|
Tina Meeker, Sr. Director of Information Security, Sleep Number
Summit Program Chair
Working with Think Tank Advisors across all 16 critical infrastructures on the 12th Annual Cyber Security Summit programming we strove to put forth the relevant and diverse content that we ourselves would want to experience. I am confident we have created three days of engaging content that both includes diverse perspectives and delivers the world-class content that accomplishes this goal.
Read more here
| |
This month's CyberBytes™ are Spotlighting upcoming Cyber Security Summit Programming | |
|
Beth Sanner, Deputy Director of National Intelligence
Beth Sanner has been in the White House briefing the President of the United States daily for the last 4 years on everything security. Get a glimpse as she shares her perspective on how nation states are weaponizing cyber in her Keynote Adversaries Turning to Cyber as Weapon of Choice during this year's Summit.
Read more here
| |
|
Jeremy Treadwell, COO, Treadwell Agency
Futurist Jeremy Treadwell's futuristic view will provide us with a forward-thinking approach to what cyber leaders are facing in these uncertain times. With cybercrime on the rise, and Cybersecurity Ventures estimating the annual economic toll to be approximately $6 trillion by 2025. With your Eyes Wide Open you'll want to implement the art of foresight, instead of experiencing the typical outcome being as Jeremy shares Hindsight 20/20.
Read more here
| |
|
Tissa Richards, Executive Coach, Tissa Richards
Tissa Richards is a bold, trusted, authentic technology founder, speaker and executive coach who has navigated the tough worlds of entrepreneurship, executive leadership, and fundraising. Having founded, invested in, and run software companies in Silicon Valley, she holds over a dozen software patents, and has won awards for her software products. During her presentation at the Summit she shares Why CSOs and CISOs are Critical in the Boardroom And How to Accelerate Your Way to a Board Director Role. If you've ever thought, There’s no place on a corporate board for someone with my background, You are wrong.
Read more here
| |
|
Greg Ogdahl, Commander, 124th Cyber Battalion; Director of Cyberspace Operations and Intelligence, Freddie Mac
Sharing information, knowledge, and experience is a good force multiple. However, borrowing a title from author Jim Collins, we need to move from Good to Great. Getting to great cyber security requires more than sharing, it requires collaborating. Because we are all connected, and in more than we may realize, the more we collaborate the faster we will find solutions to mitigate threats.
| |
|
Aimee Martin, IT Security & Governance, Risk and Compliance (GRC) Leader at Vista Outdoor | PMP | CRISC | CISA
One of the key elements to a successful security program is ensuring alignment with your executive risk tolerance, team capabilities, cyber budget, and digital footprint – any misalignments will inherently lessen the effectiveness of your program. As important as cyber processes, tooling, and capabilities are to detect and respond, most incidents originate from human error. Creative and expansive awareness campaigns are critical to strengthen your first line of defense against attacks and minimize the volume of threats sent to your security operations team.
| |
-
CISA > On September 9, 2022, the Federal Register filed two Notices for public inspection for a Cybersecurity and Infrastructure Security Agency (CISA) Request for Information (RFI) and a notice of public listening sessions, soliciting public input on possible approaches to implementing the cyber incident and ransom payment reporting requirements required under recently passed cyber incident reporting legislation.
-
CiSA > The Cybersecurity and Infrastructure Security Agency (CISA) and Multi-State Information Sharing and Analysis Center (MS-ISAC) released a joint Cybersecurity Advisory (CSA) in response to active exploitation of multiple vulnerabilities in Zimbra Collaboration Suite (ZCS), an enterprise cloud-hosted collaboration software and email platform.
-
CISA > The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released technical information on Zeppelin ransomware, which functions as a ransomware-as-a-service (RaaS), that has been observed in use by malware actors as recently as April 2022. This joint Cybersecurity Advisory (CSA) provides indicators of compromise and recommends mitigations such as: prioritizing patching known exploited vulnerabilities, training users to recognize and report phishing attempts, and enforcing multifactor authentication.
| |
The 12th Annual Cyber Security Summit will celebrate the Cyber Security industry’s Best and Brightest in our 7th Annual Visionary Leadership Awards on October 25, 2022 during the summit in Minneapolis, Minnesota.
This fall the evening will shine brighter as we have added legendary rocker, Domenick Allen (from Foreigner, Broadway and more) to headline an evening that honors the efforts of our industry colleagues who are truly leading the way through their visionary approaches across the discipline of cyber security. And, the show will actually include some local cyber talent getting their groove on, we bet your curious who will join the band!
| |
| | |
Cisco is building truly effective security solutions that are simple, open and automated. Drawing on unparalleled cloud, endpoint and network presence as well as the industry’s broadest and deepest technology and talent, Cisco delivers ultimate visibility and responsiveness to detect more threats and remediate them faster. With Cisco Security, companies are poised to securely take advantage of a new world of digital business opportunities. www.cisco.com | | |
|
Check Point is a leading provider of cyber security solutions globally, protecting customers from 5th generation attacks with an industry leading catch rate of malware, ransomware and other types of attacks. We offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. www.checkpoint.com | | |
|
The Center for Internet Security, Inc. (CIS®) is responsible for globally recognized best practices for securing IT systems and data including the CIS Benchmarks™ and CIS Controls®. Our CIS Hardened Images® provide secure, on-demand, scalable computing environments in the cloud.
cisecurity.org
| |
The Twin Cities Section of International Society of Automation (Twin Cities ISA) is a 75-year-old nonprofit and local focus for automation training, certification, and standards development. ISA is author of the globally respected ISA/IEC 62443, the only consensus-based series of IACS standards and a key component of the U.S. government's cybersecurity plan.
twincities-isa.org
| |
The 12th Annual Cyber Security Summit takes place Oct. 24-26, 2022 in Minneapolis, MN and online (hybrid event). To stay current on the Summit and trending cyber security issues, follow Cyber Security Summit on social media and use the hashtag #cybersummit #css12 #VLA22 for the latest conversations. For details, visit us at cybersecuritysummit.org. |
| | | | |