11:45 a.m.
The show about the show. Get a behind-the-scenes preview on the day's sessions and speakers. Get the inside track on the can't-miss sessions and tips for making the most out of your CyberSecure experience.
12:00 p.m.
Welcome and Opening Remarks
Standing up to Nation-State Hackers (12:05 p.m. - 1:40 p.m.)

Fighting cybercrime requires a new kind of leadership that champions a holistic approach to cybersecurity. The global average cost of a data breach from a 2019 study is $3.92 million and rising each year. How are smart companies striking pre-emptively, and what are the emerging technologies proven to support smart security?

12:05 p.m.

This session examines the emerging and ongoing threats in the cybersecurity landscape across industries and stakeholder lines. Achieving cyber-resiliency is an imperative that requires the full muscle of leadership teams, across C-suites, boards, and investors.

12:30 p.m.

Citing examples and stories from hidden archives, this session wraps context around the very real geopolitical digital pursuit of achieving nation-state cyber advantage. From espionage to elections, from blackouts to data breaches, from million-dollar ransoms to staged supply chain disruption; cyber warfare is transforming statecraft and national security policy.

1:20 p.m.

Cybersecurity is a wicked problem. Attack surfaces are exponentially increasing, and threats continue to evolve in sophistication and volume. At the same time, organizations are facing immense resourcing pressures: budgets are decreasing, while security leaders are being forced to restructure human resources to address a constantly shifting hybrid COVID world. Security risks are not easily tamed, but security leaders can drive improvements in effectiveness and efficiency by focusing on relevant threat vectors, appropriate use of intelligence, data analytics - not just ML - and deep understanding of risk factors. This session will focus on using these essential tools to build and execute effective strategies for protecting business value.

MIT Inside Track (1:40 p.m. - 2:10 p.m.)

Join one of the concurrent sessions to engage more deeply with our content, speakers, and your fellow attendees during mainstage programming breaks.

1:40 p.m.

In quest of enhanced security against hackers, new-gen code makers are pivoting from modern (classical) to quantum, exploiting the laws of quantum mechanics for future-proof transactions. What are the keys to activating quantum cryptography intuition, whom will it impact the most, and why does it matter?

The CyberSecure program research uncovered many useful sources of information, including books from celebrated authors who are also speakers at this event. This bookstore provides access to some of the critical stories and research findings that informed our program development and continue to enlighten security interests, applicable across industries and around the world.

2:10 p.m.

Solutions to cybersecurity challenges require, not only technological innovation, but changes in the roles and processes involved in security operations. This session features scenarios that enable the “citizen data scientist” to create machine learning models to hunt for threats and pinpoint cyber-attacks that can otherwise not be detected. 

Holistic Risk Management (2:35 p.m. - 3:50 p.m.)

How do organizations best ensure a resilient cyber ecosystem- from assessing risk, to implementing and managing controls, to ensuring compliance internally and with external partners? Is it possible for defensive technologies to catch up and move ahead of attackers?

2:35 p.m.

This session presents a compilation of tactics designed to mitigate cyber risk that span the public-private sector- from implementing security best practices in the White House to establishing a network of intelligence for a leading financial institution.

3:00 p.m.

There was a 37% increase in mobile phishing attempts with the rise of the pandemic-driven remote workforce. Spear phishing attacks targeted at mobile devices use social engineering to bypass legacy security systems, exploiting human vulnerabilities through manipulative campaigns that are harder to spot on a smaller screen. Twitter is a prime example. How does spear phishing gain access, what makes mobile devices so vulnerable to attack, and what can be done about it?  

3:25 p.m.

Every cybersecurity professional understands that complexity is the enemy of security. Yet the complexity of the systems we deploy inexorably rises over time as software eats the world. Why is this the case and what can be done about it?

3:50 p.m.
Wrap-up
11:45 a.m.

The show about the show. Get a behind-the-scenes preview on the day's sessions and speakers. Get the inside track on the can't-miss sessions and tips for making the most out of your CyberSecure experience.

12:00 p.m.
Welcome and Recap
Ransomware Response and Prevention (12:10 p.m. - 2:00 p.m.)

The proliferation of data hostage-taking is exponential. Recovery in the new shakedown economy varies from insurance payouts to devising techniques to bolster data against common attack vectors and vulnerabilities. What are the cutting-edge technologies and toolsets organizations are using in response, and how do they stand up to attack?

12:10 p.m.

On March 19, 2019, Norsk Hydro, one of the world’s largest producers of aluminum, faced a systemic, worldwide network ransomware attack. Their response strategy was built upon two principles: pay no ransom and admit the breach. This resulted in unprecedented transparency and a distributed workstream that included forensics, communication management, and rebuilding.

12:35 p.m.

Attribution is a loaded term but an important process to undergo to ensure national security. Even information security professionals disagree as to whether it can be reliably done or if the process holds any value at all. What can be learned from security professionals who have achieved success, and what are the obstacles?

1:05 p.m.

The frequency, fluidity, and anonymity of ransomware-level cyberattacks continue to challenge across domains and borders. This session focuses on international policy opportunities and possibilities of cyberspace in the analysis of world politics and addresses how to gain consensus among multi-stakeholders to integrate, collaborate, and harmonize a system of negotiations for treaties and conventions.

MIT Inside Track (2:00 p.m. - 2:30 p.m.)

Join one of the concurrent sessions to engage more deeply with our content, speakers, and your fellow attendees during mainstage programming breaks.

2:00 p.m.

How can organizations infuse the highest of ethical standards in a booming industry with a talent shortfall? With no codified cybersecurity ethics guidelines, it is a question not asked often enough.

The CyberSecure program research uncovered many useful sources of information, including books from celebrated authors who are also speakers at this event. This bookstore provides access to some of the critical stories and research findings that informed our program development and continue to enlighten security interests, applicable across industries and around the world.

Cybersecurity Spotlights (2:30 p.m. - 3:10 p.m.)
2:50 p.m.

Cryptocurrency’s decentralized, semi-anonymous nature makes it a uniquely appealing option for criminals, and their embrace of the technology has helped shape its overall reputation. But unlike traditional forms of value transfer, cryptocurrency is inherently transparent in a publicly visible ledger. With the right tools, such as blockchain analysis, defenders can gain unprecedented insight into criminal activity and the latest trends in crypto crime.

MIT Inside Track (3:10 p.m. - 3:40 p.m.)

Join one of the concurrent sessions to engage more deeply with our content, speakers, and your fellow attendees during mainstage programming breaks.

3:10 p.m.

The CyberSecure program research uncovered many useful sources of information, including books from celebrated authors who are also speakers at this event. This bookstore provides access to some of the critical stories and research findings that informed our program development and continue to enlighten security interests, applicable across industries and around the world.

Building a Cyber-Resilient Organization (3:40 p.m. - 4:40 p.m.)

There is a common checklist of security safeguards every organization needs to put in place to protect enterprise data and stay a step ahead of potential data breaches. What is coming down the technology pipeline, and what are the anticipated results? How is AI used for threat hunting? What protections can truly secure the IoT-linked supply chain, and how best to prepare for the implications of the connected world?

3:40 p.m.

Today’s pervasive platform economy means that you will never truly know your supply chain. The risks are ubiquitous- from managing outsourced touchpoints, to WIFI-enabled transport, to the manufacturing of custom silicon that warms the heartbeat of your datacenter. What are the indications of trust that citizens need to know in the emerging threat economy?

4:10 p.m.

The roster of companies suffering massive cyber breaches isn’t slowing down. And while every breach is different, there are common elements and best practices to building a cybersecurity program to better prepare, respond, and prevent future attacks.

4:40 p.m.
Closing Remarks