|
Judy Hatchett + Jeffrey Norem
Summit Co-Chairs
What does it take to produce an international Cyber Security Summit? First, it’s determining a theme which this year is, Eyes Wide Open, sounds like an action-packed movie starring Tom Cruise. With all the events of the last year, maybe it will be one day!
Read more here
| |
This month's CyberBytes™ are Spotlighting upcoming Cyber Security Summit Programming | |
|
Andrew Borene, Associate Vice President for Research at National Intelligence University > Office of the Director of National Intelligence (ODNI)
In his 12th Annual Cyber Security Summit presentation “Stronger Together: Lessons from 21 Years of Intelligence Integration”, Andrew Boreen will share how the cyber domain is emerging as the first choice of battle space for many foreign adversaries of the United States, NATO, and other vital US security partners. These adversaries with deep pockets do not adhere to the system of laws and norms for the free world.
Read more here
| |
|
Ben Corll, CISO Americas, Zscaler
In his upcoming session, Cyber Incidents Happen - Who Is To Blame? at the Cyber Security Summit, Ben Corll, CISO Americas, will share some of the common attack scenarios for cyber incidents as well as the common controls that security teams have used to minimize harm or threat including the 4 core tenets of zero trust architecture and what the future of security and computing could look like with zero trust implemented.
Read more here
| |
|
Steen Fjalstad, Director Of Security, Midwest Reliability Organization
Computers and technology are pervasive and essential for everything in our modern society. To protect our future generations all security professionals must continue working to ensure computers and technology run free of care. By failing to prepare computers and technology to be secure today we are preparing to fail tomorrow.
| |
|
Michelle Greeley, IT Security & Risk Management Program Leader, 3M
Providing diverse ideas and advice for the Cyber Security Summit topic and speaker coordination is critical to creating an excellent experience for all participants. Collective intelligence and a safe place where plans and strategies can be discussed is the key to collaborative problem solving.
| |
This year’s campaign theme — “See Yourself in Cyber” — demonstrates that while cybersecurity may seem like a complex subject, ultimately, it’s really all about people . This October will focus on the “people” part of cybersecurity, providing information and resources to help educate CISA partners and the public, and ensure all individuals and organizations make smart decisions whether on the job, at home or at school – now and in the future.
Cybersecurity Awareness Month | CISA
Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA) and the Federal Bureau of Investigation (FBI) released a joint Cybersecurity Advisory (CSA) with details about the top vulnerabilities used and exploited since 2020 by the People’s Republic of China (PRC) state-sponsored cyber actors to actively target U.S. and allied networks as well as software and hardware companies to steal intellectual property and develop access into sensitive networks.
Top CVEs Actively Exploited By People’s Republic of China State-Sponsored Cyber Actors | CISA
FBI and NSA, released a joint Cybersecurity Advisory on Impacket and Exfiltration Tool Used to Steal Sensitive Information from Defense Industrial Base Organization. This CSA includes details on advanced persistent threat actors using an open-source toolkit and custom data exfiltration tool to steal sensitive data from a defense industrial base sector organization’s enterprise network.
Impacket and Exfiltration Tool Used to Steal Sensitive Information from Defense Industrial Base Organization | CISA
CISA released an updated version of the Time Guidance for Network Operators, Chief Information Officers, and Chief Information Security Officers. This new guidance provides lessons learned from a tabletop exercise designed to help an organization accomplish the Positioning, Navigation, and Timing Profile processes of identifying and protecting systems, networks, and assets; detecting and responding to an anomaly; and recovering from a disruption
| |
22 HOURS OF PRE-SUMMIT TECHINCAL SESSIONS
SUPPORTED BY OUR SPONSORS
PROVIDE YOU A GREAT CHANCE TO GET CONNECTED
Monday, October 24th 8:30 am - 6:00 pm
Women in Cyber Technical Tracks
8 Sessions featuring 26 Cyber and Business Leaders who'll Inspire Your Career Path
Career Track Technical Sessions
15 Sessions with Industry Experts who Upskill you readying you for what's next in Cyber
Networking in the Expo Hall follows the sessions.
Click to Register for IN PERSON -or- VIRTUAL PARTICIPATION >>>
| |
| | |
The 12th Annual Cyber Security Summit will celebrate the Cyber Security industry’s Best and Brightest in our 7th Annual Visionary Leadership Awards on October 25, 2022 during the Summit in Minneapolis, Minnesota.
This fall the evening will shine brighter as we have added legendary rocker, Domenick Allen (from Foreigner, Broadway and more) to headline an evening that honors the efforts of our industry colleagues who are truly leading the way through their visionary approaches across the discipline of cyber security. And, the show will actually include some local cyber talent getting their groove on, we bet your curious who will join the band!
| |
| | |
The 12th Annual Cyber Security Summit does offer a Virtual Summit option for those of you who can't get away or just prefer it.
While you'll miss the in person networking and hospitality you will enjoy the 3 DAYS of programing featuring:
145 Speakers
90 Sessions
> 71 Hours of Programming
> 27 Hours of Continuing Education Credits
> 22 Hours of Open Access Programming
10 Cyber Leadership Award Nominees
| |
| | |
Zscaler (NASDAQ: ZS) accelerates digital transformation so that customers can be more agile and secure. The Zscaler Zero Trust Exchange, a SASE-based platform, is the world’s largest inline cloud security platform, protecting thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications over any network.
www.zscaler.com
| | |
|
Axonius correlates asset data from existing solutions and provides an always up-to-date inventory, uncovers gaps, and automates response actions. We give IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business level strategy - all while eliminating manual, repetitive tasks.
www.axonius.com
| | |
|
The Military Cyber Professionals Association (MCPA-MN) is a nonprofit charity dedicated to developing American military cyber professionals and investing in our nation’s future through funding grants for local STEM education. The Minnesota chapter is looking for new members to join our organization. Membership is FREE for military and honorable retirees. Our membership goal is 100 Minnesota Chapter members- Membership is Free for military and honorable retirees. Minnesota Contact > Brian Morgan > milcyber.org | |
Our mission is to create a safe environment where information security practitioners can openly share expertise and ideas, providing practical, relevant, useful and timely information that, when applied, will develop and promote the (ISC)2 CISSP CBK help support the Information Security and Cyber Security Communities of the Upper Midwest.
isc2tc.org
| |
The 12th Annual Cyber Security Summit takes place Oct. 24-26, 2022 in Minneapolis, MN and online (hybrid event). To stay current on the Summit and trending cyber security issues, follow Cyber Security Summit on social media and use the hashtag #cybersummit #css12 #VLA22 for the latest conversations. For details, visit us at cybersecuritysummit.org. |
| | | | |