Cyber Security Business Blog

 

professionals at a conference seminar
For the past eight years, the Cyber Security Summit in Minneapolis has brought people with different viewpoints on cybersecurity issues together to hear from experts, learn about trends and discuss actionable solutions. Our 2018 Summit was no different and we’d like to thank you once again for joining us! In addition to the annual 2-day Summit, this year we hosted multiple half-day events on Tuesday. These sessions focused on healthcare & medical device cybersecurity, DevSecOps for practitioners, GDPR and cybersecurity for small and mid-size businesses. Feedback from attendees Here’s what attendees had to say about Cyber Security Summit 2018: "Excited ...
Read More
conference in large room with people at tables listening to speaker
The 2018 Cyber Security Summit is just around the corner and we’re looking forward to spending three days with the top cybersecurity professionals from across the globe. We’ve made some changes since last year, so we thought it would be helpful prepare you with a rundown of everything you need to know. Feel free to bookmark this post for reference as you prepare for this year’s Summit. Why Minneapolis, Minnesota? Squarely centered geographically and home to many Fortune 500 multinationals, Minnesota bridges the divide between the technology sector on one coast and policymakers from the other to form an operational and innovative ...
Read More
With technology evolving on a daily basis and an increasing amount of data to secure, it’s no surprise that the industry of cybersecurity is a fast paced one. “The fact that there is not just one single most influential trend in cybersecurity but a confluence of many is very influential to the nature of the industry,” says Cyber Security Summit co-chair and 2018 keynote Stefanie Horvath. Horvath received her master’s degree in Military Strategic Studies from the United States Army War College. Today she serves as the Executive IT Director for Minnesota IT Services and concurrently serves in the Army ...
Read More
young professionals collaborating
Just as we think we are starting to get a handle on Millennials in the workforce, a new generation is changing the game. Enter Gen Z. The oldest members of Gen Z (those born after 1996) are hitting 21 and 22 years old and thus, entering the workforce. And the industry that is hungry to have them? Cybersecurity. According to the Department of Homeland Security, there are half a million cybersecurity-related job openings in the United States and the Bureau of Labor Statistics predicts the need for 1.8 million additional cybersecurity professionals to fill the workforce gap by 2022. What ...
Read More
Cybersecurity challenges are turning natural competitors into willing collaborators as companies try to ward off the shared threat of attack.  By Michael Border “Oops, your important files are encrypted,” a May 2017 pop-up advised on the screens of an estimated 200,000 computers worldwide. The culprit was WannaCry, a cryptoworm that attacked computers running the Windows operating system. It demanded ransoms to be paid in Bitcoin, a digital currency that leaves no incriminating paper trail. Cybersecurity experts discourage making payments to hostage-takers, warning that it encourages future hacks and provides no guarantee that files will be restored. Either way, the damage ...
Read More
California has just imposed a significant new set privacy and data security requirements that will impact a significant percentage of consumer-facing businesses in the US. Companies will have to implement new procedures as they collect, sell, and disclose consumer data, and they now have a statutory obligation “to implement and maintain reasonable security procedures and practices appropriate to the nature of the information.” The California bill defines “personal information” very broadly to include identifying information that is not usually thought of as highly sensitive, such as the phone number or IP address of a California resident. (In this way, it ...
Read More
Tony Sager is a Senior VP and Chief Evangelist for the Center for Internet Security. He leads the development of the CIS Critical Security Controls, a worldwide consensus project to find and support technical best practices in cybersecurity. Tony also serves as the Director of the SANS Innovation Center, a subsidiary of The SANS Institute. He retired from the National Security Agency (NSA) after 34 years as an Information Assurance professional. As the lead pathfinder at CIS, Mr. Sager addressed Cyber Security Summit 2016 on Making Best Practice Common Practice: the CIS Controls. “…I have just completed 40 years in ...
Read More
Target Corp. experienced a serious system breach in 2013, introduced through an inadequately protected downstream supplier in what has become a textbook case of a hack to avoid. Tim Crothers had worked at General Electric Corp. He is the man who came aboard two years ago as Senior Director of Cybersecurity to steer the team that’s mounting defenses to keep Target’s cyberspace secure. Tim is a seasoned security leader with over 20 years’ experience building and running information security programs, large and complex incident response engagements, and threat and vulnerability assessments. He has deep experience in cyber-threat intelligence, reverse engineering, ...
Read More
Summit Keynote Speaker Dr. Shima Keene presented The Nexus of Cybersecurity, Crime and Terrorism. She is a Director of the Conflict Studies Research Centre, Oxford, UK, and is affiliated with many law enforcement intelligence organizations. She advises on matters relating to national and global security including terrorism, organized crime, economic crime, cyber-crime and governance. She is the author of “Threat Finance: Disconnecting the Lifeline of Organized Crime and Terrorism.” Dr. Keene holds a Ph.D. in International Criminal Law. She currently lectures at the University of Cambridge, and the University of St. Thomas in Minnesota. Her role is intervention in cyberterrorism, ...
Read More
Kevin Thompson, Threat Analyst for FireEye, earlier worked as a cyber analyst for the CIA, covering Eastern Europe and Russia and briefing numerous government agencies on future potential incidents. His analytical work has been used in Presidential Daily Briefings and as a case study in multiple training classes. He now educates FireEye clients and partners on the latest cyber threats to infrastructure. Kevin’s address to Cyber Security Summit, 2016 Cyber Attacks by the Numbers, concisely reviewed the latest statistics and emerging trends: In 2015, the median duration before a hack was discovered was 146 days, down from 246 days a ...
Read More
Loading...