December 3 - 5, 2018
USA

Media Center

2017 Cyber Security Exchange

Download the Cyber Security Exchange 2017 Agenda

The 2017 Exchange will provide the Chief Information Security Officer and leading executives with a three-day event on the forefront of protecting the cyber security of the enterprise as the frequency and sophistication of cyber attacks continues to increase and evolve. Unlike other events, the Cyber Security Exchange will offer executives the opportunity to hear and discuss successful strategies in a true peer-to-peer networking forum while highlighting the latest technologies, strategies and processes to ensure security. 

Key Topics This Year Include:

 

Implementing and Innovating True Cloud Security.

 

Using Machine Learning, Big Data and Behavioral Analytics to Mitigate Risk

 

Harnessing and Harvesting Talent to Retain Strong Security Teams

 

Navigating Regulations and Legislation: Discuss Practical Implications

 

Effective Ways to Brief the Board

Whitepapers

Creating a Security Awareness Program that Sticks

Let’s face it – someone out there wants your sensitive data. Smishing. Spear Phishing. Clickjacking. We are bombarded everyday with headlines shouting the new and inventive ways attackers are coming after our sensitive information and the catastrophic consequences when they actually get their hands on it. By now, security education should be a top priority for any organization with information to protect, which is EVERY organization. Technology is a credible line of defense, but it cannot be the only one. Your employees need to know how they can help protect your company’s sensitive data and be motivated by why they should care about protecting it.

Submission Form

The State of Information Security Awareness: Trends & Developments

Take an in depth look at global gindings from the Ponemon Research Institute and Security Innovation.

The Essential Guide To Online Security

Often with security and privacy concerns there exist trade-offs with usability and complexity.The most secure user is often the one who doesn’t use the Internet, but if you would like to climb out from under your rock to join the rest of us on the Internet, this guide is here to help you. Getting to a point where you can be reasonably confident in your personal security and privacy online can take a lot of effort, due diligence, and technical vigilance.

Cyber Security in the Information Age

In the age of all things digital, almost every single person has left a footprint on the World Wide Web. We post and share information at the touch of a button, without much thought about where that information may go. With so much data being transmitted on a daily basis, there are those who use the relative anonymity of the internet to maliciously steal valuable and private information. Because of these faceless criminals who lurk in the shadows of the cyber underworld, cyber security has never been more important than it is now.

Cyber Security Priorities: What Will Matter To CISOs?

We surveyed Chief Information Security Officers at last years Cyber Security Exchange on what important investments they are looking to make in 2017. These are the results of a survey given to senior-level cyber security executives from some of the world’s largest organizations. Our FREE graphic can be downloaded here!

CASE STUDY: An Event Above the Rest

In this case study, Skipstone gives qualitative details abouttheir experience sponsoring with IQPC Exchange. Skipstonegives examples of how an Exchange, an exclusive in-personevent with decision maker attendees, is different from otherevents and how the Exchange has helped further their business goals.

2017 Sponsorship Brochure

Download the Cyber Security Sponsorship Brochure

The 2017 Exchange will provide the Chief Information Security Officer and leading executives with a three-day event on the forefront of protecting the cyber security of the enterprise as the frequency and sophistication of cyber attacks continues to increase and evolve. Unlike other events, the Cyber Security Exchange will offer executives the opportunity to hear and discuss successful strategies in a true peer-to-peer networking forum while highlighting the latest technologies, strategies and processes to ensure security. 

Top Reasons To Sponsor:

 

Shorten your sales cycle by initiating relationships directly with decision-makers

 

Reduce the average cost of new business development through consolidation of T&E expenses by bringing these decision-makers to you in a captive audience

 

Accomplish 6-12 months of standard sales efforts in just three days by reaching ultimate budget decision makers

 

Promote brand & company awareness during formal and informal networking opportunities to share and exchange ideas and concepts

 

Promote your organization’s solutions during exclusive Thought Leadership Speaking Opportunities

Articles and Editorials

Six Traits of a Great CISO

In the c-suite, often the greatest emphasis is placed on leadership, communications skills, and business savvy. A great CISO, however, needs to bring much more to the table. They’re multidimensional: possessing all these qualities, but adding into the mix an in-depth knowledge of and experience with the various systems, controls, and tools that work together to keep an organization’s data safe. 

Below, discover five more traits that great Chief Information Security Officers share:


Presentations

The Human Side of Cybersecurity: An Exclusive Q&A with Southeastern Grocers CISO Chris Gay

Chris Gay, VP and Chief Information Security Officer of Southeastern Grocers and advocate for cyber security education, will be leading a roundtable discussion on the topic at the upcoming Cyber Security Exchange in Amelia Island, Florida, this December 4-6. Ahead of the Exchange, we sat down with him to talk cybersecurity education and awareness, challenges to CISOs at large companies, mitigating risks associated with new technology and more.

Event Materials

2016 Cyber Security Post Report

The 2016 Cyber Security Exchange post-event report features interviews with speakers, attendee lists, event photos and videos and more! Learn more about the event by downloading the report below.

Is BYOD (Bring Your Own Device) Worth the Risk?

As technology continues to advance and BYOD (Bring Your Own Device) workplaces become more and more commonplace, IT leaders everywhere are faced with a critical dilemma: Do we embrace the more productive mobile workplace at the expense of security, or do we sacrifice productivity for peace of mind?

Inside:
• The case for and against BYOD
• BYOD productivity, security and implementation data from over 800 IT professionals
• BYOD best practices

Articles and Editorials

Is BYOD (Bring Your Own Device) Worth the Risk?

As technology continues to advance and BYOD (Bring Your Own Device) workplaces become more and more commonplace, IT leaders everywhere are faced with a critical dilemma: Do we embrace the more productive mobile workplace at the expense of security, or do we sacrifice productivity for peace of mind?

It’s a tough question indeed. The embrace of mobile devices and BYOD workplaces is not only already in full-swing, but these approaches have been proven to enhance productivity and even increase employee retention.

The Case For

The Evolving Workforce Project conducted an in-depth study on mobility in the workplace and productivity, finding that “83% of global workers believe technology advances have enabled them to be more productive.” Cisco also found that U.S. workers save an average of 81 minutes per week by using their own devices, while Tech Pro discovered that 75% of companies either already allow BYOD or have plans to integrate a BYOD policy in the near future, owing directly to the increased productivity and availability they allow.

With the incorporation of BYOD and mobile devices, employees are accessing company data and resources on-the-go and staying connected at all times, which increases worker availability and thus productivity. Because of the remote access BYOD enables, flexible working hours also continue to become more prevalent, meaning lower office operating costs, better employee retention and a talent recruitment process not hamstrung by location.

The Case Against

With all that added flexibility and productivity though, comes a cost. More access points, less oversight and devices that can be lost anywhere combine to mean one thing: more vulnerability.

Over 50% of organizations rely on users to protect their own devices, which is a sobering reality considering that by the end of 2017, nearly half of all employers will require employees to use their own devices for work in some capacity. Another recent study conducted by HP revealed that 97% of the apps installed on employee devices have some sort of exploitable privacy issue, with 86% lacking basic security defenses and 75% inadequately encrypting data.

A recent survey of 882 IT professionals conducted by Crowd Research Partners revealed some further statistics supporting the case against BYOD:

  • ·         21% had suffered a security breach traceable to BYOD
  • ·         24% said mobile devices in their organization had connected to a malicious Wi-Fi hotspot
  • ·         39% said the devices which had connected to malicious Wi-Fi hotspots had downloaded malware

Where Companies Stand

So when caught between clear gains in productivity and employee satisfaction, and the obvious threat to sensitive data incurred by the use of BYOD practices, where do organizations draw the line? Security, for the time being, wins out. Nearly three-quarters of IT professionals who responded to a recent study said they would sacrifice productivity for increased security, which makes sense, considering the average financial loss incurred by a data breach currently stands at nearly $4 million.

Even with the majority of IT professionals favoring security at the expense of productivity, however, BYOD is quickly becoming the standard in workplace technology rather than the exception. Finding the sweet spot, an acceptable level of risk where security and productivity are maximized, is paramount.

A Happy Medium?

According to experts like Southeastern Grocers CISO Chris Gay, who will be speaking at the upcoming 2017 Cyber Security Exchange in Amelia Island, Florida , it starts with conducting a risk-based analysis before ever considering incorporating new technologies. “What’s going to be moving, where are our points of emphasis and what’s the risk if that data gets out?” From there, Gay says, “it’s about understanding that the end-user of that device…owns that risk. It’s up to the end user to follow the procedures [to ensure they’re using new technologies in the safest way possible]. 

After you’ve decided if adopting a new piece of technology would be a net benefit, it’s time to start thinking about how to incorporate it in the safest possible way. According to Tom Smith, VP of Business Development at CloudEntr, that starts with encrypting the data itself to be prepared for the inevitable breach. “Beyond that, you should have a BYOD policy in place that includes mobile device management (MDM) which gives IT access to any devices that may access your business network, along with the capability to wipe a device if it is lost or stolen,” says Smith.

Stephen Pao, General Manager, Security Business with Barracuda Networks, recommends the following BYOD security tips to help companies maintain flexibility without compromising resources:

  • ·         Offer a secure and reliable internet experience
  • ·         Help manage device and applications settings to ensure data integrity and security
  • ·         Distribute corporate network settings (proxy, Wi-Fi, Exchange, etc.) to personal devices upon enrollment
  • ·         Utilize strong passwords and encrypt sensitive data
  • ·         Set strong application control policies

Other BYOD best practices can include giving employees access only to their department’s files, incorporating layers of security which require each new device to be authenticated by the domain controller and having a well-defined email security policy along with cyber-safe educational programs for employees.

 

Summary

The quantifiable boosts in employee productivity and satisfaction and the enhanced convenience and utility of mobile devices mean BYOD programs are set to become the standard for the majority of organizations in the coming years. Security continues to be a top priority for IT professionals, even at the expense of productivity, but as businesses continue to go mobile, investing in a thorough risk assessment and a tailor-made BYOD security strategy is a sound idea.

Has your organization implemented BYOD, or are you considering it? Are there any pros or cons you would add to the mix?