As CISO of GSA, the largest real estate company in the world, Bo Berlas monitors, manages and secures thousands of devices. With over 21 years of combined information technology and cybersecurity experience spanning both private industry and the federal government, Bo shares details of how he developed an IoT/OT security roadmap, the challenges he has faced in the process, and how he approaches segmentation, supply chain management and device testing.
In this fireside chat Bo Berlas, CISO, GSA will discuss:
A Software Bill of Materials (“SBOM”) has been identified by the cybersecurity community as a key aspect of modern cybersecurity, including software security and supply chain security. . E.O. 14028 declares that “the trust we place in our digital infrastructure should be proportional to how trustworthy and transparent that infrastructure is, and to the consequences we will incur if that trust is misplaced.
In this session our panel of experts will explore and debate:
Cyber threat intelligence is focused on the ability to understand the current and potential future threats facing an organization or system. Some public and private sector organizations focus on collecting and analyzing the information necessary to develop cyber threat intelligence. Leveraging this intelligence to protect critical infrastructure systems can significantly enhance the ability to successfully defend against cyber-attacks. However, there are often challenges with getting this information to the right person and knowing what defense steps to take. These challenges can range from the fact that cyber threat intelligence is always sensitive and often classified, meaning it is closely held by a small group; or it is too vague to be of any practical use. This session will:
The cybersecurity threats and challenges involving medical devices just keep growing, potentially putting patient safety, data confidentiality and security at risk. This session will explore ways healthcare CISO and their teams can better address issues, including:
There are many options to choose from when selecting a framework for your cybersecurity program and typically your choice comes down to your industry vertical. We will have a discussion on the most commonly used enterprise level frameworks, what is needed to adopt them and how they provide benefit to your organization. Our expert panel will:
The promise of cryptocurrency, cross border value transfer at the speed of the internet, presents tremendous challenges for businesses and policy makers alike. However, according to our panel of experts, these challenges are far outweighed by the opportunities cryptocurrency provides.
Our expert panel will discuss the most notable crypto insights, and will:
Chief information security officers (CISOs) face unseen and unmanaged assets, resulting in poor asset hygiene and exploitable areas of an IT estate. Various cybersecurity solutions attempt to discover computing assets, but few are equipped to identify today’s expansive and complex attack surfaces
The National Institute of Standards and Technology is updating the Cybersecurity Framework to keep pace with the evolving cybersecurity risks, standards, and technology landscape. The NIST Cybersecurity Framework, originally developed for critical infrastructure sectors, is now viewed as foundational to securing organizations of all sectors and sizes around the world. Join this session to learn about the update process, including areas of focus, for the Cybersecurity Framework 2.0, as well as share your feedback about the use and potential improvements to the Framework.
Virtual currencies are beginning to play an increasingly prominent role in the global economy. The growing prevalence of virtual currency as a payment method, likewise brings greater exposure to sanctions risks—like the risk that a sanctioned person or a person in a jurisdiction subject to sanctions might be involved in a virtual currency transaction. Accordingly, the virtual currency industry, including technology companies, exchangers, administrators, miners, wallet providers, and users, plays an increasingly critical role in preventing sanctioned persons from exploiting virtual currencies to evade sanctions and undermine U.S. foreign policy and national security interests.
In this Exclusive Session with Lawrence Scheinert, Associate Director, Compliance and Enforcement, Office of Foreign Assets Control (OFAC) at U.S. Department of the Treasury he will:
Please click here to enter this session
Join this interactive session to discuss with the SBOM and how it will affect your organization. A Software Bill of Materials (“SBOM”) has been identified by the cybersecurity community as a key aspect of modern cybersecurity, including software security and supply chain security. E.O. 14028 declares that “the trust we place in our digital infrastructure should be proportional to how trustworthy and transparent that infrastructure is, and to the consequences we will incur if that trust is misplaced. In this session our panel of experts will explore and debate:
Cyber defense is increasingly becoming more important to the federal government’s overarching administrative agenda. There is an important need from the various organizations (CISA, DOE CESER, etc.), to incentivize the transition from collaboration, to cooperation within these distinct entities.
This panel will cover these strategies and will:
In the wake of the terrorist attacks from September 11, the Maritime Transportation Security Act (MTSA) was implemented across the commercial shipping industry in the United States. With the rise and evolving threat of cybersecurity attacks during the past decade, the Coast Guard has worked with public and private partnerships at America's ports to leverage the MTSA and enhance cybersecurity mitigation and resiliency at these ports. The industries operating in America's ports are critical components of multiple supply chains and often fall into multiple critical infrastructure categories.
Key takeaways include actionable insights to:
Crypto has been one of the top buzz words across all industries in 2022- from some of the most high-profile crimes involving crypto, to President Biden's historic executive order- but what does this actually mean for CISOs when it comes to their day-to-day security measures and implementation? This session will address what your organization should be cognizant of in the crypto regulatory landscape going into 2023. Join Cody Carbone, former Commissioner at U.S. Commodity Futures Trading Commission and the Chief Policy Officer at the Chamber of Digital Commerce, where he will:
Please click here to enter the session
During this live interactive session, attendees will have the opportunity to engage with NIST Fellow Ron Ross.
Ross will dive into the recently-revised NIST Special Publication 800-160, Volume 2, Revision 1, Developing Cyber-Resilient Systems: A Systems Security Engineering Approach. His current project is helping to update Volume 1, as well as 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations.
His primary interests: System and cyber resiliency and the importance of implementing well-established design principles for trustworthy secure systems.
In this exclusive live session, Ross will take questions directly from Summit attendees and speak about topics such as:
As banks, merchants and individuals continue to adopt faster payments, fraud is outpacing fraud prevention. How are patterns of fraudulent activity in faster payments different to traditional payment methods? How are the fraud actors collaborating within their fraud community? What are the technologies and controls we need to mitigate this criminality?
Our expert panel will share insights and strategies that will:
The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption. Join us to learn more about where IoT is headed and how you can stay safe while still reaping the benefits of a digital world. This session will illuminate
Since 2016, election security has emerged as one of the newest and most urgent aspects of critical infrastructure protection. And Elvis Chan of the FBI's San Francisco office has been at the forefront of assessing and mitigating election security threats. In this session, Chan will:
If we have learned anything from digital transformation, it's that fraud now comes in multiple forms across multiple vectors - simultaneously. And for financial services organizations to be able to spot and stop these schemes requires tearing down silos and building new partnerships like never before.
Claire Le Gal, a 26-year Mastercard veteran, shares exclusive insights, in which she will:
Governments and industries in the private sector are ever interested in using biometrics for automatically identify or authenticate people. Biometrics definitely appear like the “golden key” of security – it’s much harder to spoof an iris scan or fingerprint than a password! However, collection of biometric data also comes with its share of unique risks.
Come to this session to learn how Alaska Airlines has embraced the use of biometrics to streamline and improve the guest experience without compromising guest privacy and security of their data.
Please click here to enter the session
Join us for this exclusive, live and interactive video session. Our expert group of industry thought leaders will continue the conversation from their session earlier in the day - “Crypto's Promise: The Use of Digital Assets for Economic Prosperity.” Don’t miss out on your chance to ask these experts all of your pressing Crypto questions. Do you share their passion for Crypto, and believe that it can address humanitarian needs or do think it is the down fall of civilization? What does the FTX Bankruptcy mean for the rest of the industry? We look forward to this live conversation, see you there!
An acceleration in the pace of digital transformation has undoubtedly seen many consumers adopting mobile banking. However, criminals have also adapted to this new environment and have accordingly evolved their tactics in the form of increasingly sophisticated and targeted account takeover attacks. So how can we improve our detection and mitigation techniques to thwart fraudsters and protect consumers?
This expert panel will share insights and strategies, including:
Establishing trust within industry guidelines for crypto and other payments is crucial, but how is this trust truly built? Our expert speakers will take a deep dive into best practices for transparency, in which they will:
Since the late 90’s, our critical infrastructure has been under documented attack from various APTs, groups affiliated with nation states to include Russia. Russia’s directed cyber-attacks on the Ukraine are well documented, as is the intended blast radius to include the US and allies, which has been ramped up since the February 2022 invasion of the Ukraine. So how do we defend our critical infrastructure from this now and into the future? Our cybersecurity advice has not changed, merely has evolved to associate advice given for IT to also include OT and IoT basic hygienic solutions. Expect to learn key practices from our session, in which our panel of experts will:
Fast, convenient … free! It's not surprising that Zelle is America's most popular payment app. The peer-to-peer (P2P) payment service, created by a consortium of major US banks, lets users transfer funds directly between bank accounts at no charge. Unfortunately it's also proven popular with the fraudsters. Through well-crafted social engineering techniques, criminals are successfully duping consumers to make fraudulent transactions. How can we tackle the new challenge of P2P payment fraud?
This expert panel will share insights and strategies, where they will:
Technology has enabled humans to do more than we ever have before. Intelligent systems have reached our cars, bikes, scooters, and skateboards for use in navigation, streaming services, safety, and more. Controlled by critical ingredients, the smart city ecosystem ensures that we are protecting our most valuable assets, the human. Troy Leach, our expert speaker, will share his insights on how technology is being used for everyday living and safety and will:
If you talk to the energy sector, they will weave resilience into their cybersecurity discussions. For example, the electric, oil and gas, transportation, water and telecommunications sectors will look at cyber differently than health or financial sectors. Generally, the water, electric, and oil and gas sectors have more similarities and interdependencies than any other Critical Infrastructure sector combined. Our panel will shed light on some of the most effective cross-sector resilience strategies and will:
The energy sector puts significant resources into building systems that are resilient. These efforts have traditionally been focused on capacity building and preparing for potential natural disasters. The challenge of resilience changes when preparing for and recovering from a cyber-attack that may not be limited to a particular geographic area. This discussion will
"The same qualities that make crypto a force for good- decentralized cross border value transfer at the speed of the internet - also make it susceptible to illicit actors who want to move large amounts of funds quickly. While, in recent years, we have seen a proliferation of scams and fraud - from pig butchering to discord hacks, wash trading to rug pulls - we have also seen law savvy law enforcement and prosecutors at the state and federal level meet the challenge with new tools and expertise. Our panel of expert crypto investigators will:
Healthcare is among the most targeted critical infrastructure sectors. How are healthcare sector entities - and their CISOs and security teams - working with their peers, industry competitors, government agencies and information sharing organizations to help fend off the rising cyberthreats striking from so many different directions? This session will:
From brazen crypto fraud schemes to landmark arrests and an historic executive order, 2022 has been a watershed year for cryptocurrency. But how are global entities both using and regulating crypto, and what is the global outlook/influence?
Join government/crypto expert Ari Redbord for an entertaining and informative look at global governments’ approach to crypto, where he will:
All content from Day 1 will be available on demand on Day 2 and 3, Wednesday, December 14th and Thursday, December 15th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.
Chief information security officers (CISOs) face unseen and unmanaged assets, resulting in poor asset hygiene and exploitable areas of an IT estate. Various cybersecurity solutions attempt to discover computing assets, but few are equipped to identify today’s expansive and complex attack surfaces
Technology has enabled humans to do more than we ever have before. Intelligent systems have reached our cars, bikes, scooters, and skateboards for use in navigation, streaming services, safety, and more. Controlled by critical ingredients, the smart city ecosystem ensures that we are protecting our most valuable assets, the human. Troy Leach, our expert speaker, will share his insights on how technology is being used for everyday living and safety and will:
The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption. Join us to learn more about where IoT is headed and how you can stay safe while still reaping the benefits of a digital world. This session will illuminate
Governments and industries in the private sector are ever interested in using biometrics for automatically identify or authenticate people. Biometrics definitely appear like the “golden key” of security – it’s much harder to spoof an iris scan or fingerprint than a password! However, collection of biometric data also comes with its share of unique risks.
Come to this session to learn how Alaska Airlines has embraced the use of biometrics to streamline and improve the guest experience without compromising guest privacy and security of their data.
As CISO of GSA, the largest real estate company in the world, Bo Berlas monitors, manages and secures thousands of devices. With over 21 years of combined information technology and cybersecurity experience spanning both private industry and the federal government, Bo shares details of how he developed an IoT/OT security roadmap, the challenges he has faced in the process, and how he approaches segmentation, supply chain management and device testing.
In this fireside chat Bo Berlas, CISO, GSA will discuss:
A Software Bill of Materials (“SBOM”) has been identified by the cybersecurity community as a key aspect of modern cybersecurity, including software security and supply chain security. . E.O. 14028 declares that “the trust we place in our digital infrastructure should be proportional to how trustworthy and transparent that infrastructure is, and to the consequences we will incur if that trust is misplaced.
In this session our panel of experts will explore and debate:
The cybersecurity threats and challenges involving medical devices just keep growing, potentially putting patient safety, data confidentiality and security at risk. This session will explore ways healthcare CISO and their teams can better address issues, including:
An acceleration in the pace of digital transformation has undoubtedly seen many consumers adopting mobile banking. However, criminals have also adapted to this new environment and have accordingly evolved their tactics in the form of increasingly sophisticated and targeted account takeover attacks. So how can we improve our detection and mitigation techniques to thwart fraudsters and protect consumers?
This expert panel will share insights and strategies, including:
Cyber threat intelligence is focused on the ability to understand the current and potential future threats facing an organization or system. Some public and private sector organizations focus on collecting and analyzing the information necessary to develop cyber threat intelligence. Leveraging this intelligence to protect critical infrastructure systems can significantly enhance the ability to successfully defend against cyber-attacks. However, there are often challenges with getting this information to the right person and knowing what defense steps to take. These challenges can range from the fact that cyber threat intelligence is always sensitive and often classified, meaning it is closely held by a small group; or it is too vague to be of any practical use. This session will:
The National Institute of Standards and Technology is updating the Cybersecurity Framework to keep pace with the evolving cybersecurity risks, standards, and technology landscape. The NIST Cybersecurity Framework, originally developed for critical infrastructure sectors, is now viewed as foundational to securing organizations of all sectors and sizes around the world. Join this session to learn about the update process, including areas of focus, for the Cybersecurity Framework 2.0, as well as share your feedback about the use and potential improvements to the Framework.
There are many options to choose from when selecting a framework for your cybersecurity program and typically your choice comes down to your industry vertical. We will have a discussion on the most commonly used enterprise level frameworks, what is needed to adopt them and how they provide benefit to your organization. Our expert panel will:
Cyber defense is increasingly becoming more important to the federal government’s overarching administrative agenda. There is an important need from the various organizations (CISA, DOE CESER, etc.), to incentivize the transition from collaboration, to cooperation within these distinct entities.
This panel will cover these strategies and will:
In the wake of the terrorist attacks from September 11, the Maritime Transportation Security Act (MTSA) was implemented across the commercial shipping industry in the United States. With the rise and evolving threat of cybersecurity attacks during the past decade, the Coast Guard has worked with public and private partnerships at America's ports to leverage the MTSA and enhance cybersecurity mitigation and resiliency at these ports. The industries operating in America's ports are critical components of multiple supply chains and often fall into multiple critical infrastructure categories.
Key takeaways include actionable insights to:
Healthcare is among the most targeted critical infrastructure sectors. How are healthcare sector entities - and their CISOs and security teams - working with their peers, industry competitors, government agencies and information sharing organizations to help fend off the rising cyberthreats striking from so many different directions? This session will:
Since 2016, election security has emerged as one of the newest and most urgent aspects of critical infrastructure protection. And Elvis Chan of the FBI's San Francisco office has been at the forefront of assessing and mitigating election security threats. In this session, Chan will:
The energy sector puts significant resources into building systems that are resilient. These efforts have traditionally been focused on capacity building and preparing for potential natural disasters. The challenge of resilience changes when preparing for and recovering from a cyber-attack that may not be limited to a particular geographic area. This discussion will
Since the late 90’s, our critical infrastructure has been under documented attack from various APTs, groups affiliated with nation states to include Russia. Russia’s directed cyber-attacks on the Ukraine are well documented, as is the intended blast radius to include the US and allies, which has been ramped up since the February 2022 invasion of the Ukraine. So how do we defend our critical infrastructure from this now and into the future? Our cybersecurity advice has not changed, merely has evolved to associate advice given for IT to also include OT and IoT basic hygienic solutions. Expect to learn key practices from our session, in which our panel of experts will:
If you talk to the energy sector, they will weave resilience into their cybersecurity discussions. For example, the electric, oil and gas, transportation, water and telecommunications sectors will look at cyber differently than health or financial sectors. Generally, the water, electric, and oil and gas sectors have more similarities and interdependencies than any other Critical Infrastructure sector combined. Our panel will shed light on some of the most effective cross-sector resilience strategies and will:
From brazen crypto fraud schemes to landmark arrests and an historic executive order, 2022 has been a watershed year for cryptocurrency. But how are global entities both using and regulating crypto, and what is the global outlook/influence?
Join government/crypto expert Ari Redbord for an entertaining and informative look at global governments’ approach to crypto, where he will:
If we have learned anything from digital transformation, it's that fraud now comes in multiple forms across multiple vectors - simultaneously. And for financial services organizations to be able to spot and stop these schemes requires tearing down silos and building new partnerships like never before.
Claire Le Gal, a 26-year Mastercard veteran, shares exclusive insights, in which she will:
As banks, merchants and individuals continue to adopt faster payments, fraud is outpacing fraud prevention. How are patterns of fraudulent activity in faster payments different to traditional payment methods? How are the fraud actors collaborating within their fraud community? What are the technologies and controls we need to mitigate this criminality?
Our expert panel will share insights and strategies that will:
Crypto has been one of the top buzz words across all industries in 2022- from some of the most high-profile crimes involving crypto, to President Biden's historic executive order- but what does this actually mean for CISOs when it comes to their day-to-day security measures and implementation? This session will address what your organization should be cognizant of in the crypto regulatory landscape going into 2023. Join Cody Carbone, former Commissioner at U.S. Commodity Futures Trading Commission and the Chief Policy Officer at the Chamber of Digital Commerce, where he will:
The promise of cryptocurrency, cross border value transfer at the speed of the internet, presents tremendous challenges for businesses and policy makers alike. However, according to our panel of experts, these challenges are far outweighed by the opportunities cryptocurrency provides.
Our expert panel will discuss the most notable crypto insights, and will:
Virtual currencies are beginning to play an increasingly prominent role in the global economy. The growing prevalence of virtual currency as a payment method, likewise brings greater exposure to sanctions risks—like the risk that a sanctioned person or a person in a jurisdiction subject to sanctions might be involved in a virtual currency transaction. Accordingly, the virtual currency industry, including technology companies, exchangers, administrators, miners, wallet providers, and users, plays an increasingly critical role in preventing sanctioned persons from exploiting virtual currencies to evade sanctions and undermine U.S. foreign policy and national security interests.
In this Exclusive Session with Lawrence Scheinert, Associate Director, Compliance and Enforcement, Office of Foreign Assets Control (OFAC) at U.S. Department of the Treasury he will:
Fast, convenient … free! It's not surprising that Zelle is America's most popular payment app. The peer-to-peer (P2P) payment service, created by a consortium of major US banks, lets users transfer funds directly between bank accounts at no charge. Unfortunately it's also proven popular with the fraudsters. Through well-crafted social engineering techniques, criminals are successfully duping consumers to make fraudulent transactions. How can we tackle the new challenge of P2P payment fraud?
This expert panel will share insights and strategies, where they will:
Establishing trust within industry guidelines for crypto and other payments is crucial, but how is this trust truly built? Our expert speakers will take a deep dive into best practices for transparency, in which they will:
"The same qualities that make crypto a force for good- decentralized cross border value transfer at the speed of the internet - also make it susceptible to illicit actors who want to move large amounts of funds quickly. While, in recent years, we have seen a proliferation of scams and fraud - from pig butchering to discord hacks, wash trading to rug pulls - we have also seen law savvy law enforcement and prosecutors at the state and federal level meet the challenge with new tools and expertise. Our panel of expert crypto investigators will:
As CISO of GSA, the largest real estate company in the world, Bo Berlas monitors, manages and secures thousands of devices. With over 21 years of combined information technology and cybersecurity experience spanning both private industry and the federal government, Bo shares details of how he developed an IoT/OT security roadmap, the challenges he has faced in the process, and how he approaches segmentation, supply chain management and device testing.
In this fireside chat Bo Berlas, CISO, GSA will discuss:
A Software Bill of Materials (“SBOM”) has been identified by the cybersecurity community as a key aspect of modern cybersecurity, including software security and supply chain security. . E.O. 14028 declares that “the trust we place in our digital infrastructure should be proportional to how trustworthy and transparent that infrastructure is, and to the consequences we will incur if that trust is misplaced.
In this session our panel of experts will explore and debate:
Cyber threat intelligence is focused on the ability to understand the current and potential future threats facing an organization or system. Some public and private sector organizations focus on collecting and analyzing the information necessary to develop cyber threat intelligence. Leveraging this intelligence to protect critical infrastructure systems can significantly enhance the ability to successfully defend against cyber-attacks. However, there are often challenges with getting this information to the right person and knowing what defense steps to take. These challenges can range from the fact that cyber threat intelligence is always sensitive and often classified, meaning it is closely held by a small group; or it is too vague to be of any practical use. This session will:
The cybersecurity threats and challenges involving medical devices just keep growing, potentially putting patient safety, data confidentiality and security at risk. This session will explore ways healthcare CISO and their teams can better address issues, including:
There are many options to choose from when selecting a framework for your cybersecurity program and typically your choice comes down to your industry vertical. We will have a discussion on the most commonly used enterprise level frameworks, what is needed to adopt them and how they provide benefit to your organization. Our expert panel will:
The promise of cryptocurrency, cross border value transfer at the speed of the internet, presents tremendous challenges for businesses and policy makers alike. However, according to our panel of experts, these challenges are far outweighed by the opportunities cryptocurrency provides.
Our expert panel will discuss the most notable crypto insights, and will:
Chief information security officers (CISOs) face unseen and unmanaged assets, resulting in poor asset hygiene and exploitable areas of an IT estate. Various cybersecurity solutions attempt to discover computing assets, but few are equipped to identify today’s expansive and complex attack surfaces
The National Institute of Standards and Technology is updating the Cybersecurity Framework to keep pace with the evolving cybersecurity risks, standards, and technology landscape. The NIST Cybersecurity Framework, originally developed for critical infrastructure sectors, is now viewed as foundational to securing organizations of all sectors and sizes around the world. Join this session to learn about the update process, including areas of focus, for the Cybersecurity Framework 2.0, as well as share your feedback about the use and potential improvements to the Framework.
Virtual currencies are beginning to play an increasingly prominent role in the global economy. The growing prevalence of virtual currency as a payment method, likewise brings greater exposure to sanctions risks—like the risk that a sanctioned person or a person in a jurisdiction subject to sanctions might be involved in a virtual currency transaction. Accordingly, the virtual currency industry, including technology companies, exchangers, administrators, miners, wallet providers, and users, plays an increasingly critical role in preventing sanctioned persons from exploiting virtual currencies to evade sanctions and undermine U.S. foreign policy and national security interests.
In this Exclusive Session with Lawrence Scheinert, Associate Director, Compliance and Enforcement, Office of Foreign Assets Control (OFAC) at U.S. Department of the Treasury he will:
Please click here to enter this session
Join this interactive session to discuss with the SBOM and how it will affect your organization. A Software Bill of Materials (“SBOM”) has been identified by the cybersecurity community as a key aspect of modern cybersecurity, including software security and supply chain security. E.O. 14028 declares that “the trust we place in our digital infrastructure should be proportional to how trustworthy and transparent that infrastructure is, and to the consequences we will incur if that trust is misplaced. In this session our panel of experts will explore and debate:
Cyber defense is increasingly becoming more important to the federal government’s overarching administrative agenda. There is an important need from the various organizations (CISA, DOE CESER, etc.), to incentivize the transition from collaboration, to cooperation within these distinct entities.
This panel will cover these strategies and will:
In the wake of the terrorist attacks from September 11, the Maritime Transportation Security Act (MTSA) was implemented across the commercial shipping industry in the United States. With the rise and evolving threat of cybersecurity attacks during the past decade, the Coast Guard has worked with public and private partnerships at America's ports to leverage the MTSA and enhance cybersecurity mitigation and resiliency at these ports. The industries operating in America's ports are critical components of multiple supply chains and often fall into multiple critical infrastructure categories.
Key takeaways include actionable insights to:
Crypto has been one of the top buzz words across all industries in 2022- from some of the most high-profile crimes involving crypto, to President Biden's historic executive order- but what does this actually mean for CISOs when it comes to their day-to-day security measures and implementation? This session will address what your organization should be cognizant of in the crypto regulatory landscape going into 2023. Join Cody Carbone, former Commissioner at U.S. Commodity Futures Trading Commission and the Chief Policy Officer at the Chamber of Digital Commerce, where he will:
Please click here to enter the session
During this live interactive session, attendees will have the opportunity to engage with NIST Fellow Ron Ross.
Ross will dive into the recently-revised NIST Special Publication 800-160, Volume 2, Revision 1, Developing Cyber-Resilient Systems: A Systems Security Engineering Approach. His current project is helping to update Volume 1, as well as 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations.
His primary interests: System and cyber resiliency and the importance of implementing well-established design principles for trustworthy secure systems.
In this exclusive live session, Ross will take questions directly from Summit attendees and speak about topics such as:
As banks, merchants and individuals continue to adopt faster payments, fraud is outpacing fraud prevention. How are patterns of fraudulent activity in faster payments different to traditional payment methods? How are the fraud actors collaborating within their fraud community? What are the technologies and controls we need to mitigate this criminality?
Our expert panel will share insights and strategies that will:
The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption. Join us to learn more about where IoT is headed and how you can stay safe while still reaping the benefits of a digital world. This session will illuminate
Since 2016, election security has emerged as one of the newest and most urgent aspects of critical infrastructure protection. And Elvis Chan of the FBI's San Francisco office has been at the forefront of assessing and mitigating election security threats. In this session, Chan will:
If we have learned anything from digital transformation, it's that fraud now comes in multiple forms across multiple vectors - simultaneously. And for financial services organizations to be able to spot and stop these schemes requires tearing down silos and building new partnerships like never before.
Claire Le Gal, a 26-year Mastercard veteran, shares exclusive insights, in which she will:
Governments and industries in the private sector are ever interested in using biometrics for automatically identify or authenticate people. Biometrics definitely appear like the “golden key” of security – it’s much harder to spoof an iris scan or fingerprint than a password! However, collection of biometric data also comes with its share of unique risks.
Come to this session to learn how Alaska Airlines has embraced the use of biometrics to streamline and improve the guest experience without compromising guest privacy and security of their data.
Please click here to enter the session
Join us for this exclusive, live and interactive video session. Our expert group of industry thought leaders will continue the conversation from their session earlier in the day - “Crypto's Promise: The Use of Digital Assets for Economic Prosperity.” Don’t miss out on your chance to ask these experts all of your pressing Crypto questions. Do you share their passion for Crypto, and believe that it can address humanitarian needs or do think it is the down fall of civilization? What does the FTX Bankruptcy mean for the rest of the industry? We look forward to this live conversation, see you there!
An acceleration in the pace of digital transformation has undoubtedly seen many consumers adopting mobile banking. However, criminals have also adapted to this new environment and have accordingly evolved their tactics in the form of increasingly sophisticated and targeted account takeover attacks. So how can we improve our detection and mitigation techniques to thwart fraudsters and protect consumers?
This expert panel will share insights and strategies, including:
Establishing trust within industry guidelines for crypto and other payments is crucial, but how is this trust truly built? Our expert speakers will take a deep dive into best practices for transparency, in which they will:
Since the late 90’s, our critical infrastructure has been under documented attack from various APTs, groups affiliated with nation states to include Russia. Russia’s directed cyber-attacks on the Ukraine are well documented, as is the intended blast radius to include the US and allies, which has been ramped up since the February 2022 invasion of the Ukraine. So how do we defend our critical infrastructure from this now and into the future? Our cybersecurity advice has not changed, merely has evolved to associate advice given for IT to also include OT and IoT basic hygienic solutions. Expect to learn key practices from our session, in which our panel of experts will:
Fast, convenient … free! It's not surprising that Zelle is America's most popular payment app. The peer-to-peer (P2P) payment service, created by a consortium of major US banks, lets users transfer funds directly between bank accounts at no charge. Unfortunately it's also proven popular with the fraudsters. Through well-crafted social engineering techniques, criminals are successfully duping consumers to make fraudulent transactions. How can we tackle the new challenge of P2P payment fraud?
This expert panel will share insights and strategies, where they will:
Technology has enabled humans to do more than we ever have before. Intelligent systems have reached our cars, bikes, scooters, and skateboards for use in navigation, streaming services, safety, and more. Controlled by critical ingredients, the smart city ecosystem ensures that we are protecting our most valuable assets, the human. Troy Leach, our expert speaker, will share his insights on how technology is being used for everyday living and safety and will:
If you talk to the energy sector, they will weave resilience into their cybersecurity discussions. For example, the electric, oil and gas, transportation, water and telecommunications sectors will look at cyber differently than health or financial sectors. Generally, the water, electric, and oil and gas sectors have more similarities and interdependencies than any other Critical Infrastructure sector combined. Our panel will shed light on some of the most effective cross-sector resilience strategies and will:
The energy sector puts significant resources into building systems that are resilient. These efforts have traditionally been focused on capacity building and preparing for potential natural disasters. The challenge of resilience changes when preparing for and recovering from a cyber-attack that may not be limited to a particular geographic area. This discussion will
"The same qualities that make crypto a force for good- decentralized cross border value transfer at the speed of the internet - also make it susceptible to illicit actors who want to move large amounts of funds quickly. While, in recent years, we have seen a proliferation of scams and fraud - from pig butchering to discord hacks, wash trading to rug pulls - we have also seen law savvy law enforcement and prosecutors at the state and federal level meet the challenge with new tools and expertise. Our panel of expert crypto investigators will:
Healthcare is among the most targeted critical infrastructure sectors. How are healthcare sector entities - and their CISOs and security teams - working with their peers, industry competitors, government agencies and information sharing organizations to help fend off the rising cyberthreats striking from so many different directions? This session will:
From brazen crypto fraud schemes to landmark arrests and an historic executive order, 2022 has been a watershed year for cryptocurrency. But how are global entities both using and regulating crypto, and what is the global outlook/influence?
Join government/crypto expert Ari Redbord for an entertaining and informative look at global governments’ approach to crypto, where he will:
All content from Day 1 will be available on demand on Day 2 and 3, Wednesday, December 14th and Thursday, December 15th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.
Chief information security officers (CISOs) face unseen and unmanaged assets, resulting in poor asset hygiene and exploitable areas of an IT estate. Various cybersecurity solutions attempt to discover computing assets, but few are equipped to identify today’s expansive and complex attack surfaces
Technology has enabled humans to do more than we ever have before. Intelligent systems have reached our cars, bikes, scooters, and skateboards for use in navigation, streaming services, safety, and more. Controlled by critical ingredients, the smart city ecosystem ensures that we are protecting our most valuable assets, the human. Troy Leach, our expert speaker, will share his insights on how technology is being used for everyday living and safety and will:
The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption. Join us to learn more about where IoT is headed and how you can stay safe while still reaping the benefits of a digital world. This session will illuminate
Governments and industries in the private sector are ever interested in using biometrics for automatically identify or authenticate people. Biometrics definitely appear like the “golden key” of security – it’s much harder to spoof an iris scan or fingerprint than a password! However, collection of biometric data also comes with its share of unique risks.
Come to this session to learn how Alaska Airlines has embraced the use of biometrics to streamline and improve the guest experience without compromising guest privacy and security of their data.
As CISO of GSA, the largest real estate company in the world, Bo Berlas monitors, manages and secures thousands of devices. With over 21 years of combined information technology and cybersecurity experience spanning both private industry and the federal government, Bo shares details of how he developed an IoT/OT security roadmap, the challenges he has faced in the process, and how he approaches segmentation, supply chain management and device testing.
In this fireside chat Bo Berlas, CISO, GSA will discuss:
A Software Bill of Materials (“SBOM”) has been identified by the cybersecurity community as a key aspect of modern cybersecurity, including software security and supply chain security. . E.O. 14028 declares that “the trust we place in our digital infrastructure should be proportional to how trustworthy and transparent that infrastructure is, and to the consequences we will incur if that trust is misplaced.
In this session our panel of experts will explore and debate:
The cybersecurity threats and challenges involving medical devices just keep growing, potentially putting patient safety, data confidentiality and security at risk. This session will explore ways healthcare CISO and their teams can better address issues, including:
An acceleration in the pace of digital transformation has undoubtedly seen many consumers adopting mobile banking. However, criminals have also adapted to this new environment and have accordingly evolved their tactics in the form of increasingly sophisticated and targeted account takeover attacks. So how can we improve our detection and mitigation techniques to thwart fraudsters and protect consumers?
This expert panel will share insights and strategies, including:
Cyber threat intelligence is focused on the ability to understand the current and potential future threats facing an organization or system. Some public and private sector organizations focus on collecting and analyzing the information necessary to develop cyber threat intelligence. Leveraging this intelligence to protect critical infrastructure systems can significantly enhance the ability to successfully defend against cyber-attacks. However, there are often challenges with getting this information to the right person and knowing what defense steps to take. These challenges can range from the fact that cyber threat intelligence is always sensitive and often classified, meaning it is closely held by a small group; or it is too vague to be of any practical use. This session will:
The National Institute of Standards and Technology is updating the Cybersecurity Framework to keep pace with the evolving cybersecurity risks, standards, and technology landscape. The NIST Cybersecurity Framework, originally developed for critical infrastructure sectors, is now viewed as foundational to securing organizations of all sectors and sizes around the world. Join this session to learn about the update process, including areas of focus, for the Cybersecurity Framework 2.0, as well as share your feedback about the use and potential improvements to the Framework.
There are many options to choose from when selecting a framework for your cybersecurity program and typically your choice comes down to your industry vertical. We will have a discussion on the most commonly used enterprise level frameworks, what is needed to adopt them and how they provide benefit to your organization. Our expert panel will:
Cyber defense is increasingly becoming more important to the federal government’s overarching administrative agenda. There is an important need from the various organizations (CISA, DOE CESER, etc.), to incentivize the transition from collaboration, to cooperation within these distinct entities.
This panel will cover these strategies and will:
In the wake of the terrorist attacks from September 11, the Maritime Transportation Security Act (MTSA) was implemented across the commercial shipping industry in the United States. With the rise and evolving threat of cybersecurity attacks during the past decade, the Coast Guard has worked with public and private partnerships at America's ports to leverage the MTSA and enhance cybersecurity mitigation and resiliency at these ports. The industries operating in America's ports are critical components of multiple supply chains and often fall into multiple critical infrastructure categories.
Key takeaways include actionable insights to:
Healthcare is among the most targeted critical infrastructure sectors. How are healthcare sector entities - and their CISOs and security teams - working with their peers, industry competitors, government agencies and information sharing organizations to help fend off the rising cyberthreats striking from so many different directions? This session will:
Since 2016, election security has emerged as one of the newest and most urgent aspects of critical infrastructure protection. And Elvis Chan of the FBI's San Francisco office has been at the forefront of assessing and mitigating election security threats. In this session, Chan will:
The energy sector puts significant resources into building systems that are resilient. These efforts have traditionally been focused on capacity building and preparing for potential natural disasters. The challenge of resilience changes when preparing for and recovering from a cyber-attack that may not be limited to a particular geographic area. This discussion will
Since the late 90’s, our critical infrastructure has been under documented attack from various APTs, groups affiliated with nation states to include Russia. Russia’s directed cyber-attacks on the Ukraine are well documented, as is the intended blast radius to include the US and allies, which has been ramped up since the February 2022 invasion of the Ukraine. So how do we defend our critical infrastructure from this now and into the future? Our cybersecurity advice has not changed, merely has evolved to associate advice given for IT to also include OT and IoT basic hygienic solutions. Expect to learn key practices from our session, in which our panel of experts will:
If you talk to the energy sector, they will weave resilience into their cybersecurity discussions. For example, the electric, oil and gas, transportation, water and telecommunications sectors will look at cyber differently than health or financial sectors. Generally, the water, electric, and oil and gas sectors have more similarities and interdependencies than any other Critical Infrastructure sector combined. Our panel will shed light on some of the most effective cross-sector resilience strategies and will:
From brazen crypto fraud schemes to landmark arrests and an historic executive order, 2022 has been a watershed year for cryptocurrency. But how are global entities both using and regulating crypto, and what is the global outlook/influence?
Join government/crypto expert Ari Redbord for an entertaining and informative look at global governments’ approach to crypto, where he will:
If we have learned anything from digital transformation, it's that fraud now comes in multiple forms across multiple vectors - simultaneously. And for financial services organizations to be able to spot and stop these schemes requires tearing down silos and building new partnerships like never before.
Claire Le Gal, a 26-year Mastercard veteran, shares exclusive insights, in which she will:
As banks, merchants and individuals continue to adopt faster payments, fraud is outpacing fraud prevention. How are patterns of fraudulent activity in faster payments different to traditional payment methods? How are the fraud actors collaborating within their fraud community? What are the technologies and controls we need to mitigate this criminality?
Our expert panel will share insights and strategies that will:
Crypto has been one of the top buzz words across all industries in 2022- from some of the most high-profile crimes involving crypto, to President Biden's historic executive order- but what does this actually mean for CISOs when it comes to their day-to-day security measures and implementation? This session will address what your organization should be cognizant of in the crypto regulatory landscape going into 2023. Join Cody Carbone, former Commissioner at U.S. Commodity Futures Trading Commission and the Chief Policy Officer at the Chamber of Digital Commerce, where he will:
The promise of cryptocurrency, cross border value transfer at the speed of the internet, presents tremendous challenges for businesses and policy makers alike. However, according to our panel of experts, these challenges are far outweighed by the opportunities cryptocurrency provides.
Our expert panel will discuss the most notable crypto insights, and will:
Virtual currencies are beginning to play an increasingly prominent role in the global economy. The growing prevalence of virtual currency as a payment method, likewise brings greater exposure to sanctions risks—like the risk that a sanctioned person or a person in a jurisdiction subject to sanctions might be involved in a virtual currency transaction. Accordingly, the virtual currency industry, including technology companies, exchangers, administrators, miners, wallet providers, and users, plays an increasingly critical role in preventing sanctioned persons from exploiting virtual currencies to evade sanctions and undermine U.S. foreign policy and national security interests.
In this Exclusive Session with Lawrence Scheinert, Associate Director, Compliance and Enforcement, Office of Foreign Assets Control (OFAC) at U.S. Department of the Treasury he will:
Fast, convenient … free! It's not surprising that Zelle is America's most popular payment app. The peer-to-peer (P2P) payment service, created by a consortium of major US banks, lets users transfer funds directly between bank accounts at no charge. Unfortunately it's also proven popular with the fraudsters. Through well-crafted social engineering techniques, criminals are successfully duping consumers to make fraudulent transactions. How can we tackle the new challenge of P2P payment fraud?
This expert panel will share insights and strategies, where they will:
Establishing trust within industry guidelines for crypto and other payments is crucial, but how is this trust truly built? Our expert speakers will take a deep dive into best practices for transparency, in which they will:
"The same qualities that make crypto a force for good- decentralized cross border value transfer at the speed of the internet - also make it susceptible to illicit actors who want to move large amounts of funds quickly. While, in recent years, we have seen a proliferation of scams and fraud - from pig butchering to discord hacks, wash trading to rug pulls - we have also seen law savvy law enforcement and prosecutors at the state and federal level meet the challenge with new tools and expertise. Our panel of expert crypto investigators will:
December 13 - 15, 2022
Mission Critical: Securing Critical Infrastructure, Connected Devices, and Crypto & Payments