Cyber Security Summit Blog

By Eileen Manning, Executive Producer, Cyber Security Summit November 19, 2020 The 10th Annual Cyber Security Summit took place October 26-28, 2020, with over 125 speakers presenting more than 50 sessions to nearly 1,000 cyber security leaders from across the U.S. and 21 foreign countries. As has become standard during this pandemic year, the Summit moved to a virtual platform. Our goal was to avoid hosting just another 3-day webinar, and instead build a platform that would permit the high quality interaction and networking amongst attendees that has made the Cyber Security Summit such a popular event for the past ...
Read More
By Tina Meeker, Sr. Dir. of Information Security, Sleep Number; VP, WiCyS MNOctober 20, 2020 How can we improve the way we attract and retain an inclusive cyber workforce? How can we keep our teams feeling included, satisfied, and engaged, yet still have a semblance of work-life balance? In 2020, not only did organizations grapple with these ongoing questions, but they had to do so while having to deal with a perfect storm of global pandemic, work-from-home labor transformation, and increasing cyber attacks. To address these questions and navigate our way to calmer waters, we organized the WiCYS Women in ...
Read More
By Joe Chow, SVP & Director, Specialized Business Services, Bremer BankOctober 21, 2020 The pandemic has redefined how small businesses handle cybersecurity. As much of the U.S. labor force continues to work from home, this shift in behavior has exposed many small businesses to new challenges and security risks. In 2020, 80% of businesses have seen an increase in cyberattacks, and phishing attempts have risen 600% since the end of February. From email phishing scams, endpoint-security gaps, weakened Wi-Fi protocols, and password vulnerability, cybercriminals have multiple means to access sensitive business data. Small businesses are especially vulnerable to cyberattacks because ...
Read More
By Tim Crothers and Catharine Trebnick, Co-Chairs, 2020 Cyber Security SummitOctober 15, 2020 It’s kick-off time! Next week the 10th annual Cyber Security Summit will get underway, and there’s still time for you to be a part of it. With all the challenges 2020 has thrown at us, the Summit has never been timelier. This year’s theme is The Ripple Effect, and when we selected it, we had no way of knowing just how relevant the concept would be. Our lives have become even more intertwined this year, and the need for smart, innovative security has never felt more important ...
Read More
October 21, 2020 At the Cyber Security Summit’s Oct 27 CISO Forum, our expert panel will empower C-Suite executives and board rooms to navigate a strategic balance between the demand for digital transformation around a telecommuting workforce, and the need to conserve cash as they wait out the global crisis created by COVID-19. Ahead of this invite-only event, a few of the panelists offered their reflections on 2020 and advice for the road ahead. Navigating 2020’s Digital Transformation  It’s about “more work, fewer people.” Even within the push for automation, companies will look to save costs where possible by leveraging ...
Read More
Cyber Security Summit announces the Visionary Leadership Award Winners Minneapolis (October 19, 2020) – The Cyber Security Summit is pleased to announce the 2020 Visionary Leadership Award winners. The Summit gathers leaders globally to discuss, train and address cyber security problems facing our nation and the world. Programming is driven by the Cyber Security Summit Think Tank, whose members represent industry and government across the 16 critical infrastructures. The Visionary Founders Award is given to the individuals who over the years have worked to build the Cyber Security Summit and thereby globally heighten the awareness to cyber threats, share solutions ...
Read More
By Phil Schenkenberg and Scot Ganow, Taft LawSeptember 17, 2020 A key partner for any security leader is the in-house legal team at your organization. Together, you have to make important decisions as your company evaluates and manages cyber risk and prepares for and responds to data-related incidents. The relationship often requires navigating a knowledge gap around specific technical cybersecurity elements that can increase the strain on an otherwise healthy partnership. To that end, the Cyber Security Summit is hosting the half-day Cybersecurity for In-House Legal Counsel Seminar (3.25 CLE credits requested) for those counsels interested in learning how to ...
Read More
By Anita Finnegan, CEO, Nova LeahSeptember 14, 2020 What have we learned from the 2020 pandemic? We know that in an instant, life as we know it can be swiped away from under our feet. We’ve learned to stay at home and distance ourselves from everyone including friends and family. Many of us have learned how to work from home and do it effectively. We’ve leveraged digital platforms in place of the board room. We wave into a camera in place of a handshake. How we conduct business has likely changed forever more. This is also true for the healthcare ...
Read More
By Paul Veeneman, VP of Operations, MBA EngineeringSeptember 15, 2020 The convergence of Operations Technology (OT), Information Technology (IT), Internet of Things (IoT), and Industrial IoT has brought with it a wave of connected devices, systems and applications that present significant cybersecurity challenges. In the coming years, these changes will have an impact on the world’s critical infrastructure systems, including water and wastewater systems, electrical power utilities, telecom systems, healthcare systems, industrial environments, agriculture, manufacturing, and more. Over the past decade critical infrastructure industries have transformed the operations technology landscape, introducing a proliferation of SCADA systems, industrial controls, and digital ...
Read More
By Ken Hoyme and Judy HatchettCo-Chairs, Oct. 26 Healthcare and Med Device SeminarSeptember 14, 2020 There are several fundamental characteristics of medical devices that make them a unique challenge for security practitioners. One is the long lifecycle that these systems typically have – sometimes as long as 10 or 15 years. Imagine if you were still using a laptop you purchased in 2005; it might feature a floppy drive, a CR-ROM drive, a VGA output, blazingly fast USB 1.1 ports, and of course an outdated operating system. The second is that medical devices need to be tested by the manufacturer ...
Read More