge facing the cybersecurity community and offers insight, knowledge and perspective from multinational business leaders and government officials. Webinars are held virtually through Zoom the last Tuesday each month.
Webinars on Demand
Podcasts
Upcoming Webinars
SEPTEMBER 2023: An Intelligence Analyst’s Guide: How to Map Risk Areas to Intelligence Using AI
Summary:
Given the sheer amount of intelligence available now and the AI tool boom, how can cyber security teams use these innovations to their advantage? This session will cover how to translate cyber risks to key business metrics, expanding the cyber team’s capability to support board-directed initiatives. All of this from the perspective of a former U.S. government intelligence analyst.
Learning Objectives:
- Participants will better understand the types of intelligence available for security teams
- How business risks translate into cyber security requirements
- How AI can assist cyber teams reach a larger audience for their work, including key business and decision-makers
Make sure to Register for this month’s Webinar at: https://us02web.zoom.us/webinar/register/WN_jeSN4KuRSHKI5QLRKIKFfA
Moderator:
Daniel Cunningham
Manager – IT Services, Prime Therapeutics
Speaker:
Kathleen Kuczma
Senior Sales Engineer, Recorded Future
Dan Cunningham provides direction to and is responsible for coordinating resources for 3M’s incident response teams. For the MN National Guard he plans cyber engagements with the Croatian Armed Forces. Commissioned a Second Lieutenant in 2002, Lieutenant Colonel Cunningham has commanded and the company level, and was the first commander of MN’s Cyber Protection Team. He has completed deployments to Bosnia in 2003-2004 and Iraq in 2006-2007 and 2009-2010. His most significant award includes the Bronze Star Medal with a bronze oak leaf cluster.
Kathleen Kuczma (she/her) is a recovering a cappella group member and has been a Sales Engineer at Recorded Future since 2018. She was previously an Intelligence Analyst at the U.S. Department of Defense where she primarily focused on counterterrorism missions and nation-state threats. Kathleen is originally from the capital region of NY and is currently based in Michigan when she is not hopping between different AirBnBs.
Brought to you by our 2023 Cyber Security Summit Gala Sponsor:
AUGUST 2023: Be Prepared | OT Governance from Risk to Response
Summary:
Recent cyberattacks have demonstrated increased risk to both IT and operational technology (OT) environments. Cybercriminals are maximizing their opportunity by exploiting older vulnerabilities and an expanding attack surface.
Like the Boy Scouts, be prepared fits as a motto for the Operational Technology team. Preparing for, responding to and recovering from cyberattacks should be a strategic part of any continuity plan. Readiness equates to enforcement of rules and policies that provide the visibility, control and situational awareness to respond at the speed of business.
During this session, we will explore governance for OT that includes risk strategy through response planning. The session will underscore how an integrated cybersecurity platform with the appropriate use automation can support OT readiness.
Moderator:
Sean Costigan
Professor, George C. Marshall European Center for Security Studies
Speaker:
Christopher Blauvelt
Director, OT Consulting Systems Engineer, Fortinet
Sean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security.
His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.
Chris brings more than 15 years of cybersecurity and critical infrastructure experience working in the renewable energy industry. He was directly involved in the development, construction, and operations of wind and solar power plants and their high voltage systems. His work within the energy and utility industry has also afforded him experience in the development and maintenance of substation protection, automation, and control systems. Chris has a master’s degree in electrical engineering from Clarkson University with thesis work in substation protection, automation, and control involving the IEC61850 family of protocols. Chris supports the cybersecurity initiatives of industrial customers by bringing together their chosen architectural framework and the capabilities of the Fortinet Security Fabric to keep their operations safe and secure. When he is not working, Chris enjoys hobby electronics and spending time in the outdoors.
Brought to you by our 2023 Cyber Security Summit Corporate Partner:
You will be sent a reminder email before the Webinar giving information on how to view it.
Previous Webinars
JULY 2023: The Ongoing Threat of Ransomware: How to Mitigate Your Risk
Readiness is essential. How will your organization weather the ransomware storm?
Nearly half of organizations surveyed experience attempted ransomware attacks on a monthly, weekly, or daily basis. These pervasive attacks are on the rise and impacting organizations every day. As the growing threat of ransomware looms over your business, it’s important to know how you’ll weather the ransomware storm.
What you’ll learn:
- How to proactively defend against the ever-increasing threat of ransomware
- Key principles of a mature ransomware strategy
- What people, process, and technology investments are required for risk mitigation
This presentation will be a look into recent research uncovering key focus areas common in the organizations defending effectively against ransomware threats. You’ll learn how those results translate to greater business resilience and how specific ransomware risk mitigation tactics can help you assess and strengthen your organization’s ransomware defense and mitigation strategy.
Moderator:
Daniel Cunningham
Manager – IT Services, Prime Therapeutics
Speaker:
Mike Zyskowski
Sr. Security Engineer for Strategic Sales, Secureworks
Dan Cunningham provides direction to and is responsible for coordinating resources for 3M’s incident response teams. For the MN National Guard he plans cyber engagements with the Croatian Armed Forces. Commissioned a Second Lieutenant in 2002, Lieutenant Colonel Cunningham has commanded and the company level, and was the first commander of MN’s Cyber Protection Team. He has completed deployments to Bosnia in 2003-2004 and Iraq in 2006-2007 and 2009-2010. His most significant award includes the Bronze Star Medal with a bronze oak leaf cluster.
Mike is Sr. Security Engineer for Strategic Sales at SecureWorks. Responsible for security solutions sales with a defense in depth strategy. Mike’s focus has been to help clients with little to no security programs create or develop a program or for those with programs to continue to mature those programs by focusing on the the clients needs, budgets and risk tolerance.
Brought to you by our 2023 Cyber Security Summit Tech Session Sponsor:
MARCH 2023: Seven Elements of a Highly Successful Zero Trust Architecture
TUES, MAR 28 — 1000 CST / 1600 BST
Organizations of every size are accelerating digital transformation to become more agile—but in the process, they’re greatly expanding their attack surfaces and exposing themselves to new threats. Once-stalwart castle-and-moat security architectures built on VPNs and virtual or physical firewalls are ill-equipped to address these new challenges.
To meet them head-on, IT and security teams need to rethink networking and security, moving away from perimeter-based and network-focused solutions. That’s why today’s progressive leaders are turning to zero trust.
What exactly is zero trust? What are the essential elements of a true zero trust solution? Crucially, how do you successfully implement a zero trust architecture across your organization? Join Zscaler as we explore zero trust and how to securely connect users, devices, and workloads to applications from anywhere. You’ll learn:
-
- What zero trust is and isn’t
-
- Challenges of castle-and-moat architectures and legacy solutions
-
- Seven elements of a true zero trust architecture
-
- How to successfully implement zero trust for your environment
Judy Hatchett is the VP Chief Information Security Officer at Surescripts. She sets the vision, develops plans and oversees the execution of Surescripts’ Enterprise Information and Physical Security, Business Continuity and Risk Management Programs to ensure comprehensive, high-quality and effective risk and information security management in support of business goals. With 15 years in cybersecurity, she has held leadership roles overseeing global teams for governance, cybersecurity and HIPAA compliance and identity management in both the manufacturing and retail industries.
Brian Deitch is the Chief Technology Evangelist at Zscaler and has been in the security industry for more than a decade. Brian is passionate about helping organizations adopt secure, reliable, and scalable cloud-based solutions that make the internet safer for everyone. He’s an expert in cloud security, zero trust, and SASE/SSE and how to use these principles to design and implement digital, network, and application transformation.
Brought to you by our 2022 Cyber Security Summit Presenting Sponsor:
NOVEMBER 2022: How to navigate into a Cyber Career
TUES, NOV 29 — 1000 CST / 1600 BST
Audience: current college students and recent graduates
Hear tips from the Think Tank Cyber leaders on what to take and get involved with while still in school to best position yourself to secure a career in cyber and advice for recent graduates.
AUGUST 2022: Creating a Strategic Penetration Testing Program
TUES, AUG 30 — 1000 CST / 1600 BST
Traditional, check-the-box penetration testing is a thing of the past. Modern penetration testing must be strategic and human delivered. So, how can you make this shift? In this session, Sam Horvath, Technical Client Director at NetSPI, the Minneapolis-based leader in offensive security, will explore the two core pillars of successful pentesting program, share real examples of pentesting program transformations, and detail the steps organizations can take to get there.
Speaker:
SAM HORVATH
Technical Client Director
NetSPI
Sam Horvath fills the role of trusted adviser at NetSPI for many of our enterprise accounts to ensure client success, while also working in a strategic advisory capacity on specific engagements. Previously, Sam worked as a senior consultant specializing in web applications and social engineering. He also has experience providing technical leadership and penetration testing program guidance for large financial institutions and global cloud providers. Sam earned his B.A. in computer science from Augsburg University and began his career at NetSPI in 2018 through the NetSPI University program.
Moderator:
MARY FRANTZ
CISO, EKPartners
Mary Frantz is the CEO of Enterprise Knowledge Partners, LLC (EKP). She has performed and led advanced ethical hacking (red teams), security assessments, managed multiple incident investigations for companies. She was the primary technical cyber expert in the Equifax, Yahoo and many other high profile breaches and security incidents. Mary holds 4 bachelor degrees and two masters degrees and various active and non-active certifications in systems auditing, ethical hacking, penetration testing, forensics, engineering and architecture. She is a national advocate and mentor of women and minorities in STEM, a Board Officer for the Minnesota Academy of Science, board advisor for the Minneapolis Cyber Summit, and an elected School Board Director for MN District 719.
Special Thanks:
A special thanks goes out to NetSPI who helped conceive this important conversation.
FEBRUARY 2022: The Security Equals Compliance Disconnect
TUES, FEB 22 — 1000 CST / 1600 BST
Security will never be perfect; there will always be a residual risk that must be managed and controlled. Compliance does equal security, at least as best as your preferred standard or framework defines it.
Keep hiding behind “compliance does not equal security,” and you will forever be living off of your “luck” until it runs out – usually sooner rather than later.
Use the tools at your disposal correctly, stay current on threats, monitor your security posture, and live a long, prosperous, secure life.
Speaker:
JEFF HALL
Principal Security Consultant
Truvantis
Jeff has over thirty years of experience in information technology, information security and IT governance. He started his career as an IBM systems programmer writing and supporting operating systems, moved into application development, enterprise project management, CIO roles, CISO roles and then started a multinational consulting firm’s information security and PCI practices.
Jeff’s expertise ranges from operating systems to networking, enterprise application suites, information security and the cloud. He has been involved in a variety of projects to develop and implement innovative applications and services for small and midsized businesses to the Fortune 100. He has worked with manufacturing, distribution, financial institution, insurance, health care, and government organizations.
Moderator:
SEAN COSTIGAN
Professor, George C. Marshall European Center for Security Studies
Sean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security.
His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.
Special Thanks:
A special thanks goes out to Truvantis who helped conceive this important conversation.
MAY 2022: What if the browser was designed for the enterprise
TUES, MAY 31 — 1000 CST / 1600 BST
The application enterprises use the most is the browser. In fact, it has become our primary work environment, but the browser is not an enterprise application. So we have surrounded it with an endless, complex and expensive stack that overwhelms your security teams and interrupts end users. But what if the browser was designed for the enterprise? What could that do for security, productivity and work itself?
Discover how an enterprise browser can:
• Protect critical SaaS and web applications
• Streamline and secure third-party contractor access and BYOD strategies
• Free you from the cost and poor user experience of VDI and DaaS solutions
• Give you the last mile control you have been seeking
• Deliver it in a familiar, Chromium-based application that is simple for users to access and operate
Speaker:
BRIAN KENYON
Chief Strategy Officer
Island
Brian Kenyon drives corporate strategy at Island as its Chief Strategy Officer and one of the company’s founding members. Brian has also held the role of CSO at Symantec and Blue Coat Systems. He built his early career in technical roles for more than a decade at McAfee where he was Chief Technical Strategist, as well as CTO, and served as chief architect at start-up Foundstone.
Brian is the author of Security Battleground: An Executive Field Manual; Security Sage: Guide to Hardening the Network Infrastructure; and Special Ops: Host and Network Security. He holds a B.A. degree in Finance from Loyola Marymount University.
Moderator:
SEAN COSTIGAN
Professor, George C. Marshall European Center for Security Studies
Sean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security. His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.
Special Thanks:
A special thanks goes out to Island who helped conceive this important conversation.
FEBRUARY 2022: Back to the Basics
TUES, FEB 22 — 1000 CST / 1600 BST
In 2022 we are still seeing compromises as a result of not fully implementing basic security hygiene in organizations and not enforcing and enterprising logging and monitoring. This includes oversight of third parties and third party/open source APIs and software. We know that threat actors are becoming more creative in their attack vectors and methods, ensuring the basic / industry standard practices are implemented and knowing the key areas to monitor for cyber resilience and early warning signs of threat actor reconnaissance and compromise.
Speaker:
MARY FRANTZ
Managing Partner and Founder, Enterprise Knowledge Partners, LLC
Speaker:
CHRIS BRINKWORTH
Director, Forensics and eDiscovery, Enterprise Knowledge Partners, LLC
Moderator:
SEAN COSTIGAN Professor, George C. Marshall European Center for Security Studies
Sean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security. His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.
NOVEMBER 2021: Hybrid Work – Security is the Next Disruption
TUES, NOV 30 — 1000 CST / 1600 BST
The hybrid workforce is no longer a concept, it is a reality. But as employees embrace new working environments, this hybrid approach poses a unique challenge for security leaders. During this discussion, we explore how organizations will need to create a security strategy rooted in the variability of the hybrid workforce — one that meets employees where they are and helps them learn the role they play in securing this new model.
Speaker:
GARY SORRENTINO
Global Deputy CIO, Zoom Video Communications, Zoom
Gary Sorrentino currently serves as Global Deputy CIO for Zoom Video Communications. A former Managing Director for J.P. Morgan Asset & Wealth Management, Gary was the Global Head of Client Cyber Awareness and Education.
For over 12 years, Gary was the Chief Technology Officer for J.P. Morgan AWM’s global technology infrastructure initiatives, where he managed its Data Privacy program and was responsible for Infrastructure, Application and End User Technology Production Support. In 2014, he assumed a new role as the lead for their Cybersecurity efforts and developed a firm wide “Protect the Client” Cyber program designed to raise cybersecurity awareness among employees and clients.
With almost 40 years of experience in Information Technology, Gary has served in various other IT leadership positions in firms across the financial services industry. Prior to joining J.P. Morgan in 2005, Gary was Head of Global Infrastructure and Head of Technology Efficiencies at Citi Private Bank, where he was responsible for Global Infrastructure Support and strategic technology initiatives. Other roles he has held include Global Technology CFO at Credit Suisse and North America IT Controller at UBS.
Moderator:
SEAN COSTIGAN
Professor, George C. Marshall European Center for Security Studies
Sean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security. His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.
SEPTEMBER 2021 WEBINAR: THE SIGNIFICANCE OF AI & ML IN CYBERSECURITY
TUES, SEPT 28 — 1000 CST / 1600 BST
Artificial intelligence (AI) has become a security industry buzzword so broadly applied as to become almost meaningless. When every product boasts AI capabilities, security decision makers may quickly become cynical, even in the face of the most exciting innovation shaping cybersecurity today.
-
- What is the benefit of a cybersecurity solution powered by Artificial Intelligence and Machine Learning?
-
- Why does the number of generations of AI matter?
-
- How smart is the AI machine?
-
- How does AI provide a predictive advantage to prevent breaches for my organization?
-
- How can a ‘Prevention First’ cybersecurity approach help my business?
Speaker:
TOM CAMERON
Solutions Architect, BlackBerry powered by Cylance AI
Tom Cameron spent 15 years in the Intelligence Community as a U.S. Navy Cryptologic Technician and DoD contractor with Northrop Grumman. He was deployed worldwide supporting cryptologic missions during Operations Enduring Freedom/Iraqi Freedom, East Africa, and European theaters. He and his wife, Loretta, met while stationed together in Pearl Harbor, Hawaii, and have two sons both born in Puerto Rico. Tom is from St. Paul, Minnesota, and is a member of InfraGard and ISSA. Tom started his SE career with Symantec, was Mandiant SE of the Year in 2014, and is currently an SE for Blackberry by way of the Cylance acquisition.
Moderator:
SEAN COSTIGAN
Professor, George C. Marshall European Center for Security Studies
Sean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security. His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.
AUGUST 2021 WEBINAR: RANSOMWARE UNPLUGGED: WHAT DOES THE MOST RECENT CYBER PLAGUE MEAN?
TUES, AUGUST 31 — 1000 CST / 1600 BST
Sam Curry explores the reasons behind the sharp rise in ransomware attacks and the difficult questions brought on by this threat. Should an organization ever pay the ransom? What damage is risked from an attack, not only to revenue but to brand, morale, and insurance premiums? And most importantly, what can an organization do to recover from such an attack, or make sure it doesn’t happen in the first place?
Speaker:
SAM CURRY
Chief Security Officer, Cybereason
Bio
Sam Curry is CSO at Cybereason. Curry was also CTO and CISO for Arbor Networks (NetScout) and was CSO and SVP R&D at Microstrategy in addition to senior security roles at McAfee and CA. He spent seven years at RSA variously as CSO, CTO and SVP of Product and as Head of RSA Labs. Curry also has over 25 patents in security from his time as a Security Architect, has been a leader in two successful startups and is a board member of the Cybersecurity Coalition, of SSH Communications and of Sequitur Labs (in the IoT security space) in addition to a number of advisorships across the security spectrum. Curry is also a Visiting Fellow at the National Security Institute.
Moderator:
SEAN COSTIGAN
Professor, George C. Marshall European Center for Security Studies
Bio
Sean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security. His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.
A special thanks goes out to Cybereason who helped conceive of this important conversation. Visit Cybereason to learn about its end-to-end cybersecurity solution built to empower defenders
Rapporteur:
SIMON BRACEY-LANE
PhD Student, University of Canberra, Australia
JULY 2021 WEBINAR: RaaS AND THE RISE OF RANSOMWARE EXTORTION ECOSYSTEM
TUES, JULY 27 — 1000 CST / 1600 BST
Ransomware as a service (RaaS) has made extortion more critical than ever. If ransomware actors can’t extort ransom payment from victims in “traditional” means, they have to focus on new ways of blackmailing. This doesn’t just mean stealing files and posting them on an extortion site — instead, ransomware actors have created a whole new extortion ecosystem. While the success of RaaS mimics the success of ransomware, a lot of the success of the RaaS model has to do with extortion. The reality is, the creation of the extortion ecosystem has created a symbiotic relationship between RaaS operators, the dark web forums they advertise on, security press, and security researchers.
In this session, Dmitry Smilyanets, expert threat intelligence analyst, and Allan Liska, expert ransomware researcher from the intelligence company Recorded Future share insight into how the growth of RaaS offerings has helped accelerate ransomware attacks, and what it means for your organization.
Topics covered include:
-
- Different RaaS offerings and the tactics, techniques, and procedures (TTPs) employed
-
- Current extortion schemes to look out for
-
- Why every ransomware attack is a third-party attack
-
- RaaS risk reduction best practices
Speaker:
ALLAN LISKA
Sr. Solutions Architect, Recorded Future
Allan Liska is an intelligence analyst and solutions architect at Recorded Future. Allan has more than 15 years’ experience in information security and has worked as both a blue teamer and a red teamer for the intelligence community and the private sector and is one of the organizers of BSides Bordeaux. Allan has helped countless organizations improve their security posture using more effective and integrated intelligence. He is the author of The Practice of Network Security, Building an Intelligence-Led Security Program, and Securing NTP: A Quickstart Guide and the co-author of DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion.
Speaker:
DMITRY SMILYANETS
Expert Threat Intelligence Analyst, Recorded Future
Mission-driven Russian-speaking Cyber Threat Intelligence Analyst with type A personality. Twenty years of experience and expertise in cybercrime activity that includes being a former member of an elite Russian-based hacking organization.
Moderator:
SEAN COSTIGAN
Professor, George C. Marshall European Center for Security Studies
Bio
Registration is complimentary, so please join us for this illuminating discussion on what has become one of cybersecurity’s most-pressing challenges.
A special thanks goes out to Recorded Future who helped conceive of this important conversation. Visit Recorded Future to learn how by combining persistent and pervasive automated data collection and analytics with human analysis, Recorded Future delivers intelligence that is timely, accurate, and actionable.
JUNE 2021 WEBINAR: WHAT IS A SIEM AND WHY DO YOU NEED ONE
TUES, JUNE 29 — 1000 CST / 1600 BST
Achieving a baseline configuration that detects attacker activity is one of the most effective defenses against cyber-attacks and data breaches. In fact, according to industry reports in healthcare and payment cards, ineffective logging, monitoring and the inability to correlate event logs to tell a story within and across platforms is the primary reason such attacks are successful.
As a result, statutory and regulatory compliance have strengthened the need for logging, monitoring and retention of event logs. However, many organizations are complying with only minimum requirements, have not implemented their systems effectively, and do not appreciate the enterprise value of systems designed to collect and correlate event logs.
During this hour-long discussion, Mary Frantz – primary technical cyber expert in the Equifax, Yahoo and many other high-profile breaches – provides a product-agnostic look at the capabilities of enterprise SIEMs, what to look for, how to implement and use them effectively, and how they can benefit the entire organization – not just security.
MAY 2021 WEBINAR: The Confluence of Insider Threat and Cybersecurity
TUES, MAY 25 — 1000 CST / 1600 BST
Cyber threats arise from numerous sources, including state actors, terrorist groups, criminals, hackers, business competitors, and even trusted insiders. In fact, it’s the threat from trusted insiders that may pose the most significant threats. Whether as a malicious act —the deliberate exfiltration of information or introduction of malware or other harmful code —or inadvertent actions by careless employees, the greatest threat to an organization’s information system is often on the inside. On May 25, NCSC Insider Threat Directorate (ITD) will participate in a CyberWeek webinar to discuss the role of insider threat mitigation in cybersecurity. During this hour-long event, we’ll discuss the current risk environment, including heightened vulnerabilities created by the Global Pandemic; identify potential threats posed by trusted insiders and the adversaries who seek to co-opt or exploit them; and share best practices and resources available to mitigate the risk.
Speaker:
REBECCA MORGAN
Deputy Assistant Director, Insider Threat; Deputy Director, National Insider Threat Task Force; National Intelligence and Security Center
Ms. Rebecca Morgan serves as the National Counterintelligence and Security Center (NCSC) Deputy Assistant Director for Insider Threat and as the Deputy Director of the National Insider Threat Task Force (NITTF). NITTF is an interagency task force co-chaired by the Office of the Director of National Intelligence (ODNI) and the Department of Justice.
Moderator:
SEAN COSTIGAN Professor, George C. Marshall European Center for Security Studies
Sean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security. His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.
A special thanks goes out to the National Counterintelligence and Security Center (NCSC) who helped conceive this important conversation. Visit NCSC to learn how it is leading the effort to protect our nation against intelligence and security threats.
Rapporteur:
DENNA DOWNHOUR
Information Security Senior Risk Analyst, Bremer Bank; Student, University of Minnesota Technological Leadership Institute
april 2021 WEBINAR: Supply Chain Strategies – A Call to ACTION
TUES, APRIL 27 — 1000 CST / 1600 BST
Once considered an esoteric domain of cybersecurity, Covid-19 has brought supply chain security to the dinner table conversation. The shortages revealed during the pandemic make it clear: Action must be taken to protect and safeguard us.
As “National Supply Chain Integrity Month” continues, join us on April 27 as Joyce Corell of the National Counterintelligence and Security Center delineates the threat landscape and discusses provoking implications for future supply chain integrity with Sean Costigan of the George C. Marshall European Center for Security Studies. The conversation will cover the current policy landscape, which includes actions from all branches of government, as well as how thinking on risk has evolved over the past several years. Joyce will touch on the notion of shared risk and how to think through responsibilities for government, the private sector and the consumer. This hour-long discussion will help tee up a national conversation on supply chain security as NCSC, DoD, DHS and the Cyber Security Summit raise awareness throughout the year.
Speaker:
JOYCE CORELL
Assistant Director, Supply Chain and Cyber Directorate, National Counterintelligence and Security Center, Office of the Director of National Intelligence
Joyce E. Corell is the Assistant Director of the Supply Chain and Cyber Directorate of the National Counterintelligence and Security Center (NCSC). Prior to this posting, she was the Assistant Director for the Strategic Capabilities Directorate in the Office of the National Counterintelligence Executive (ONCIX.)
Corell served at the National Security Agency (NSA) for 23 years. Her last assignment was as the Chief of Technology Policy in the NSA Commercial Solutions Center. She spent a significant portion of her career focused on various aspects of defensive and offensive computer network operations, from capability development of national policy and legislations. Complementing these roles, Corell also led various activities surrounding partnerships with the private sector ranging from technology transfer, export control licensing, and the development of strategical alliances, both domestic and international.
Corell graduated from William & Mary with a B.A. in Political Science. She received an M.S. in National Security Strategy from the National War College.
Moderator:
SEAN COSTIGAN
Professor, George C. Marshall European Center for Security Studies
Sean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security. His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.
Rapporteur:
LINDSEY KONERZA
IT Business Systems Analyst, ASR-IT and Student, University of Minnesota Technological Leadership Institute – Master of Science in Security Technologies (MSST) program.
MARCH 2021 WEBINAR: ANATOMY OF SOLARWINDS AND IMPLICATIONS FOR SUPPLY CHAIN SECURITY
TUES, MARCH 30 — 1000 CST / 1600 BST
On the eve of “Supply Chain Security Month” as designated by DHS, the Cyber Security Summit examines the catastrophic attack that occurred last December on SolarWinds, a major U.S.-based provider of cybersecurity tools. The devastating impact rippled across thousands of organizations and gave our industry a moment of pause.
In this one-hour webinar, our expert panelists revisit the attack and discuss how supply chain risk management needs to evolve to counter threats moving forward.
CHRIS HALLENBECK is CISO for the Americas at Tanium. Chris provides security leadership and operational insight gained from over 20 years in both public and private sector. His focus is on helping Tanium customers ensure that the technology powering their business can adapt to disruption.
SEAN S. COSTIGAN is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security. His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats.
MARK RITCHIE is President of Global Minnesota and as the Civilian Aide to the Secretary of the Army and is Minnesota’s former Secretary of State Over the past decade Mark led the public-private partnership working to bring the 2027 World Expo to Minnesota. Mark’s public service has included serving on the State Board of Investment, Minnesota’s Executive Council, the federal Election Assistance Commission Advisory Board and on the Board of the Minnesota Historical Society.
Registration is complimentary, so please join us for this illuminating discussion on what has become one of cybersecurity’s most-pressing challenges.
For additional insight into the topic, we encourage you to read Sean Costigan’s think piece for Diplomatic Courier published earlier this year.
A special thanks goes out to Tanium who helped conceive this important conversation. Visit Tanium to learn how it’s giving the world’s largest enterprises and government organizations the unique power to secure, control, and manage millions of endpoints across the enterprise within seconds.
NOVEMBER 2020 WEBINAR: CYBER NORMS IN A CHANGING WORLD
Tues, Nov 24 — 1000 CST / 1600 BST
Governmental experts have offered the world 11 norms to achieve international cybersecurity. Are these recommendations indeed likely to resolve cyber conflict? Are states following their own advice? What will change in international cybersecurity when the experts’ recommendations are put into practice?
DR. ENEKEN TIKK
Executive Producer at the Cyber Policy Institute
SEPTEMBER 2020 WEBINAR: CYBERSECURITY SUCCESSES AND FAILURES – HOW PUBLIC INSTITUTIONS CAN DO BETTER
Tues, Sept 22 — 1000 CST / 1600 BST
During this this 1-hour webinar, Major General Mari K. Eder (U.S. Army Ret.) will speak on the issue of personal privacy versus need to know – how public institutions can regulate, encourage, and demand more transparency and accountability in data collection and what individuals can do to protect personal their personal privacy and manage their data and how it is accessed, shared or sold.
MAJOR GENERAL MARI K. EDER
(USA Ret.)
Session Supported by:
AUGUST 2020 WEBINAR: THE NEXUS OF CYBERSECURITY AND DISINFORMATION
Tues, Aug 25 — 1000 CST / 1600 BST
Disinformation techniques are rapidly evolving in quality and quantity, while the governmental and private sectors are admiring the problem. The fast-paced progress from non-digital means of spreading disinformation, that were adopted for the digital age, caught our societies completely unprepared. Add the social media platforms, irresponsible usage, business interests and the lack of understanding and capacities on the governmental levels and you have a perfect storm.
From Soviet concepts of active measures to the digital age and microtargeting, this webinar will address the nexus of cybersecurity and disinformation.
Speaker:
DANIEL BAGGE
Cyber Attaché of the Czech Republic to the U.S. and Canada, National Cyber and Information Security Agency
Bio
Moderator:
Sean Costigan
Director and Co-Founder
ITL Security
Bio
Session Supported by:
JULY 2020 WEBINAR: THE NEW DATA PRIVACY NORM
Tues, July 28th — 0800 CST / 1400 BST
Description: Finding the right balance between privacy and public health interests is critical and will directly contribute to the long-term shaping of a successful digital society. In this hour-long session, Christel Cao-Delebarre (Global Privacy Officer, CWT) explores the privacy issues raised by the accelerated use of full-scale digital solutions involving large volumes of personal data processing in our global fight against COVID-19.
Christel Cao-Delebarre
Global Privacy Officer
CWT, London Office
Sean Costigan
Director and Co-Founder
ITL Security
Session Supported by:
To learn about available sponsorship opportunities, contact Jennifer Churchill at 763-548-1306 or jennifer.churchill@eventshows.com.