Cyber Security Summit Blog

By Tim Crothers and Catharine Trebnick, Co-Chairs, 2020 Cyber Security SummitOctober 15, 2020 It’s kick-off time! Next week the 10th annual Cyber Security Summit will get underway, and there’s still time for you to be a part of it. With all the challenges 2020 has thrown at us, the Summit has never been timelier. This year’s theme is The Ripple Effect, and when we selected it, we had no way of knowing just how relevant the concept would be. Our lives have become even more intertwined this year, and the need for smart, innovative security has never felt more important ...
Read More
October 21, 2020 At the Cyber Security Summit’s Oct 27 CISO Forum, our expert panel will empower C-Suite executives and board rooms to navigate a strategic balance between the demand for digital transformation around a telecommuting workforce, and the need to conserve cash as they wait out the global crisis created by COVID-19. Ahead of this invite-only event, a few of the panelists offered their reflections on 2020 and advice for the road ahead. Navigating 2020’s Digital Transformation  It’s about “more work, fewer people.” Even within the push for automation, companies will look to save costs where possible by leveraging ...
Read More
Cyber Security Summit announces the Visionary Leadership Award Winners Minneapolis (October 19, 2020) – The Cyber Security Summit is pleased to announce the 2020 Visionary Leadership Award winners. The Summit gathers leaders globally to discuss, train and address cyber security problems facing our nation and the world. Programming is driven by the Cyber Security Summit Think Tank, whose members represent industry and government across the 16 critical infrastructures. The Visionary Founders Award is given to the individuals who over the years have worked to build the Cyber Security Summit and thereby globally heighten the awareness to cyber threats, share solutions ...
Read More
By Phil Schenkenberg and Scot Ganow, Taft LawSeptember 17, 2020 A key partner for any security leader is the in-house legal team at your organization. Together, you have to make important decisions as your company evaluates and manages cyber risk and prepares for and responds to data-related incidents. The relationship often requires navigating a knowledge gap around specific technical cybersecurity elements that can increase the strain on an otherwise healthy partnership. To that end, the Cyber Security Summit is hosting the half-day Cybersecurity for In-House Legal Counsel Seminar (3.25 CLE credits requested) for those counsels interested in learning how to ...
Read More
By Anita Finnegan, CEO, Nova LeahSeptember 14, 2020 What have we learned from the 2020 pandemic? We know that in an instant, life as we know it can be swiped away from under our feet. We’ve learned to stay at home and distance ourselves from everyone including friends and family. Many of us have learned how to work from home and do it effectively. We’ve leveraged digital platforms in place of the board room. We wave into a camera in place of a handshake. How we conduct business has likely changed forever more. This is also true for the healthcare ...
Read More
By Paul Veeneman, VP of Operations, MBA EngineeringSeptember 15, 2020 The convergence of Operations Technology (OT), Information Technology (IT), Internet of Things (IoT), and Industrial IoT has brought with it a wave of connected devices, systems and applications that present significant cybersecurity challenges. In the coming years, these changes will have an impact on the world’s critical infrastructure systems, including water and wastewater systems, electrical power utilities, telecom systems, healthcare systems, industrial environments, agriculture, manufacturing, and more. Over the past decade critical infrastructure industries have transformed the operations technology landscape, introducing a proliferation of SCADA systems, industrial controls, and digital ...
Read More
By Ken Hoyme and Judy HatchettCo-Chairs, Oct. 26 Healthcare and Med Device SeminarSeptember 14, 2020 There are several fundamental characteristics of medical devices that make them a unique challenge for security practitioners. One is the long lifecycle that these systems typically have – sometimes as long as 10 or 15 years. Imagine if you were still using a laptop you purchased in 2005; it might feature a floppy drive, a CR-ROM drive, a VGA output, blazingly fast USB 1.1 ports, and of course an outdated operating system. The second is that medical devices need to be tested by the manufacturer ...
Read More
By Sean S. CostiganAugust 17, 2020 If you are a local government election official, a vendor of electronic voting machines, an intelligence analyst, a cybersecurity expert working for a social media company, someone holding high office, or simply a voter, you are invested in election security. You may even hold strong, expert opinions on aspects of the issue. However, as a multivariate global challenge, each investment people make may not be commensurate with present-day risks nor result in the desired outcomes. Consider electronic voting: when asked about e-voting, transparency and verifiability are topmost in the minds of many. While those ...
Read More
By Mark RitchieJuly 23, 2020 Last year I was sworn in as Civilian Aide to the Secretary of the Army, pledging to “support and defend the Constitution of the United States against all enemies, foreign and domestic.” During that solemn moment of the swearing in ceremony I thought about my former role as the State of Minnesota’s Chief Election Officer, and what I had learned during that time about “foreign and domestic” threats with regards to protecting our elections. Very early in my very first term of office, having won my election in the fall of 2006, our office faced ...
Read More
By Anne C. Bader, Founder, The International Cybersecurity Dialogue August 17, 2020 A few years ago, I met Eileen Manning, producer of the annual Cyber Security Summit (CSS) in Minneapolis, while attending a security event in Washington D.C. I was there as Founder of The International Cybersecurity Dialogue (ICD), whose mission is to promote dialogue and a working relationship between technologists and policymakers. Eileen emanated a “je ne sais quoi” of positive energy and authenticity, and I quickly learned that we shared a firm belief in the power of networks and continuous dialogue to accomplish the seemingly insurmountable task of ...
Read More