SIM's Cybersecurity Special Interest Group (SIG) is hosting its second annual Virtual Conference on Thursday, September 20, 2018, from 11:00 am ET – 4:30 pm ET. This exclusive executive event will offer attendees the opportunity to engage with the sharpest minds on significant cybersecurity issues.

With concurrent Risk and Strategy tracks, we explore practical applications of this year’s theme “TRUST -- THE GREATEST CASUALTY OF CYBER WAR” – building cyber resilient organizations and leveraging cyber trust as a strategic advantage.

Society needs trust in order to function. Consider all of the people, processes, and institutions we place our trust in as we go about our daily lives. The fact we don’t really think about it is an indication of how well trust has worked – until now.

In the past few years, we’ve seen breaches of striking proportions, the disclosure of some serious hardware and software flaws, and questionable behavior by some of the largest consumer technology companies. Cybercriminals and state-sponsored actors are becoming increasingly more sophisticated and aggressive in their abilities to exploit our behaviors and technology flaws -- putting all of us at greater risk. Lack of trust is now becoming pervasive.

Mark your calendars and join us at SIM’s Cybersecurity Virtual Conference to hear from an impressive lineup of experts who will share their stories and experiences in preparing for the cyber challenges of tomorrow.

By attending the Cybersecurity Virtual Conference you will:
* Gain insights and knowledge into the emerging cyber threats of tomorrow
* Learn how to build cyber resilient organizations
* Develop approaches for integrating cybersecurity into organizational strategy

The issues in front of us have yet to be resolved and they will continue to linger. As threat actors become more creative and sophisticated, we have to adapt to get ahead of them.

Register for the 2018 Cybersecurity Virtual Conference today!

REGISTER NOW!

Registration fees are $75 for SIM Members and $199 for Non-Member Practitioners.


 

5 Reasons Why You Can’t Miss SIM’s Cybersecurity Virtual Conference

SIM's Cybersecurity Special Interest Group’s 2nd annual Virtual Conference is just around the corner. Here are just a few reasons why you need to attend:

Expand Your Leadership Skills for Cybersecurity -- There are lots of cybersecurity events. SIM’s event stands out because it is designed for leaders to enhance and build their cybersecurity workforce. From a session designed on how best to find true cybersecurity talent to how to leverage blockchain to create long-term value for your company, our programming is tailored to cybersecurity from the executive perspective. 

Get Ahead of the Curve -- In such a rapidly changing field with the next data breach lurking behind every corner, it’s particularly challenging to take time out to plan accordingly so that your organization isn’t just on the defense. The Virtual Conference offers a forward-look at trends for 2019 and the future of the password to best position your organization for what is on the horizon. 

Learn From Real-World Case Studies -- Cybersecurity is such a fast-changing area. Learn something today and it could be outdated tomorrow. This isn’t a topic that you can master from theory alone -- it’s critical to hear from colleagues who have faced real threats like the city of Fort Lauderdale’s CIO who navigated an attack from the hacker group Anonymous. 

Hear Directly From Top Cybersecurity Leaders -- We’ve rounded up a brain trust of cybersecurity experts with cutting-edge experience like Dr. Shawn Murray, principal scientists at the United States Missile Defense Agency, Dr. Rebecca Wynn who led information security for LearnVest Inc., and many others! 

Receive Maximum Value -- Registration for the Virtual Conference gets you full entrance to the event on Thursday, September 20th as well as post-event access to recordings -- so you can go back and review anything you want. With a significant discount for SIM members (just $75) and a competitive rate for non-member practitioners, we’re certain your learnings will far outweigh your investment. And since it’s a virtual event, you don’t have any additional travel costs or hassle!

Sessions




The Ever-Evolving Threat Landscape – Reducing Risk from Cybercrime to Cyber Espionage

Eduardo E Cabrera

The threat landscape is constantly evolving from global digital extortion attacks and Business Email Compromises to international cyberespionage campaigns distilling cyber propaganda during national elections. Learn what makes these attacks successful to better understand how you need to defend your networks, data, users. Only by having a deep understanding of the threats you face and the vulnerabilities you have, can you successfully reduce the risk your organizations face



Sponsored by:


Cyber Insights

Laszlo Gonc
Caren Shiozaki
 


Life After an Anonymous Attack on My City

Mike Maier
This session will discuss the Anonymous attack on the city of Fort Lauderdale, Florida in late 2014 and how the city has changed its ways – both technologically, and behaviorally, in the time since.

The city of Fort Lauderdale, Florida was hit by an Anonymous denial-of-service attack in December 2014 and was forced to immediately upgrade computer systems to thwart any potential future attacks.

The city of Fort Lauderdale, Florida was hit by an Anonymous denial-of-service attack in December 2014 that was brought on by a dispute over a city ordinance that had recently become heated. The city proactively shut down internet access while ensuring its files were secure.

The city quickly spent $430,000 upgrading computer security systems to mitigate vulnerabilities it had previously identified. While the attack itself did not cost the city this money, it expedited the timeline for these necessary system upgrades.


Building a Cyber Work Force – Opportunities and Challenges

Dr. Suku Nair
This session will address the difficulty in the finding of qualified workers in the cyber area. Statistics on qualified positions is staggering. We will discuss how the crisis impacts national security and the economy. Further, it will discuss various initiatives that are trying to mitigate the problem.

The main theme of the webinar is the current status of the cyber workforce. In addition to the various challenges in building and maintaining the workforce. It will discuss various opportunities surrounding the problem.

This session will include discussions on Threat landscape, Various Actors Cyber Workforce Crisis, Cyber Security Education, and Research- with a discussion on sample programs and a way forward.


Global Cyber News Coffee Break & Cyber Insights

Laszlo Gonc
Caren Shiozaki
 


Stop the Breach. The Case for Real-Time Automated Endpoint Security

Andy Singer
The threat landscape has changed yet again. What was several years ago an era of advanced attackers seeking valuable data, has transformed to be global disruptive data related plagues, backwinded by nation-states seeking to dictate agenda and terms. In respect to the evolving threat landscape, organizations came to realize that compromise is inevitable and have started to look for ways to respond and quickly, automatically and in real-time in order to prevent the next data breach or disruption. The evolving incident response process holds in store a great challenge as the process effectiveness metric is fairly easy to measure. Do you actually know how effective is your current SOC/IR/MDR in detecting, validating, containing and remediating infections in the environment? Are you ready to win the race to your own data?

Sponsored by:


Exhibit Hall

 
Take a breather from programming in our virtual exhibit hall. Visit our sponsor booths from the comfort and convenience of your computer and learn how their solutions can enhance your cybersecurity efforts. Browse at your convenience!


Shawn Murray CEO at Murray Security Services

Dr. Shawn Murray
Everywhere we turn, we hear that there is a shortage of cyber security professionals with highly sought-after skill sets and experienced tradecraft to fill widening cyber security program requirements. I have sat on workforce development panels with federal, state and city government leaders, education professionals and industry partners looking for ways to address the problem. I have seen many startup companies claiming they have the key to filling the needs of various industries. I have also seen well-established organizations realigning current training & certification programs in an effort to keep up with the startups. While very few are embedded into true workforce development initiatives, most companies are jumping on the bandwagon and trying to capitalize on a new revenue stream called “Cyber” or “Cyber Security”. My take away is that the issue is more complex than just finding the right person with the right skills to fill a need. There are several factors that need to be considered when analyzing the problem, which do not revolve around training and certification.


Leveraging Blockchain to Create Trusted Data Assets Live with Margaret Mitchell

Margaret Mitchell
Learn how to leverage blockchain to increase the value of your company's core data assets by wrapping them in unbreakable trust.

As more of your company’s assets become digitized the need for a trusted history of those digitize assets becomes more important. But it is easy for the origination, ownership and history of that data to get lost. In this Quick Tip you will learn how to leverage blockchain to turn a data asset into a trusted data asset.

In this session you will learn what is a trusted data asset and why creating trusted data assets is important to creating long-term value for your company. Topics covered are:

Learn how to:

  • What is a trusted data asset; how traditional data management techniques can create a data trust vacuum
  • The basics of how block chain
  • How to use blockchain to transform data assets into trusted data assets
  • How those trusted data assets can create long-term sustainable value for your company.


Live with Margaret Mitchell

Laszlo Gonc
Caren Shiozaki
Margaret Mitchell
 


Cyber Trends 2016 - 2019

Dr. Chris Maurer

While cybersecurity is commonly mentioned as a top organizational priority, are organizations really doing everything they can to protect their networks and data?  For the past three years, the SIM IT Trends Study has been investigating this issue and some surprising results have emerged.

This data-driven session will summarize key findings from the last three years to provide insight into organizational cybersecurity practices.  In addition to an organizational analysis, industries will be evaluated to demonstrate how some industries are better positioned to address cybersecurity threats than others.  By combining organizational cybersecurity practices with previous breach experience and cybersecurity investment, we will start to understand why there is significant room for improvement across nearly all industry sectors.

The presentation will conclude with thoughts on the future trends related to cybersecurity and what organizations should be looking out for in 2019 and beyond. 


Cybersecurity: A “Competitive Advantage” or an over Hyped term?

Don Devine
This session will explore the question of whether Cybersecurity is or can be a “Competitive Advantage” or is that just Hype.

For the past several years, and for good reason, Cybersecurity has been a much talked about topic in the Boardroom. We have read and heard countless articles and industry presentations touting that more and more top executives have embraced cybersecurity as a strategic priority and "Competitive Advantage." There is no doubt that cybersecurity is a top priority for most organizations, but can it truly be a competitive advantage or is that just sales/marketing hype?


Cyber Insights

Laszlo Gonc
Caren Shiozaki
 


Resilience in Apps & Applications

Carlos  Pero

Apps and application both utilize a Web site exposed to the Internet, and that is where the real Cyber risk to an enterprise exists. This session reviews basic concepts, the well-known risks, and how to be resilient to defend against attacks and not provide opportunity in the first place.

A functional Web application, exposed to the Internet, is literally asking for trouble by opening port 80 and 443 on network firewalls to allow Web requests to come into a data center and be executed. A poorly-coded Web application can compromise the server, the network, and your business. The OWASP Top 10 list of critical security risks provides a good starting point to make sure you are aware of and have appropriate controls in place for these risks, but you can only protect what you are aware of, and your developers need to prevent vulnerabilities from being exposed in the first place.


Cyber Insights

Laszlo Gonc
Caren Shiozaki
 


Closing Keynote: Make it a Win-Win Proposition

Dr. Rebecca Wynn
How to successfully resolve conflicts between business leaders, security, compliance, and human behavior while keeping your sanity

This is an enlightening and entertaining presentation on how to successfully resolve conflicts between business leaders, security, compliance, and human behavior while keeping your sanity! Real-world examples are used to teach you practical tools you can use to quickly align people to one purpose.



Sponsors




ENSILO's single lightweight security agent gives customers comprehensive pre-infection Next Generation Anti-Virus (NGAV) as a first line of defense and post-infection automated, blocking-enabled Endpoint Detection and Response (EDR) as a last line of defense, enabling security teams to contain attacks, prevent data leakage and block malware communications in real time to stop post-infection impact.




Trend Micro Incorporated, a global leader in cybersecurity solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. For more information, visit www.TrendMicro.com.