Fighting cybercrime requires a new kind of leadership that champions a holistic approach to cybersecurity. The global average cost of a data breach from a 2019 study is $3.92 million and rising each year. How are smart companies striking pre-emptively, and what are the emerging technologies proven to support smart security?
This session examines the emerging and ongoing threats in the cybersecurity landscape across industries and stakeholder lines. Achieving cyber-resiliency is an imperative that requires the full muscle of leadership teams, across C-suites, boards, and investors.
It is increasingly more difficult for defenders to identify, mediate ,and attribute incidents of cybercrime. This session will examine the convergence among "traditional" nation-state and criminal techniques in cyber operations, why it matters, and what it means for defenders and intelligence professionals.
Destructive and disruptive attacks are now a regular feature of geopolitics. In some regions, campaigns have become a consistent feature of the landscape. his talk will explore the dynamics of this phenomenon, the actors behind it, and what the future holds.
The proliferation of data hostage-taking is exponential. Response-based recovery in the new shakedown economy often results in insurance payouts to ransomware attacks, and it always requires the use of tools and technology to bolster against future attack vectors and vulnerabilities. What are the cutting-edge technologies and toolsets organizations are using in response, and how do they best stand up to attacks?
On March 19, 2019, Norsk Hydro, one of the world’s largest producers of aluminum, faced a systemic, worldwide network ransomware attack. Their response strategy was built upon two principles: pay no ransom and admit the breach. This resulted in unprecedented transparency and a distributed workstream that included forensics, communication management, and rebuilding.
Cryptocurrency’s decentralized, semi-anonymous nature makes it a uniquely appealing option for criminals, and their embrace of the technology has helped shape its overall reputation. But unlike traditional forms of value transfer, cryptocurrency is inherently transparent in a publicly visible ledger. With the right tools, such as blockchain analysis, defenders can gain unprecedented insight into criminal activity and the latest trends in crypto crime.
There is a common checklist of security safeguards every organization needs to put in place to protect enterprise data and stay a step ahead of potential data breaches. What is coming down the technology pipeline, and what are the anticipated results? How is AI used for threat hunting? What protections can truly secure the IoT connected supply chain and how best to prepare for the implications of the emergence of 5g?
Solutions to cybersecurity challenges require, not only technological innovation, but changes in the roles and processes involved in security operations. This session features scenarios that enable the “citizen data scientist” to create machine learning models to hunt for threats and pinpoint cyber-attacks that can otherwise not be detected.
Today organizations operate across a global platform economy, and cloud is the foundation. We'll examine the challenges and opportunities, including realities of the unknown risks associated with the cloud, which cannot be fully identified. You'll gain insight on how to create and leverage a model of “indica of trust.”
America’s election infrastructure is a complex mosaic of different technologies, procedures, and state-specific practices; typical IT “playbooks” may not be applicable. Elections are constrained by variables quite different from other technology sectors. This session unpacks the state of election security in the context of real-world election administration, the marketplace and regulatory landscape, and the intricacies of maintaining public trust through transparency. What will it take to protect critical democracy infrastructure?
How do organizations best ensure a resilient cyber ecosystem- from assessing risk, to implementing and managing controls, to ensuring compliance internally and with external partners? Defensive technologies catch up and move ahead of offensive technologies.