ISMG Engage - Princeton/New Jersey
Engage December 4, 2023
ISMG Engage Princeton, New Jersey will address the top threats, risks and security needs facing the healthcare sector, including the most critical cybersecurity challenges and lessons emerging from the global pandemic. Join our attendees and subject matter experts to learn more about strategies and tactics to defend against and respond to ransomware and other disruptive cyberattacks; bolster medical device security; prevent and detect privacy breaches; tackle identity and access issues; address telehealth challenges, and manage other leading cybersecurity concerns.
ISMG Engage provides an in-person opportunity for executives to learn from each other and network. Join the largest community of security leaders for on-site, closed-door ’Deep Dive’ discussions designed to provide engaging insight on the latest threats, technology and solutions to apply in your place of work.
Princeton, NJ
Name :
Princeton, NJ
Josh Corman
Former Chief Strategist
CISA COVID Task Force
Corman, is a founder of the grassroots advocacy group I Am The Cavalry. Most recently, he was the healthcare sector chief strategist at DHS CISA on matters relating to COVID-19 and public safety. He previously served as chief security officer...
Rob Suarez
VP & CISO
BD (Becton, Dickinson & Company)
Roberto (Rob) Suárez is a cybersecurity and privacy professional in the medical device and healthcare IT industry. At BD, Rob serves as Chief Information Security Officer and strategic leader for information security. In this role Rob is responsible for developing...
Scott Nichols
Global Product Security Leader
Danaher Corporation
Mr. Nichols has over 25 years of experience in the Information Security and Healthcare Technology industries. Mr. Nichols leads the Global Product Security program at Danaher Corporation, representing over 30 companies, including 4 medical device manufactures and 8 life sciences...
Suzanne Schwartz
Director for Strategic Partnerships & Technology Innovation at the Center for Devices and Radiological Health
FDA
Suzanne B. Schwartz, MD, MBA is the Director of the Office of Strategic Partnerships and Technology Innovation (OST) at FDA’s Center for Devices & Radiological Health (CDRH). Suzanne’s work in medical device cybersecurity includes raising awareness, educating, outreach, partnering and...
Nicholas Heesters
Attorney, Senior Advisor For Cybersecurity
HHS Office For Civil Rights
Nicholas Heesters is a certified information privacy professional with over 25 years of experience supporting technology and information security efforts in many diverse industries including financial services, government, defense, education and healthcare. He earned a Master of Engineering in Computer...
View Agenda
Welcome and Keynote Address
  • 04:00 PM
  • 04:44 PM
Networking Break
  • 04:45 PM
  • 04:59 PM
  • 05:00 PM
  • 05:59 PM
How to Keep Your Security Programs Proactive in an Ever-Evolving Threat Landscape

Cybersecurity strategies are shifting from a reactive stance to proactive approach. This change gives organizations the ability to be more agile with their security program. In this keynote session, our panel of industry experts will share their experience and insights on:

  • Is it possible to be prepared for the unknown cyber threat?
  • Team retention and talent acquisitions, including strategies for different generations
  • Promoting and driving a security and risk-aware culture
  • Current threat landscape’s most prevalent features-Cloud Security/Attacks, Human Error, Evil Proxy
  • 05:00 PM
  • 05:59 PM
The Future of Ransomware and Evolving Attacks

Adaptations are needed to keep pace with the changing ransomware environment. This panel will address what you should be ready for. They will also debate valid and invalid approaches to minimizing risk -from technology, government and other activities that will influence how organizations can to respond to threats. This panel will:

  • Discuss current trends for ransomware attacks 
  • Look at the impact of the changing environment on insurance premiums
  • Debate whether norms or regulations should dictate payments

Address critical strategies and aspects to being successful in defending against attacks

  • 05:00 PM
  • 05:59 PM
Cyber Warfare: A New Playbook. How Cyber, Conventional Warfare and Disinformation/MDM Constitute a Unified Playbook

The nature of warfare is changing. As conventional, cyber and information warfare converge into a highly refined and devastating playbook, we need to rethink many aspects of the way we implement defense tactics. This panel of public and private sector experts will dissect:

  • The evolution of Russian tactics-from the annexation of Crimea to the invasion of Ukraine
  • How the Perception War and MDM are taking center stage in modern conflict and shaping world events
  • Why we need an integrated playbook and how should this shape our defensive strategy
  • 05:00 PM
  • 05:59 PM
Risk Management for a New Era: Maturity Models and Evolution of Security Programs

A recent nationwide survey 23% of CISOs report to the CEO, while nearly 45% reported into a CIO. With Data Governance ultimately being about people, processes, and technology--the foundation for data governance—are “musts.” In this session, you will hear from practitioners who have actuated strong partnerships with executives. They will share:  

  • Tried and true approaches for getting buy-in and clear ownership 
  • Strategies for breaking down data silos
  • Approaches to find the right balance between flexibility and data governance standards
  • 05:00 PM
  • 05:59 PM
Little Device Big Threat! - IoT Attacks, Vulnerabilities and Prolific Risk

The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption. Join us to learn more about where IoT is headed and how you can stay safe while still reaping the benefits of a digital world.  This session will illuminate

  • Biggest threats based on trending attacks  
  • Challenges of IoT security based on common vulnerabilities
  • Vulnerabilities caused by new technologies
  • Strategies for securing huge attack surfaces
  • Regulatory and compliance issues rising from third-party partnerships
  • 05:00 PM
  • 05:59 PM
Incident Response: Are You Prepared for Your Organization's Worst Day?

It's not a matter of "if" the next cyberattack will strike--it's a matter of "when.” The extent of your preparedness is one of the biggest factors determining what that day (and beyond) is going to be like for you and your organization.
 When that day arrives, it’s too late to ask: Who have I prepared? How did I prepared them? What tools do I have at-the-ready? This panel of Industry experts will lend their experiences and lessons learned to unpack those questions as well as navigate us through the following:

  • What threats are most likely to cause the biggest disruption?
  • What are you doing now to protect your environment - and where are your biggest gaps?
  • How can we leverage all of the security controls in our environment for an effective, layered defense?
  • 05:00 PM
  • 05:59 PM
Strategies to Mitigate Risk and Exposure During Your Merger or Acquisition

2021 M&A transactions were up 55% in the U.S. over 2020. And 2022 is on pace to be even bigger. This wave of post-Covid M&A demands that cyber security leaders improve their efficacy. Panelists for this session are seasoned practitioners who are eager to share their experiences from the initial phase during due diligence through day-one integration of the M&A cycle: 

  • Ensure that a subsidiary cannot expose the parent company to cyber risks through the M&A process
  • Be a player and practice due diligence in the M&A process from start to integration
  • Leverage integrated risk assessments and automated smart questionnaires to gain a real-time snapshot into what a company’s cyber risk posture and overall GRC looks like
  • 05:00 PM
  • 05:59 PM
Clouded Judgment: Why Security & Cloud Are Aligned

The perceived conflict between profitability and speed to market versus security is rife in our organizations. Understanding this is important, and combating it is crucial. Cyber security leaders guide and influence the discussion, and thereby mindset, as both are indispensable to business goals. Making cloud secure is our best path forward. What are the necessary building blocks, and how can you create and promote a secure cloud strategy?

  • Discuss key points to win converts to a security mindset
  • Deal with M&As that have existing cloud environments
  • Retool teams and install effective guard rails

What role can compliance play?

  • 05:00 PM
  • 05:59 PM
Why Strong Partnerships With Executive Leadership Are Essential for Good Data Governance

A recent nationwide survey 23% of CISOs report to the CEO, while nearly 45% reported into a CIO. With Data Governance ultimately being about people, processes, and technology--the foundation for data governance—are “musts.” In this session, you will hear from practitioners who have actuated strong partnerships with executives. They will share:  

  • Tried and true approaches for getting buy-in and clear ownership 
  • Strategies for breaking down data silos
  • Approaches to find the right balance between flexibility and data governance standards
  • 05:00 PM
  • 05:59 PM
Third-Party Selection and Management: What You Need to Know and Do Before and After You Sign

The need for third-party risk management has never been greater. Even though the risks to your company, customers and partners can be substantial, the processes, methods, and mediums used today are frequently flawed and even potentially misleading. In this panel discussion we dive into:

  • What does the current TPRM risk landscape look like today?
  • What’s working and not working in TPRM?
  • What are the risks and mitigation strategies?
  • Best practices and recommendations for an effective program and what’s needed in the future
Refreshment Break
  • 06:00 PM
  • 06:29 PM
  • 06:30 PM
  • 07:29 PM
Risk Management for a New Era: Maturity Models and Evolution of Security Programs

A recent nationwide survey 23% of CISOs report to the CEO, while nearly 45% reported into a CIO. With Data Governance ultimately being about people, processes, and technology--the foundation for data governance—are “musts.” In this session, you will hear from practitioners who have actuated strong partnerships with executives. They will share:  

  • Tried and true approaches for getting buy-in and clear ownership 
  • Strategies for breaking down data silos
  • Approaches to find the right balance between flexibility and data governance standards
  • 06:30 PM
  • 07:29 PM
Cyber Warfare: A New Playbook. How Cyber, Conventional Warfare and Disinformation/MDM Constitute a Unified Playbook

The nature of warfare is changing. As conventional, cyber and information warfare converge into a highly refined and devastating playbook, we need to rethink many aspects of the way we implement defense tactics. This panel of public and private sector experts will dissect:

  • The evolution of Russian tactics-from the annexation of Crimea to the invasion of Ukraine
  • How the Perception War and MDM are taking center stage in modern conflict and shaping world events
  • Why we need an integrated playbook and how should this shape our defensive strategy
  • 06:30 PM
  • 07:29 PM
Little Device Big Threat! - IoT Attacks, Vulnerabilities and Prolific Risk

The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption. Join us to learn more about where IoT is headed and how you can stay safe while still reaping the benefits of a digital world.  This session will illuminate

  • Biggest threats based on trending attacks  
  • Challenges of IoT security based on common vulnerabilities
  • Vulnerabilities caused by new technologies
  • Strategies for securing huge attack surfaces
  • Regulatory and compliance issues rising from third-party partnerships
  • 06:30 PM
  • 07:29 PM
How to Keep Your Security Programs Proactive in an Ever-Evolving Threat Landscape

Cybersecurity strategies are shifting from a reactive stance to proactive approach. This change gives organizations the ability to be more agile with their security program. In this keynote session, our panel of industry experts will share their experience and insights on:

  • Is it possible to be prepared for the unknown cyber threat?
  • Team retention and talent acquisitions, including strategies for different generations
  • Promoting and driving a security and risk-aware culture
  • Current threat landscape’s most prevalent features-Cloud Security/Attacks, Human Error, Evil Proxy
  • 06:30 PM
  • 07:29 PM
Third-Party Selection and Management: What You Need to Know and Do Before and After You Sign

The need for third-party risk management has never been greater. Even though the risks to your company, customers and partners can be substantial, the processes, methods, and mediums used today are frequently flawed and even potentially misleading. In this panel discussion we dive into:

  • What does the current TPRM risk landscape look like today?
  • What’s working and not working in TPRM?
  • What are the risks and mitigation strategies?
  • Best practices and recommendations for an effective program and what’s needed in the future
  • 06:30 PM
  • 07:29 PM
Incident Response: Are You Prepared for Your Organization's Worst Day?

It's not a matter of "if" the next cyberattack will strike--it's a matter of "when.” The extent of your preparedness is one of the biggest factors determining what that day (and beyond) is going to be like for you and your organization.
 When that day arrives, it’s too late to ask: Who have I prepared? How did I prepared them? What tools do I have at-the-ready? This panel of Industry experts will lend their experiences and lessons learned to unpack those questions as well as navigate us through the following:

  • What threats are most likely to cause the biggest disruption?
  • What are you doing now to protect your environment - and where are your biggest gaps?
  • How can we leverage all of the security controls in our environment for an effective, layered defense?
  • 06:30 PM
  • 07:29 PM
Strategies to Mitigate Risk and Exposure During Your Merger or Acquisition

2021 M&A transactions were up 55% in the U.S. over 2020. And 2022 is on pace to be even bigger. This wave of post-Covid M&A demands that cyber security leaders improve their efficacy. Panelists for this session are seasoned practitioners who are eager to share their experiences from the initial phase during due diligence through day-one integration of the M&A cycle: 

  • Ensure that a subsidiary cannot expose the parent company to cyber risks through the M&A process
  • Be a player and practice due diligence in the M&A process from start to integration

Leverage integrated risk assessments and automated smart questionnaires to gain a real-time snapshot into what a company’s cyber risk posture and overall GRC looks like

  • 06:30 PM
  • 07:29 PM
Clouded Judgment: Why Security & Cloud Are Aligned

The perceived conflict between profitability and speed to market versus security is rife in our organizations. Understanding this is important, and combating it is crucial. Cyber security leaders guide and influence the discussion, and thereby mindset, as both are indispensable to business goals. Making cloud secure is our best path forward. What are the necessary building blocks, and how can you create and promote a secure cloud strategy?

  • Discuss key points to win converts to a security mindset
  • Deal with M&As that have existing cloud environments
  • Retool teams and install effective guard rails
  • What role can compliance play?
  • 06:30 PM
  • 07:29 PM
Why Strong Partnerships With Executive Leadership Are Essential for Good Data Governance

A recent nationwide survey 23% of CISOs report to the CEO, while nearly 45% reported into a CIO. With Data Governance ultimately being about people, processes, and technology--the foundation for data governance—are “musts.” In this session, you will hear from practitioners who have actuated strong partnerships with executives. They will share:  

  • Tried and true approaches for getting buy-in and clear ownership 
  • Strategies for breaking down data silos
  • Approaches to find the right balance between flexibility and data governance standards
  • 06:30 PM
  • 07:29 PM
The Future of Ransomware and Evolving Attacks

Adaptations are needed to keep pace with the changing ransomware environment. This panel will address what you should be ready for. They will also debate valid and invalid approaches to minimizing risk -from technology, government and other activities that will influence how organizations can to respond to threats. This panel will:

  • Discuss current trends for ransomware attacks 
  • Look at the impact of the changing environment on insurance premiums
  • Debate whether norms or regulations should dictate payments
  • Address critical strategies and aspects to being successful in defending against attacks       
Closing Comments
  • 07:30 PM
  • 07:59 PM

ISMG Engage Princeton, New Jersey will address the top threats, risks and security needs facing the healthcare sector, including the most critical cybersecurity challenges and lessons emerging from the global pandemic. Join our attendees and subject matter experts to learn more about strategies and tactics to defend against and respond to ransomware and other disruptive cyberattacks; bolster medical device security; prevent and detect privacy breaches; tackle identity and access issues; address telehealth challenges, and manage other leading cybersecurity concerns.
ISMG Engage provides an in-person opportunity for executives to learn from each other and network. Join the largest community of security leaders for on-site, closed-door ’Deep Dive’ discussions designed to provide engaging insight on the latest threats, technology and solutions to apply in your place of work.

Princeton, NJ
Name :
Princeton, NJ

Josh Corman
Former Chief Strategist
CISA COVID Task Force
Corman, is a founder of the grassroots advocacy group I Am The Cavalry. Most recently, he was the healthcare sector chief strategist at DHS CISA on matters relating to COVID-19 and public safety. He previously served as chief security officer...
Rob Suarez
VP & CISO
BD (Becton, Dickinson & Company)
Roberto (Rob) Suárez is a cybersecurity and privacy professional in the medical device and healthcare IT industry. At BD, Rob serves as Chief Information Security Officer and strategic leader for information security. In this role Rob is responsible for developing...
Scott Nichols
Global Product Security Leader
Danaher Corporation
Mr. Nichols has over 25 years of experience in the Information Security and Healthcare Technology industries. Mr. Nichols leads the Global Product Security program at Danaher Corporation, representing over 30 companies, including 4 medical device manufactures and 8 life sciences...
Suzanne Schwartz
Director for Strategic Partnerships & Technology Innovation at the Center for Devices and Radiological Health
FDA
Suzanne B. Schwartz, MD, MBA is the Director of the Office of Strategic Partnerships and Technology Innovation (OST) at FDA’s Center for Devices & Radiological Health (CDRH). Suzanne’s work in medical device cybersecurity includes raising awareness, educating, outreach, partnering and...
Nicholas Heesters
Attorney, Senior Advisor For Cybersecurity
HHS Office For Civil Rights
Nicholas Heesters is a certified information privacy professional with over 25 years of experience supporting technology and information security efforts in many diverse industries including financial services, government, defense, education and healthcare. He earned a Master of Engineering in Computer...

View Agenda
Welcome and Keynote Address
  • 04:00 PM
  • 04:44 PM
Networking Break
  • 04:45 PM
  • 04:59 PM
  • 05:00 PM
  • 05:59 PM
How to Keep Your Security Programs Proactive in an Ever-Evolving Threat Landscape

Cybersecurity strategies are shifting from a reactive stance to proactive approach. This change gives organizations the ability to be more agile with their security program. In this keynote session, our panel of industry experts will share their experience and insights on:

  • Is it possible to be prepared for the unknown cyber threat?
  • Team retention and talent acquisitions, including strategies for different generations
  • Promoting and driving a security and risk-aware culture
  • Current threat landscape’s most prevalent features-Cloud Security/Attacks, Human Error, Evil Proxy
  • 05:00 PM
  • 05:59 PM
The Future of Ransomware and Evolving Attacks

Adaptations are needed to keep pace with the changing ransomware environment. This panel will address what you should be ready for. They will also debate valid and invalid approaches to minimizing risk -from technology, government and other activities that will influence how organizations can to respond to threats. This panel will:

  • Discuss current trends for ransomware attacks 
  • Look at the impact of the changing environment on insurance premiums
  • Debate whether norms or regulations should dictate payments

Address critical strategies and aspects to being successful in defending against attacks

  • 05:00 PM
  • 05:59 PM
Cyber Warfare: A New Playbook. How Cyber, Conventional Warfare and Disinformation/MDM Constitute a Unified Playbook

The nature of warfare is changing. As conventional, cyber and information warfare converge into a highly refined and devastating playbook, we need to rethink many aspects of the way we implement defense tactics. This panel of public and private sector experts will dissect:

  • The evolution of Russian tactics-from the annexation of Crimea to the invasion of Ukraine
  • How the Perception War and MDM are taking center stage in modern conflict and shaping world events
  • Why we need an integrated playbook and how should this shape our defensive strategy
  • 05:00 PM
  • 05:59 PM
Risk Management for a New Era: Maturity Models and Evolution of Security Programs

A recent nationwide survey 23% of CISOs report to the CEO, while nearly 45% reported into a CIO. With Data Governance ultimately being about people, processes, and technology--the foundation for data governance—are “musts.” In this session, you will hear from practitioners who have actuated strong partnerships with executives. They will share:  

  • Tried and true approaches for getting buy-in and clear ownership 
  • Strategies for breaking down data silos
  • Approaches to find the right balance between flexibility and data governance standards
  • 05:00 PM
  • 05:59 PM
Little Device Big Threat! - IoT Attacks, Vulnerabilities and Prolific Risk

The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption. Join us to learn more about where IoT is headed and how you can stay safe while still reaping the benefits of a digital world.  This session will illuminate

  • Biggest threats based on trending attacks  
  • Challenges of IoT security based on common vulnerabilities
  • Vulnerabilities caused by new technologies
  • Strategies for securing huge attack surfaces
  • Regulatory and compliance issues rising from third-party partnerships
  • 05:00 PM
  • 05:59 PM
Incident Response: Are You Prepared for Your Organization's Worst Day?

It's not a matter of "if" the next cyberattack will strike--it's a matter of "when.” The extent of your preparedness is one of the biggest factors determining what that day (and beyond) is going to be like for you and your organization.
 When that day arrives, it’s too late to ask: Who have I prepared? How did I prepared them? What tools do I have at-the-ready? This panel of Industry experts will lend their experiences and lessons learned to unpack those questions as well as navigate us through the following:

  • What threats are most likely to cause the biggest disruption?
  • What are you doing now to protect your environment - and where are your biggest gaps?
  • How can we leverage all of the security controls in our environment for an effective, layered defense?
  • 05:00 PM
  • 05:59 PM
Strategies to Mitigate Risk and Exposure During Your Merger or Acquisition

2021 M&A transactions were up 55% in the U.S. over 2020. And 2022 is on pace to be even bigger. This wave of post-Covid M&A demands that cyber security leaders improve their efficacy. Panelists for this session are seasoned practitioners who are eager to share their experiences from the initial phase during due diligence through day-one integration of the M&A cycle: 

  • Ensure that a subsidiary cannot expose the parent company to cyber risks through the M&A process
  • Be a player and practice due diligence in the M&A process from start to integration
  • Leverage integrated risk assessments and automated smart questionnaires to gain a real-time snapshot into what a company’s cyber risk posture and overall GRC looks like
  • 05:00 PM
  • 05:59 PM
Clouded Judgment: Why Security & Cloud Are Aligned

The perceived conflict between profitability and speed to market versus security is rife in our organizations. Understanding this is important, and combating it is crucial. Cyber security leaders guide and influence the discussion, and thereby mindset, as both are indispensable to business goals. Making cloud secure is our best path forward. What are the necessary building blocks, and how can you create and promote a secure cloud strategy?

  • Discuss key points to win converts to a security mindset
  • Deal with M&As that have existing cloud environments
  • Retool teams and install effective guard rails

What role can compliance play?

  • 05:00 PM
  • 05:59 PM
Why Strong Partnerships With Executive Leadership Are Essential for Good Data Governance

A recent nationwide survey 23% of CISOs report to the CEO, while nearly 45% reported into a CIO. With Data Governance ultimately being about people, processes, and technology--the foundation for data governance—are “musts.” In this session, you will hear from practitioners who have actuated strong partnerships with executives. They will share:  

  • Tried and true approaches for getting buy-in and clear ownership 
  • Strategies for breaking down data silos
  • Approaches to find the right balance between flexibility and data governance standards
  • 05:00 PM
  • 05:59 PM
Third-Party Selection and Management: What You Need to Know and Do Before and After You Sign

The need for third-party risk management has never been greater. Even though the risks to your company, customers and partners can be substantial, the processes, methods, and mediums used today are frequently flawed and even potentially misleading. In this panel discussion we dive into:

  • What does the current TPRM risk landscape look like today?
  • What’s working and not working in TPRM?
  • What are the risks and mitigation strategies?
  • Best practices and recommendations for an effective program and what’s needed in the future
Refreshment Break
  • 06:00 PM
  • 06:29 PM
  • 06:30 PM
  • 07:29 PM
Risk Management for a New Era: Maturity Models and Evolution of Security Programs

A recent nationwide survey 23% of CISOs report to the CEO, while nearly 45% reported into a CIO. With Data Governance ultimately being about people, processes, and technology--the foundation for data governance—are “musts.” In this session, you will hear from practitioners who have actuated strong partnerships with executives. They will share:  

  • Tried and true approaches for getting buy-in and clear ownership 
  • Strategies for breaking down data silos
  • Approaches to find the right balance between flexibility and data governance standards
  • 06:30 PM
  • 07:29 PM
Cyber Warfare: A New Playbook. How Cyber, Conventional Warfare and Disinformation/MDM Constitute a Unified Playbook

The nature of warfare is changing. As conventional, cyber and information warfare converge into a highly refined and devastating playbook, we need to rethink many aspects of the way we implement defense tactics. This panel of public and private sector experts will dissect:

  • The evolution of Russian tactics-from the annexation of Crimea to the invasion of Ukraine
  • How the Perception War and MDM are taking center stage in modern conflict and shaping world events
  • Why we need an integrated playbook and how should this shape our defensive strategy
  • 06:30 PM
  • 07:29 PM
Little Device Big Threat! - IoT Attacks, Vulnerabilities and Prolific Risk

The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption. Join us to learn more about where IoT is headed and how you can stay safe while still reaping the benefits of a digital world.  This session will illuminate

  • Biggest threats based on trending attacks  
  • Challenges of IoT security based on common vulnerabilities
  • Vulnerabilities caused by new technologies
  • Strategies for securing huge attack surfaces
  • Regulatory and compliance issues rising from third-party partnerships
  • 06:30 PM
  • 07:29 PM
How to Keep Your Security Programs Proactive in an Ever-Evolving Threat Landscape

Cybersecurity strategies are shifting from a reactive stance to proactive approach. This change gives organizations the ability to be more agile with their security program. In this keynote session, our panel of industry experts will share their experience and insights on:

  • Is it possible to be prepared for the unknown cyber threat?
  • Team retention and talent acquisitions, including strategies for different generations
  • Promoting and driving a security and risk-aware culture
  • Current threat landscape’s most prevalent features-Cloud Security/Attacks, Human Error, Evil Proxy
  • 06:30 PM
  • 07:29 PM
Third-Party Selection and Management: What You Need to Know and Do Before and After You Sign

The need for third-party risk management has never been greater. Even though the risks to your company, customers and partners can be substantial, the processes, methods, and mediums used today are frequently flawed and even potentially misleading. In this panel discussion we dive into:

  • What does the current TPRM risk landscape look like today?
  • What’s working and not working in TPRM?
  • What are the risks and mitigation strategies?
  • Best practices and recommendations for an effective program and what’s needed in the future
  • 06:30 PM
  • 07:29 PM
Incident Response: Are You Prepared for Your Organization's Worst Day?

It's not a matter of "if" the next cyberattack will strike--it's a matter of "when.” The extent of your preparedness is one of the biggest factors determining what that day (and beyond) is going to be like for you and your organization.
 When that day arrives, it’s too late to ask: Who have I prepared? How did I prepared them? What tools do I have at-the-ready? This panel of Industry experts will lend their experiences and lessons learned to unpack those questions as well as navigate us through the following:

  • What threats are most likely to cause the biggest disruption?
  • What are you doing now to protect your environment - and where are your biggest gaps?
  • How can we leverage all of the security controls in our environment for an effective, layered defense?
  • 06:30 PM
  • 07:29 PM
Strategies to Mitigate Risk and Exposure During Your Merger or Acquisition

2021 M&A transactions were up 55% in the U.S. over 2020. And 2022 is on pace to be even bigger. This wave of post-Covid M&A demands that cyber security leaders improve their efficacy. Panelists for this session are seasoned practitioners who are eager to share their experiences from the initial phase during due diligence through day-one integration of the M&A cycle: 

  • Ensure that a subsidiary cannot expose the parent company to cyber risks through the M&A process
  • Be a player and practice due diligence in the M&A process from start to integration

Leverage integrated risk assessments and automated smart questionnaires to gain a real-time snapshot into what a company’s cyber risk posture and overall GRC looks like

  • 06:30 PM
  • 07:29 PM
Clouded Judgment: Why Security & Cloud Are Aligned

The perceived conflict between profitability and speed to market versus security is rife in our organizations. Understanding this is important, and combating it is crucial. Cyber security leaders guide and influence the discussion, and thereby mindset, as both are indispensable to business goals. Making cloud secure is our best path forward. What are the necessary building blocks, and how can you create and promote a secure cloud strategy?

  • Discuss key points to win converts to a security mindset
  • Deal with M&As that have existing cloud environments
  • Retool teams and install effective guard rails
  • What role can compliance play?
  • 06:30 PM
  • 07:29 PM
Why Strong Partnerships With Executive Leadership Are Essential for Good Data Governance

A recent nationwide survey 23% of CISOs report to the CEO, while nearly 45% reported into a CIO. With Data Governance ultimately being about people, processes, and technology--the foundation for data governance—are “musts.” In this session, you will hear from practitioners who have actuated strong partnerships with executives. They will share:  

  • Tried and true approaches for getting buy-in and clear ownership 
  • Strategies for breaking down data silos
  • Approaches to find the right balance between flexibility and data governance standards
  • 06:30 PM
  • 07:29 PM
The Future of Ransomware and Evolving Attacks

Adaptations are needed to keep pace with the changing ransomware environment. This panel will address what you should be ready for. They will also debate valid and invalid approaches to minimizing risk -from technology, government and other activities that will influence how organizations can to respond to threats. This panel will:

  • Discuss current trends for ransomware attacks 
  • Look at the impact of the changing environment on insurance premiums
  • Debate whether norms or regulations should dictate payments
  • Address critical strategies and aspects to being successful in defending against attacks       
Closing Comments
  • 07:30 PM
  • 07:59 PM

Speaker Interviews

December 4, 2023

ISMG Engage - Princeton/New Jersey