Monday, December 10, 2018
11:00 am - 11:45 am Registration
11:45 am - 12:00 pm Orientation
12:00 pm - 12:10 pm Chairperson's Opening Remarks
12:10 pm - 12:55 pm True Cyber-Resilience: Merging the Capabilities of Cybersecurity, Business Continuity, and Enterprise Resilience
The growing number of information security breaches and attacks are a top threat to business operations. Integrating incident response and continuity planning with enterprise risk management empowers well-coordinated actions in the case of an actual event. Accountability, transparency, and continuous improvement are key attributes to sound risk management. The core of information security risk management merges governance, emerging technologies, system hardening, and cultural awareness. Enterprises control readiness and must balance sustainable programs that safeguard information along with meeting the organizational business objectives.
In this session:
•Leveraging investments and creating a consistent cyber defense
•Emphasizing best practices with authentication, patching, vulnerability management, and penetration testing
•Improving security training and providing clear protocols of escalation
•Providing consistent and coordinated information
2:05 pm - 2:35 pm Keynote: Unleash Your Program's Full Potential Through DiversityChad Teat - CISO Floor & Decor
What common trait produces astonishing results at tech-giant Hewlett-Packard, consumer goods Kimberly-Clark, and the hyper-growth retailer Floor & Decor? Industry-defying diversity. Attacking Cybersecurity’s largest cultural issue, diversity, greatly reduces a CISO’s troubles with Cybersecurity’s largest operational issue, labor shortage. Learn more about the status of diversity in Cybersecurity, hear examples of success and failure, and take home high-impact improvements for your program.
Floor & Decor
2:40 pm - 3:10 pm Business Meetings
3:10 pm - 3:40 pm Business Meetings
3:40 pm - 4:10 pm Business Meetings
Master Class4:15 pm - 5:00 pm Levers of Human Deception: The Science and Methodology Behind Social Engineering Erich Kron - Security Awareness Advocate KnowBe4
No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different lever that social engineers and scam artists pull to make us more likely to do their bidding.
Join Enrich Kron CISSP, Security Awareness Advocate at KnowBe4, as he provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by car dealers, to sophisticated social engineering and online scams. Additionally, he'll look at how to ethically use the very same levers when educating our users.
- The Perception vs. Reality Dilemma
- Understanding the OODA (Observe, Orient, Decide, Act) Loop
- How social engineers and scam artists achieve their goals by subverting OODA Loop's different components
- How we can defend ourselves and our organizations
Erich KronSecurity Awareness Advocate
BrainWeave4:15 pm - 5:00 pm When Shrinkage is Good - Reduce Incident Response from Hours to Minutes
Is your security team challenged with alert fatigue, a shortage of skilled staff, and maximizing the company’s product arsenal investment?
Solving such challenges isn’t easy and requires a delicate balance of people, processes, and tools. Investing in a comprehensive platform that enables security operation teams to reduce MTTR, create consistent and audited incident management process, and increase analyst productivity is a step in the right direction.
Attend this discussion to learn how a security orchestration platform can automate manual-intensive tasks and reduce response times from hours to minutes. See how the product’s machine learning suggestions can help your team become smarter with every incident and resolve complex threats faster and more accurately.
Benefits from shrinking your time to respond for every incident include:
•Improve your overall security posture
•Enhance analyst productivity (from Tier 1-3)
•Future-proof security operations