Cyber Security Summit Blog

By Loren Dealy Mahler Conversations around incident response tend to start and stop with tips for pursuing the perfect blend of skills, technology and resource allocation to detect and mitigate any event. Rarely is enough attention paid to the external factors that traditionally contribute significantly to the long-term costs of an event. Communication is chief among these outliers, because it is linked to the public perception of your incident management and either drives stakeholder trust and customer retention – or not. Each of these variables has an impact on the ultimate cost of an event, and by taking a few ...
Read More
By Phil Schenkenberg and Zenus Franklin February 9, 2021 Privacy and cyber lawyers say “Incident Response” rather than “Breach Response” for a reason. Consider training your organization to use the word “incident” until legal counsel calls something a “breach.” Is it really that big of a deal? Maybe, and maybe not. You may know someone who reflexively said “I’m sorry” after getting in a fender-bender that was the fault of the other driver. If there was a dispute over who was at fault, the statement “I’m sorry” was likely considered to be an admission against interest and admissible in court ...
Read More
By Cyber Security Summit Think Tank January 21, 2021 Last year, the pandemic dealt our industry an immense upheaval that forced many to pivot wildly to secure critical infrastructure and data. With the lessons learned and challenges that remain – how will 2021 shake out? Members of the Cyber Security Summit Think Tank weighed in, and below are their top three predictions for 2021. REMOTE WORK WILL BECOME STANDARDLast year brought about a dramatic shift in workforce structure and subsequent technology needs. With the onset of the global pandemic and quarantine, businesses sent their workers home with no solid plans ...
Read More
While the 11th Annual Cyber Security Summit (Oct 25-27) is still months away, we’ve already kicked off 2021 with big plans. Co-Chairs Jennifer Czaplewski (Target) and Wade Van Guilder (World Wide Technology) share a passion and a unique vision for this year’s Summit. Read on to learn how their predictions for the new year are shaping the 2021 Summit experience. 2020 taught us many things. One of the most important reminders I’ve had this past year is how much I value personal connection and the ability to have meaningful discussions with friends and colleagues. Connection can come in many forms, ...
Read More
By Rohit Tandon, Chief Information Security Officer, State of Minnesota January 19, 2021 After a challenging year of responding to unprecedented cyber activities related to the global pandemic, racial injustice, and election security, the 2020 Holiday Season was finally in sight. Then, on December 13th, news broke that the year had one more surprise for our industry; a highly skilled adversary had penetrated FireEye’s network and stolen the company’s Red Team tools. A very sophisticated supply chain attack, now infamously called the SUNBURST backdoor, was identified as the vector of entry into FireEye’s network. The ongoing investigation has identified other ...
Read More
Podcasts of Cyber Security Summit's monthly webinars are online and free to listen to. Go to https://anchor.fm/cyber-security-summit. 2020 VIP All-Access Pass holders can watch the webinars for free at https://vimeo.com/showcase/7413472. Contact registrations@eventshows.com if you have trouble accessing. Webinar details can be found on our website at https://www.cybersecuritysummit.org/webinar-series. Webinars will resume in February ...
Read More
By Jeremy Swenson December 16, 2020 Every year we like to review the most impactful security, technology and business happenings from the prior year. This year is unique as the pandemic is a major catalyst for the five trends we identify, and all are likely to continue having a significant impact in the coming year.1) Identity & Access Management (IAM) Scrutiny Drives Zero TrustThe pandemic has pushed most organizations to a mass work from home (WFH) posture. Generally, this improves productivity making it likely to become the new norm, albeit with new rules and controls. To support this, 51% of ...
Read More
By Eileen Manning, Executive Producer, Cyber Security Summit November 19, 2020 The 10th Annual Cyber Security Summit took place October 26-28, 2020, with over 125 speakers presenting more than 50 sessions to nearly 1,000 cyber security leaders from across the U.S. and 21 foreign countries. As has become standard during this pandemic year, the Summit moved to a virtual platform. Our goal was to avoid hosting just another 3-day webinar, and instead build a platform that would permit the high quality interaction and networking amongst attendees that has made the Cyber Security Summit such a popular event for the past ...
Read More
By Tina Meeker, Sr. Dir. of Information Security, Sleep Number; VP, WiCyS MNOctober 20, 2020 How can we improve the way we attract and retain an inclusive cyber workforce? How can we keep our teams feeling included, satisfied, and engaged, yet still have a semblance of work-life balance? In 2020, not only did organizations grapple with these ongoing questions, but they had to do so while having to deal with a perfect storm of global pandemic, work-from-home labor transformation, and increasing cyber attacks. To address these questions and navigate our way to calmer waters, we organized the WiCYS Women in ...
Read More
By Joe Chow, SVP & Director, Specialized Business Services, Bremer BankOctober 21, 2020 The pandemic has redefined how small businesses handle cybersecurity. As much of the U.S. labor force continues to work from home, this shift in behavior has exposed many small businesses to new challenges and security risks. In 2020, 80% of businesses have seen an increase in cyberattacks, and phishing attempts have risen 600% since the end of February. From email phishing scams, endpoint-security gaps, weakened Wi-Fi protocols, and password vulnerability, cybercriminals have multiple means to access sensitive business data. Small businesses are especially vulnerable to cyberattacks because ...
Read More