Cyber Security Business Blog

Cyber Security Summit

 

Tony Sager
Tony Sager is a Senior VP and Chief Evangelist for the Center for Internet Security. He leads the development of the CIS Critical Security Controls, a worldwide consensus project to find and support technical best practices in cybersecurity. Tony also serves as the Director of the SANS Innovation Center, a subsidiary of The SANS Institute. He retired from the National Security Agency (NSA) after 34 years as an Information Assurance professional. As the lead pathfinder at CIS, Mr. Sager addressed Cyber Security Summit 2016 on Making Best Practice Common Practice: the CIS Controls. “…I have just completed 40 years in ...
Read More
Tim Crothers
Target Corp. experienced a serious system breach in 2013, introduced through an inadequately protected downstream supplier in what has become a textbook case of a hack to avoid. Tim Crothers had worked at General Electric Corp. He is the man who came aboard two years ago as Senior Director of Cybersecurity to steer the team that’s mounting defenses to keep Target’s cyberspace secure. Tim is a seasoned security leader with over 20 years’ experience building and running information security programs, large and complex incident response engagements, and threat and vulnerability assessments. He has deep experience in cyber-threat intelligence, reverse engineering, ...
Read More
Summit Keynote Speaker Dr. Shima Keene presented The Nexus of Cybersecurity, Crime and Terrorism. She is a Director of the Conflict Studies Research Centre, Oxford, UK, and is affiliated with many law enforcement intelligence organizations. She advises on matters relating to national and global security including terrorism, organized crime, economic crime, cyber-crime and governance. She is the author of “Threat Finance: Disconnecting the Lifeline of Organized Crime and Terrorism.” Dr. Keene holds a Ph.D. in International Criminal Law. She currently lectures at the University of Cambridge, and the University of St. Thomas in Minnesota. Her role is intervention in cyberterrorism, ...
Read More
Kevin Thompson
Kevin Thompson, Threat Analyst for FireEye, earlier worked as a cyber analyst for the CIA, covering Eastern Europe and Russia and briefing numerous government agencies on future potential incidents. His analytical work has been used in Presidential Daily Briefings and as a case study in multiple training classes. He now educates FireEye clients and partners on the latest cyber threats to infrastructure. Kevin’s address to Cyber Security Summit, 2016 Cyber Attacks by the Numbers, concisely reviewed the latest statistics and emerging trends: In 2015, the median duration before a hack was discovered was 146 days, down from 246 days a ...
Read More
Dan Paltiel
Truman Center Policy Program Manager Dan Paltiel, a keynote speaker at Cyber Security Summit 2016, spoke on the current state of cyber defense in Cyber After 2016: Protecting Your Network in the New Political Environment. Earlier he was Program Coordinator and Research Assistant in the Strategic Technologies Program at the Center for Strategic and International Studies (CSIS), where he worked on cybersecurity and technology policy issues. Dan lived in Amman, Jordan, where he studied Arabic and taught English. He holds a BA in History from Amherst College, and hails from New Haven, Connecticut. He is fluent in French and Arabic ...
Read More
Bob Stasio
Senior Product Manager Bob Stasio of IBM i2 Safer Planet was keynote speaker for Cyber Security Summit 2016. Prior to joining IBM, Mr. Stasio worked in threat intelligence programs at Bloomberg and global financial firms. He also has deep government experience having served at NSA’s Cyber Center, U.S. Cyber Command, U.S. Army’s Signals Intelligence Corps, the FAA, and NASA. Bob served as a U.S. Army officer, and is a recipient of numerous military awards, including the Bronze Star and Global War on Terrorism Expeditionary Medal. He also is a Truman National Security Fellow, Brookings Institution Council on U.S. and Italy ...
Read More
Ronald Burgess
Lt. Gen. (ret) Ronald Lee Burgess, Jr., who served as the 17th Director of the Defense Intelligence Agency, was one of the keynote speakers at Cyber Security Summit 2016 in Minneapolis. As head of the Agency and a former Acting Principal Deputy Director of National Intelligence, Burgess served as a key player in the national security arena, called upon by the President, the Secretary of Defense, the Director of National Intelligence, the Chairman of the Joint Chiefs of Staff, and Congressional leaders for his opinions, advice and expertise. He is currently Senior Counsel for National Security Programs, Cyber Programs and ...
Read More
Spaulding
“Minnesota is adding tech jobs at the greatest rate of anywhere in the country,” declared Suzanne Spaulding, Under Secretary for the National Protection and Programs Directorate (NPPD) at the Department of Homeland Security, a keynote speaker at Cyber Security Summit 2016 in Minneapolis. The flip side of that coin with regard to cyber security, she noted, is that “vibrancy makes us an attractive target.” During her speech, Ms. Spaulding recited a litany of bad actors driven to wreak havoc: nation-states, cyber criminals, terrorists and political groups each are spurred on by their own motives. Russia, China, Iran and North Korea are among ...
Read More
ID-10028974
In July, Verizon announced that it would acquire Yahoo’s Internet business for $4.8 billion. In September, Yahoo disclosed that a massive data breach had compromised 500 million user accounts.  The breach happened nearly two years ago, in late 2014.  Now, Verizon has stated publicly that it believes the breach has had a material impact on Yahoo.  Some have reported that the purchase price could be slashed by $1 billion.  Whatever the number turns out to be, the lesson is that cyber security impacts valuation. Cyber due diligence can help an acquiring company better understand the value of an acquisition target and ...
Read More
economics-digital-identity
Amid mushrooming IoT device sales and attendant channel transaction growth, findings from a recent study raise serious concerns about just how effectively online businesses are able to safeguard their stakeholders’ digital identities. A White Paper titled "The Economics of Digital Identity" was published by The Economist and authored by a team of experts at the Economist Intelligence Unit. In it, they reviewed findings of a 2015 study that surveyed 201 senior executives in North America. Industries represented in the study were manufacturing, finance, IT and technology. Executive-respondents came from sample split between companies with annual revenues under $1 billion, and those with ...
Read More

 

Cyber Security Summit