Cyber Security Summit Blog

David Tyson, the CEO of CISO Insights, spoke to attendees of Cyber Security Summit 2018 about the top measures to take to protect security systems from cyber attacks. He began by visiting old challenges related to patches, viruses and denial of service attacks that persist as they have for the past 20 years. Out of every 101 emails, one is malicious, he said. Data security continues to be an issue, as well as faulty program installations. Cybersecurity is a weakest link disruption, he noted. You can spend $1 million, but if someone leaves their password taped to their monitor security ...
Public policy trends drive what will happen with future cybersecurity regulation. Matthew Rhoades, Managing Director of the Cybersecurity and Technology Program at the Aspen Institute, reviewed four current top-line trends to attendees at Cyber Security Summit 2018. Rhoades’ list and comments: Data security and sensitivity is a driver in current discussions and legislation, domestically and worldwide. GDPR is a European example of a privacy regime coming to the fore. In reaching beyond the EU to set privacy standards, GDPR is establishing what may become a precedent for others to follow. It imposes strict limits on companies doing business with EU ...
professionals at a conference seminar
For the past eight years, the Cyber Security Summit in Minneapolis has brought people with different viewpoints on cybersecurity issues together to hear from experts, learn about trends and discuss actionable solutions. Our 2018 Summit was no different and we’d like to thank you once again for joining us! In addition to the annual 2-day Summit, this year we hosted multiple half-day events on Tuesday. These sessions focused on healthcare & medical device cybersecurity, DevSecOps for practitioners, GDPR and cybersecurity for small and mid-size businesses. Feedback from attendees Here’s what attendees had to say about Cyber Security Summit 2018: "Excited ...
conference in large room with people at tables listening to speaker
The 2018 Cyber Security Summit is just around the corner and we’re looking forward to spending three days with the top cybersecurity professionals from across the globe. We’ve made some changes since last year, so we thought it would be helpful prepare you with a rundown of everything you need to know. Feel free to bookmark this post for reference as you prepare for this year’s Summit. Why Minneapolis, Minnesota? Squarely centered geographically and home to many Fortune 500 multinationals, Minnesota bridges the divide between the technology sector on one coast and policymakers from the other to form an operational and innovative ...
With technology evolving on a daily basis and an increasing amount of data to secure, it’s no surprise that the industry of cybersecurity is a fast paced one. “The fact that there is not just one single most influential trend in cybersecurity but a confluence of many is very influential to the nature of the industry,” says Cyber Security Summit co-chair and 2018 keynote Stefanie Horvath. Horvath received her master’s degree in Military Strategic Studies from the United States Army War College. Today she serves as the Executive IT Director for Minnesota IT Services and concurrently serves in the Army ...
young professionals collaborating
Just as we think we are starting to get a handle on Millennials in the workforce, a new generation is changing the game. Enter Gen Z. The oldest members of Gen Z (those born after 1996) are hitting 21 and 22 years old and thus, entering the workforce. And the industry that is hungry to have them? Cybersecurity. According to the Department of Homeland Security, there are half a million cybersecurity-related job openings in the United States and the Bureau of Labor Statistics predicts the need for 1.8 million additional cybersecurity professionals to fill the workforce gap by 2022. What ...
Cybersecurity challenges are turning natural competitors into willing collaborators as companies try to ward off the shared threat of attack.  By Michael Border “Oops, your important files are encrypted,” a May 2017 pop-up advised on the screens of an estimated 200,000 computers worldwide. The culprit was WannaCry, a cryptoworm that attacked computers running the Windows operating system. It demanded ransoms to be paid in Bitcoin, a digital currency that leaves no incriminating paper trail. Cybersecurity experts discourage making payments to hostage-takers, warning that it encourages future hacks and provides no guarantee that files will be restored. Either way, the damage ...
California has just imposed a significant new set privacy and data security requirements that will impact a significant percentage of consumer-facing businesses in the US. Companies will have to implement new procedures as they collect, sell, and disclose consumer data, and they now have a statutory obligation “to implement and maintain reasonable security procedures and practices appropriate to the nature of the information.” The California bill defines “personal information” very broadly to include identifying information that is not usually thought of as highly sensitive, such as the phone number or IP address of a California resident. (In this way, it ...
Tony Sager is a Senior VP and Chief Evangelist for the Center for Internet Security. He leads the development of the CIS Critical Security Controls, a worldwide consensus project to find and support technical best practices in cybersecurity. Tony also serves as the Director of the SANS Innovation Center, a subsidiary of The SANS Institute. He retired from the National Security Agency (NSA) after 34 years as an Information Assurance professional. As the lead pathfinder at CIS, Mr. Sager addressed Cyber Security Summit 2016 on Making Best Practice Common Practice: the CIS Controls. “…I have just completed 40 years in ...
Target Corp. experienced a serious system breach in 2013, introduced through an inadequately protected downstream supplier in what has become a textbook case of a hack to avoid. Tim Crothers had worked at General Electric Corp. He is the man who came aboard two years ago as Senior Director of Cybersecurity to steer the team that’s mounting defenses to keep Target’s cyberspace secure. Tim is a seasoned security leader with over 20 years’ experience building and running information security programs, large and complex incident response engagements, and threat and vulnerability assessments. He has deep experience in cyber-threat intelligence, reverse engineering, ...