Women in Cyber: Leading through a Perfect Storm

By Tina Meeker, Sr. Dir. of Information Security, Sleep Number; VP, WiCyS MNOctober 20, 2020 How can we improve the way we attract and retain an inclusive cyber workforce? How can we keep our teams feeling included, satisfied, and engaged, yet still have a semblance of work-life balance? In 2020, not only did organizations grapple […]

Read more

Why Cybersecurity is more important than ever in this pandemic

By Joe Chow, SVP & Director, Specialized Business Services, Bremer BankOctober 21, 2020 The pandemic has redefined how small businesses handle cybersecurity. As much of the U.S. labor force continues to work from home, this shift in behavior has exposed many small businesses to new challenges and security risks. In 2020, 80% of businesses have […]

Read more

Fresh Perspective, Strategic Insights: Previewing the 10th Annual Cyber Security Summit

By Tim Crothers and Catharine Trebnick, Co-Chairs, 2020 Cyber Security SummitOctober 15, 2020 It’s kick-off time! Next week the 10th annual Cyber Security Summit will get underway, and there’s still time for you to be a part of it. With all the challenges 2020 has thrown at us, the Summit has never been timelier. This […]

Read more

Digital Transformation among the Uncertainties of Today

October 21, 2020 At the Cyber Security Summit’s Oct 27 CISO Forum, our expert panel will empower C-Suite executives and board rooms to navigate a strategic balance between the demand for digital transformation around a telecommuting workforce, and the need to conserve cash as they wait out the global crisis created by COVID-19. Ahead of […]

Read more

Cyber Security Summit announces the Visionary Leadership Award Winners

Cyber Security Summit announces the Visionary Leadership Award Winners Minneapolis (October 19, 2020) – The Cyber Security Summit is pleased to announce the 2020 Visionary Leadership Award winners.  The Summit gathers leaders globally to discuss, train and address cyber security problems facing our nation and the world. Programming is driven by the Cyber Security Summit Think […]

Read more

Corporate Leadership Series: The Vocabulary of IT and Information Security

By Phil Schenkenberg and Scot Ganow, Taft LawSeptember 17, 2020 A key partner for any security leader is the in-house legal team at your organization. Together, you have to make important decisions as your company evaluates and manages cyber risk and prepares for and responds to data-related incidents. The relationship often requires navigating a knowledge […]

Read more

Healthcare cybersecurity: Lessons learned from the 2020 pandemic

By Anita Finnegan, CEO, Nova LeahSeptember 14, 2020 What have we learned from the 2020 pandemic? We know that in an instant, life as we know it can be swiped away from under our feet. We’ve learned to stay at home and distance ourselves from everyone including friends and family. Many of us have learned […]

Read more

Ripples to Waves: Managing Cybersecurity within the Growing Convergence of IT / OT / IoT

By Paul Veeneman, VP of Operations, MBA EngineeringSeptember 15, 2020 The convergence of Operations Technology (OT), Information Technology (IT), Internet of Things (IoT), and Industrial IoT has brought with it a wave of connected devices, systems and applications that present significant cybersecurity challenges. In the coming years, these changes will have an impact on the […]

Read more

Current Challenges and Future Opportunities to Better Secure Medical Devices

By Ken Hoyme and Judy HatchettCo-Chairs, Oct. 26 Healthcare and Med Device SeminarSeptember 14, 2020 There are several fundamental characteristics of medical devices that make them a unique challenge for security practitioners. One is the long lifecycle that these systems typically have – sometimes as long as 10 or 15 years. Imagine if you were […]

Read more

Election Security: A Case Study in Cybersecurity and Public Trust

By Sean S. CostiganAugust 17, 2020 If you are a local government election official, a vendor of electronic voting machines, an intelligence analyst, a cybersecurity expert working for a social media company, someone holding high office, or simply a voter, you are invested in election security.  You may even hold strong, expert opinions on aspects […]

Read more