Hackers target small businesses as low-hanging fruit. Business owners need a plan to leverage practices to protect assets. Build the foundation for cyber security strategy to protect your company’s Reputation, Financial Well-Being and Intellectual Property – in short, your livelihood.
Learn how to protect yourself, your customers and your assets. Joining us for a powerful afternoon with top Cyber Security thought leaders in sessions to give you knowledge for developing technical, legal and financial aspects of a cyber security plan for your business.
Registration includes Cyber Risk Awareness Training, a resource break in the Cyber Security Summit Expo to meet with security resources, and a Networking Reception.
Who should attend? Business owners and their payroll, HR and IT staff.
Purchase by March 17 and SAVE 40%! Just use promo code: PADDY40
Why a Cyber Security Strategy is critical to small and mid-size businesses and the impact it can have.
Speakers: Eileen Manning, Cyber Security Summit; Nancy Libersky, U.S. Small Business Administration
1:30-2:00 No Longer “Nice to Have” — Privacy and Security is the Law
Small to mid-size businesses may think they’re too small to get noticed by bad actors. Actually, they are prime targets. Moreover, state, federal and international legislation have begun to catch up to address the imperative of protecting data. With the advent of comprehensive privacy and security regulations in GDPR, CCPA, and various state laws, safeguarding data is no longer aspirational, but rather a necessary practice. Two attorneys from Briggs and Morgan break down what you need to know in a digestible overview of the legal landscape and provide you with helpful takeaways for your business.
Speakers: Cyrus C. Malek, Attorney, Briggs and Morgan, Professional Association; Brett Hebert, Attorney, Briggs and Morgan, Professional Association
2:00-2:40 pm Small Business Big Threat: Why Hackers Love Businesses Like Yours
Just because you only see the cyber breaches that happen to big name companies on the news doesn’t mean they are the only targets. Small and mid sized companies have become the favorite target of cyber criminals all over the world. But why is an unknown small to mid-sized company a target for a cyber breach? Why would they want your data? This session will explore why cyber criminals are increasingly focusing their efforts on accessing the networks of business just like yours and how you can start to secure your network without breaking the bank.
Speaker: Eric Ebner, Co-Founder and Chief Technical Officer, Protocol 46
2:45-3:15 pm Expo Resource Break
Session Takeaways: Connect with vendors that can support your needs
3:15-4:00 pm Third Party Risk Management for Small Business
Small businesses providing services to an enterprise will normally be required to undergo an assessment or audit to demonstrate they have ample capacity to protect any data they will host or process. Differentiation between service providers is often based on cyber security capabilities in addition to the quality of services offered. We will review common cyber security controls and capabilities assessed and required of service providers by Enterprises. Experience is based on multiple third-party assessments early in the vendor selection process involving many different types of services.
Speaker: Chuck Pellino, Vice President, CISSP, Security Systems Architect, Managing Systems Architect-LOB Architect, PVSI, Lending, Wells Fargo
4:00-4:30 pm How the Government is Helping Small to Mid-Sized Businesses Build a Defense
CISA is a new government agency formed to oversee Cybersecurity and Infrastructure Security. Gabbard will address the risks that small to medium business are facing, where DHS fits into the cycle and then the resources that DHS has to offer.
Speaker: Christopher Gabbard, Cybersecurity Advisor, Region V: Minnesota, CISA
4:30-4:50 pm Q&A Panel
Panelists: Cyrus C. Malek, Attorney, Briggs and Morgan, Professional Association; Brett Hebert, Attorney, Briggs and Morgan, Professional Association; Eric Ebner, Co-Founder and Chief Technical Officer, Protocol 46; Chuck Pellino, Vice President, CISSP, Security Systems Architect, Managing Systems Architect-LOB Architect, PVSI, Lending, Wells Fargo
4:50-5:00 pm Session Takeaways
Speaker: Cyrus Malek
5:00-6:00 pm Reception in Resource Center