Cyber Security Summit Blog

By Simon Bracey Lane, PhD student, University of Canberra. A driving force of the Cyber Security Summit is the goal of resolving issues that matter to people. The small business session features experts who know how to secure a small business. No matter your company’s size, by the end of this session you will be able to: -- Identify the threats to your bottom line. -- Secure your business without breaking the bank. -- Know where to go for support from governmental bodies. -- Get yourself fighting fit to comply with the government supply chain requirements. The session will begin ...
Read More
By Simon Bracey Lane, PhD student, University of Canberra. The Cyber Security Summit is delighted to announce this year’s winners of the 2021 Visionary Leadership Awards (VLA). Celebrating those on the cutting edge of the field is a vital component of the Cyber Security Summit. Each year the Summit presents awards in 9 categories, with one special award being selected for Founder’s Choice. Otherwise known as the Morrie’s, this award is named after Robert Tappan Morris, the American computer scientist who notably created the first computer worm on the Internet. Morris later went on to make significant contributions to computer ...
Read More
By Simon Bracey Lane, PhD student, University of Canberra. The topic of this year’s Cyber Security Summit is the Power and Peril of Connection. Connections are powerful. The value of our interpersonal connections became evident in 2020 as the pandemic changed the way we interact with colleagues, friends, and family. The proliferation of mobile devices and sensors in everyday items has created the most powerful network of interconnected devices imaginable. But with great power comes great responsibility, as these devices present a huge growth in our societies’ attack surfaces. This rapid growth of connectivity requires security professionals to adapt and ...
Read More
By Simon Bracey Lane, PhD student, University of Canberra. As our societies become more interconnected, the threat vectors adversaries exploit to damage our critical infrastructure has also grown. The Cyber Security Summit’s Monday programming will allow participants to engage with a broad array of topics that impact cybersecurity in the public sector, healthcare and IoT device space. Inaugural Public Sector Workshop The Summit’s Public Sector Workshop will be introduced by Rohit Tandon who serves as CISO for the State of Minnesota’s IT services and Carlos Kizzee, Vice President of Stakeholder Engagement at the Center for Internet Security. These accomplished experts ...
Read More
By Harry Moseley, Global Chief Information Officer, Zoom Video Communications original blog post: https://blog.zoom.us/work-is-something-people-do-it-is-not-a-place/ Work is something we do, not a place we have to be. At least, not anymore. Now that employees have clearly demonstrated they can work productively from anywhere, it’s time to carry the agile, flexible technology core to pandemic continuity into a new age focused on an elevated employee experience, engagement, and exponential growth. According to the Modern Computing Alliance (MCA) digital paper “Future is Flexible,” strategic technology adoption is a mandate emerging out of a “new pace of change.” Those that keep up will gain ...
Read More
Managing the uncertainty of the pandemic Thursday, September 9, 2021by Eileen Manning, Co-Founder, Executive Producer, Cyber Security Summit Dear Colleagues, As we approach the 11th annual Cyber Security Summit this fall, we have been inundated with questions about the safety of in-person attendance. Since the pandemic’s onset, keeping our attendees safe has been our top priority. To inform our decision-making, we’ve taken a measured approach to assess the Covid landscape, consulting with a spectrum of stakeholders and gleaning insights from trusted data points. Recently, we’ve observed a marked shift. Between last Tuesday and Friday, Minnesota added an average of 1,882 ...
Read More
The 11th Annual Cyber Security Summit is fast approaching! This year’s theme, The Power and Peril of Connection, will feature more than 100 speakers discussing the critical cybersecurity topics that link us all together, for better or worse. Our program committee has been hard at work for months creating a program that will give you valuable insights and thought-providing ideas that you can take back to your organization. As you have recently read, the entire Summit will be held virtually this year to ensure the safety of our speakers and attendees. To ensure a robust and scalable event, the Cyber ...
Read More
By Scott Singer July 17, 2021 The connected nature of today’s world creates great opportunities for reaching people and customers, but it also allows the same opportunity for hackers. Covid 19 pushed the workforce outside the normal network perimeter generating even more opportunities for hackers. In this environment, it was only a matter of time before ransomware attacks evolved and combined with supply chain attacks. Ransomware is Increasingly Lucrative for AttackersRansomware as a Service (RaaS) is a business model where bad actors can lease software similar to what legitimate Software as a Service (SaaS) developers create. Anyone can subscribe to ...
Read More
By Daniel L. Mooradian and Michael Johnson July 17, 2021 When people think of Medical device cybersecurity they most often think about privacy, the protection of patient data and HIPAA compliance. While this remains the focus of many in the industry, cybersecurity professionals are increasingly concerned about the potential impact of security on patient health and safety. Rapid advances in computer science, engineering and electronics have led to a new generation of connected medical devices that permit access to real-time patient data and the opportunity to monitor and adjust treatment remotely. These advances offer benefits to patients and caregivers alike ...
Read More
By Lysa Myers July 17, 2021 With new ransomware attacks making daily headlines, it’s hard to imagine any part of this type of malware being considered an “emerging threat”. But as it becomes more mundane, ransomware is also becoming more painful. Recovering from an attack is now not just a matter of restoring from backup, or of paying criminals and hoping that their decryption tool works properly. It’s now about mitigating a toolkit of terror that threat actors have at their disposal. Attacks get wider, deeper, and dirtierAs victims have gotten wise to the ways of getting around previous iterations ...
Read More