|
Cyber Security Summit Keynote
|
Solving the Puzzle: Collaboration, Imagination and Cybersecurity
In her keynote address at the 11th Annual Cyber Security Summit, Jen Easterly, Director, Cybersecurity and Infrastructure Security Agency (CISA), outlined CISA’s role as a unique, public-private collaborative entity designed to understand, manage, and reduce cybersecurity risk for all Americans.
Director Easterly outlined how CISA is witnessing a fundamental shift in the collaborative paradigm, moving from public-private partnerships into true operational collaboration. Changing from information sharing to information enabling. Making sure CISA provides timely, relevant and actionable data that can be used by network defenders to ensure the security of their environments.
|
|
Cyber Security & the Public Sector
|
Cybersecurity: Finding Common Ground in the Political Landscape
This session, hosted by two highly experienced cybersecurity-focused state legislators, Jim Nash, Assistant Minority Leader, Minnesota House of Representatives, and Jacqui Irwin, Assembly member, 44th District California State Assembly, emphasized the importance of non-partisan positions on cybersecurity. That to develop successful strategies, members from across the political spectrum had to work together.
Both Representative Nash and Assembly Member Irwin called for even further work to strengthen state governments digital infrastructure.
|
|
|
How to Collaborate Cyber Intelligence and Sharing Cyber Resources
This session stressed the importance of community development in the cybersecurity industry. Col. Teri Williams, Commander, 91st Cyber Brigade, Virginia Army National Guard, outlined how mindsets need to evolve, and whilst competition between commercial peers is natural, we need to remind ourselves that it’s us vs the adversary.
Our adversaries communicates better than we do. Col. Williams described several potential strategies to create an environment more conducive to effective information sharing:
- Dropping the shame game associated with breaches.
- Creating a culture that develops and shares post-breach playbooks. Detailing what information needs to be shared, at what times. Allowing organizations, when the fog of war has lifted, to generate lessons learned that will strengthen the community.
-
Joining an ISAC: member-driven organizations, delivering all-hazards threat and mitigation information to asset owners and operators.
|
|
|
Supporting Small Business
|
Practical Ways to Manage Risk as a Small Business
This Bremer Bank panel, moderated by Milinda Rambel Stone, CISO, Bremer Bank, featuring experts with backgrounds in cyber security, operations, fraud, and insurance, provided small business owners with practical information, advice and resources powered by real customer stories. This session sought to deepen knowledge of cyber security threats and outline what small businesses should be concerned about when it comes to banking and cyber security.
|
|
Melinda Rambel Stone
VP, CISO, Bremer Bank
|
|
Laura Burr
Deposit Administration Manager, VP, Bremer Bank
|
|
Joseph Chow
Specialized Business Solutions Center Director, Bremer Bank
|
|
Meredith Winegar
Mortgage and Trust Operations Director, Bremer Bank
|
|
Robert Worden
Insurance & Sales Education, Bremer Insurance
|
|
|
Resources for Even the Smallest Businesses
This session outlined meaningful steps that can be used to start you on the path to protecting your organization. Brian McDonald, District Director, SBA, focused on the free resources available from the SBA who can help business owners with:
- Analysis of common threats.
- Business risk assessments.
- Cybersecurity best practices
- Available training sessions and events.
He also outlined three steps you can take to make your business less vulnerable:
- Assess your business risk.
- Train your employees.
- Protect sensitive data & back up the rest.
|
|
|
2021 Summit Recommended Reading:
- Ira Winkler, You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions
- Charles W. Laingen, Laingen on Leadership
- Daniel W. Drezner, Henry Farrell, and Abraham L. Newman, The uses and abuses of weaponized interdependence. Brookings, 2021.
- Gary Sorrentino, 2021, Sept 1. The Human Variable: Designing a security strategy for a future in flux. In the Cyber Security: A Peer-Reviewed Journal, Volume 5, Issue 1.
|
|
Judy Hatchett
CISO, Surescripts
|
|
The 11th Annual MN Cyber Security Summit “Power and Peril of Connection” sums up a lot of what most CISO and security likeminded folks think about every day. Staying personally connected, building your personal network and helping others get connected. Just that statement alone can help chip away at the shortage of cyber security personnel in this industry. This was the first year where I saw this topic across so many of the tracks - Women in Cyber Security/WiCyS Minnesota; Healthcare and Medical Device; IoT/IIoT/ICS/SCADA; Public Sector and the Technical sessions. This alone speaks volumes to the shortage of talent. Just think if every cyber professional made one new connection once a month…. what would that shortage look like in 12 months, 24 months, 36 months? Wonder if anyone is up to the challenge?
|
|
Cybereason is the champion for today’s cyber defenders providing future-ready attack protection that unifies security from the endpoint to the enterprise, to everywhere the battle moves. The Cybereason Defense Platform combines the industry’s top-rated detection and response (EDR and XDR), next-gen anti-virus (NGAV), and proactive threat hunting to deliver context-rich analysis of every element of a MalOp (malicious operation). The result: defenders can end cyber-attacks from endpoints to everywhere. Cybereason is a privately held, international company headquartered in Boston with customers in more than 30 countries.
|
|
|
|
The Technological Leadership Institute is an interdisciplinary center at the University of Minnesota led by world-renowned faculty. Its mission is to develop local and global leaders for technology-intensive enterprises through its three Master of Science degree programs in Security Technologies (MSST), Management of Technology (MOT) and Medical Device Innovation (MDI).
|
|
|
|
This email was sent to you because of your relationship with Cyber Security Summit. If this email was forwarded to you and you would like to be added to our monthly newsletter email list, click here to subscribe.
©2011-2021, EventShows, LLC. All Rights Reserved.
|
|
|
|
|
|
|