CSS22-enews-header_05-MAY-r image #cybersecuritysummit
Judy_Hatchett-262x272 image

JUDY HATCHETT — Co-chair of the 2022 Cyber Security Summit; CISO, Surescripts

As the co-chair of the Cyber Security Summit, I couldn’t be more excited to help shape this year’s program. Setting the vision is a key component of my role as a CISO while I focus on the execution of our enterprise’s risk and information and physical security programs. Our Eyes Wide Open theme hints at that wary eye we all must have as we look at our roles as the digital and physical guardians of our organization’s assets. As Cyber Security leaders we must be cognizant of the global and local threats and how they impact each of our industries.

Read more about Judy in her bio

Jeff-Norem-LI_300x300-262x272 image

JEFFREY NOREM — Co-chair of the 2022 Cyber Security Summit; Deputy CISO, Freddie Mac

Our Eyes Wide Open theme for the 12th Annual Cyber Security Summit resonates with me as a data protection and privacy leader watching 20+ years of cyber security across multiple industries. Now more than ever before is our global security being challenged at a continually rapid pace. 

Read more about Jeff in his bio

MEEKER_NEW-262x272 image

Cybersecurity practitioners have always had to deal with a lot of complexities, says Tina Meeker, Sr. Director of Information Security at Sleep Number, but today's macro and global environment is exponentially more complicated (and dangerous!) than it has ever been. From pandemics, a war in Europe, ransomware attacks, hacktivism, worker and food shortages and supply chain constraints (the list goes on). More than ever cybersecurity leaders and practitioners need to stay ahead of the game and be constantly on alert, or “eyes wide open.”  Read full blog post here

Kenyon_Brian_300x300-262x272 image

The modern web browser has become the single most used application by enterprises worldwide. Its power, simplicity, and optimal usability has made it an obvious choice at work. And yet, states Brian Kenyon Chief Strategy Officer of Island, the browser is not an enterprise application. It lacks the fundamental controls enterprises require to ensure proper security, visibility, and governance over their critical assets. As a result, we surround the browser with a massive security ecosystem attempting to manage the intersection between users, web applications, and the underlying data. Yet, in the process, our stack becomes too complex, expensive, and fragile to maintain, while end users are left with a frustrating experience. All because the consumer browser was not designed with enterprise needs in mind.

Read Brian's blog post here

costigan_300x300-262x272 image

The U.S. and its allies have a chance to finally mainstream cybersecurity, remarks Sean Costigan, Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies, placing it alongside other foreign policy priorities. Such mainstreaming has advantages that have traditionally played to the strengths of democracies: the building of alliances and public-private partnerships to help secure growth, predictability, and fair outcomes. 

Read full blog post here

Morgan_Brian_300x300-262x272 image

> read bio

MAJOR BRIAN MORGAN — Director, 177th Cyber Protection Team, U.S. Army Cyber Command Industrial Security Program Manager, Medtronic

We need collaboration now more than ever in the history of our craft. The Cyber Security Summit is a fantastic platform for industry professionals to socialize emerging ideas, help screen out useful innovations and paradigm shifts, visit with security industry leaders and product vendors, and cross pollinate with security-focused government, corporate, academic, and industry security professionals at all levels. As the DIRNSA General Nakasone says… “Partnerships are the coin of the realm.”

Treadwell-Shayla-new1003_300x300-262x272 image

> Read bio

SHAYLA TREADWELL, Ph.D. — Vice President, Cyber Center of Excellence, Governance, Risk & Compliance, ECS

The evolution of technology comes with many benefits – increased automation, additional piece of mind for families, access to educational resources, and more. However, its benefits also come with threats that continue to impact people and organizations daily. Over time many organizations have implemented new technologies and countermeasures to address potential vulnerabilities and threats. But the reality is when organizations strategically build inclusive security cultures where the business, IT, and cyber organizations work together, the collective is greater when addressing cyber risks. Today, no organization is safe no matter how big or small. It’s time to examine the real-world impact of the threat environment and how cybersecurity issues are beginning to hit closer to home.


CISA Issues Emergency Directive and Releases Advisory Related to VMware Vulnerabilities

CISA has issued Emergency Directive (ED) 22-03 and released a Cybersecurity Advisory (CSA) in response to active and expected exploitation of multiple vulnerabilities in the following VMware products: VMware Workspace ONE Access (Access), VMware Identity Manager (vIDM), VMware vRealize Automation (vRA), VMware Cloud Foundation, vRealize Suite Lifecycle Manager.

Threat Actors Exploiting F5 BIG IP CVE-2022-1388

CISA and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have released the joint Cybersecurity Advisory Threat Actors Exploiting F5 BIG-IP CVE-2022-1388 in response to active exploitation of CVE-2022-1388, which affects F5 Networks BIG-IP devices. The vulnerability allows an unauthenticated actor to gain control of affected systems via the management port or self-IP addresse

Spring Gala Fun!

Thanks Everyone for coming to the Cyber Security Summit Spring Gala!

Here is the Photo Collection from our Red Carpet and Blackjack Fun



Here are our Visionary Leadership Award Winners





Take time to Vote for Your Choices for our 2022 Leadership Awards click here

CSS-Gala-highlights-photo-frames image #cybersecuritysummit
Nominate Now!

Island, the Enterprise Browser enables the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility, and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders of the enterprise security and browser technology space and backed by the world’s leading venture funds — Sequoia Capital, Cyberstarts, Insight Partners, and Stripes Capital — Island is redefining the future of work for some of the largest, most respected enterprises in the world. Island is based in Dallas with operations in Tel Aviv, and can be reached at [email protected] or (866) 832 7114. https://island.io

island_Logo_H_for-White-BG_260x150 image

Thanks for joining our May Webinar featuring Brian Kenyon, Chief Strategy Officer, Island for "What if the browser was designed for the enterprise?" 

Global-Minnesota-logoV_260x150 image

Global Minnesota’s mission is advancing international understanding and engagement. This work includes many things, including the promotion student and professional exchanges, travel and tourism, and creating connections between Minnesotans and the world. All of these are enhanced by secure access to digital tools and technology. All of these are threatened by cyberattacks and cyber-criminal activities. We strongly believe that our Cyber Security Summit, now in our 12th year, is a crucial tool in the battle to keep ourselves, our families, our companies, and our community as a whole cyber-safe.

ISACA-MN_logo_260px image

With approximately 1200 members from over 100 organizations, the Minnesota chapter of ISACA provides a gateway to a global organization offering security, risk, control, privacy, and governance certifications. Additionally, ISACA offers a Certified Information Security Manager (CISM) certificate, as well as a Cybersecurity certification program (CSX) for both students and recent grads (Fundamental) as well as those with experienced skill sets (Practitioner.) To learn more, visit the chapter website.


Linkedin  Twitter  Facebook  

{Share this month's newsletter link} with your colleagues | Click here to view archived newsletters

This email was sent to you because of your relationship with Cyber Security Summit. If this email was forwarded to you, click here to be added to our monthly newsletter email list. Click here to receive our weekly conference and website updates.

©2011-2022, EventShows, LLC. All Rights Reserved.