Highlight Topics
- Enhancing Your Security Posture
- Third Party Risk Management
- Cyber Governance
- 5G Network Security and Business Opportunities
- Zero Trust
Chicago
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
This Session will discuss:
The DPO can help the CISO secure data more efficiently by collating only the most necessary data and keeping customers well-informed about the transfer and usage of data.
So, what are some best practices to improve collaboration?
This session will discuss:
Clearly, Modern Application Development, or MAD, processes and innovative, cloud-native approaches are critical for organizations to stay viable.
Not surprisingly, leadership support for MAD initiatives is building – and quickly. But MAD comes with cultural changes and some inherent application security challenges that need to be addressed proactively.
In this live session, we’ll cover what you’ll need to know about MAD, including:
What is a Solution Room?
The Solution Room is a highly engaging and interactive conference session that aims to provide cybersecurity leaders with peer-to-peer support and subject matter expertise to tackle their most pressing challenges. Through a combination of small group discussions, expert moderators, and support from U.S. Secret Service Agents, attendees will work through the lifecycle of a Business Email Compromise (BEC) attack.
What does participation in the Solution Room look like?
To enhance your learning experience, we invite you to join one of the ten tables for this collaborative session. Each table will be moderated by a knowledgeable CyberEdBoard member, and a U.S. Secret Service Agent will be present to provide valuable insights into law enforcement partnerships during a compromise.
To kick off the session, Tom Field, Senior Vice President of Editorial at ISMG, will set the stage with a fictitious Business Email Compromise (BEC) scenario. Each group will receive identical sets of questions and work collaboratively to find the answers. As the exercise progresses, new information will be revealed, adding unexpected twists and turns to the scenario. Through this dynamic approach, participants will be challenged to apply critical thinking skills and work as a cohesive team to effectively respond to the evolving situation. Our goal is to provide a stimulating and engaging learning experience that equips you with the skills and knowledge needed to handle real-world BEC scenarios.
Cybersecurity teams need processes and tools to measure ROI and manage data sprawl. What are the best ways to think about optimizing your existing and upcoming data investments, and how have others approached the issue?
In this panel, Randy Lariar, practice director with Optiv’s Big Data and Analytics, discusses what he sees in the market and challenges organizations faced with rationalizing data investments. Top business leaders join Lariar to discuss what has worked for their organizations and their perspectives on how others can successfully decide what data investments are right for them.
By shifting their focus “upstream,” adversaries can infect a single component that is then distributed “downstream” using legitimate software workflows and update mechanisms.
Next-generation cyberattacks targeting open-source software projects have increased 430% year-over-year. The attacks are possible because:
When adversaries deliberately and secretly inject malicious code into open-source projects, they can surreptitiously “set traps” upstream and then carry out attacks downstream. This session explores:
This exclusive panel tackles these questions as well as:
It is time to remove the calendar reminder for our certificate renewal. Health Applications can verify enrollment into corporate management systems without deploying certificates. Learn how this is done with some common asset management solutions.
RSVP here to attend our events. You can select for multiple or individual tickets.
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
Future Events