Site is Loading, Please wait...
Skip to content
  • Summit
    • History
    • Think Tank
    • Volunteer
    • Scholarship
    • Intern Program
      • Intern Application
      • CSS15 Student Interns
    • Visionary Leadership Awards
      • VLA 2026 Nominations
      • VLA Honorees
    • Past Events
      • Past Summits Directory
      • Photo Galleries
        • 15th Annual Summit
        • 14th Annual Summit
        • 13th Annual Summit
        • 12th Annual Summit
        • 2025 Mid-Year Cheer!
        • 2024 Spring Soirée
        • 2023 Spring Gala
        • 2022 Spring Gala
    • Cyber Blog
      • Cyber Pro Podcast
        • Podcast Channel
        • Webinars
          • Webinar Series
          • Video Archive
    • Contact
  • Sponsors & Partners
    • Sponsor Resources
    • 2026 Sponsors & Partners
  • CSS15 Fearlessly Forward
    • Full Agenda
    • Cyber Sports CTF Competition
    • MedTech Seminar
    • Public Sector Seminar
    • Cyber101 Workshop
    • Visionary Leadership Awards
    • Military Awards
    • 2025 Summit Presentations
  • Subscribe
  • Summit
    • History
    • Think Tank
    • Volunteer
    • Scholarship
    • Intern Program
      • Intern Application
      • CSS15 Student Interns
    • Visionary Leadership Awards
      • VLA 2026 Nominations
      • VLA Honorees
    • Past Events
      • Past Summits Directory
      • Photo Galleries
        • 15th Annual Summit
        • 14th Annual Summit
        • 13th Annual Summit
        • 12th Annual Summit
        • 2025 Mid-Year Cheer!
        • 2024 Spring Soirée
        • 2023 Spring Gala
        • 2022 Spring Gala
    • Cyber Blog
      • Cyber Pro Podcast
        • Podcast Channel
        • Webinars
          • Webinar Series
          • Video Archive
    • Contact
  • Sponsors & Partners
    • Sponsor Resources
    • 2026 Sponsors & Partners
  • CSS15 Fearlessly Forward
    • Full Agenda
    • Cyber Sports CTF Competition
    • MedTech Seminar
    • Public Sector Seminar
    • Cyber101 Workshop
    • Visionary Leadership Awards
    • Military Awards
    • 2025 Summit Presentations
  • Subscribe

Arduous Search Yields Security Best Practices

  • Post author:Cyber Security Summit
  • Post published:July 20, 2017
  • Post category:Blog/Business/Cyber Crime

Tony Sager is a Senior VP and Chief Evangelist for the Center for Internet Security. He leads the development of the CIS Critical Security Controls, a worldwide consensus project to…

Continue ReadingArduous Search Yields Security Best Practices

Target Cyber Security Chief Shares His Formula for Building a Loyal Team

  • Post author:Cyber Security Summit
  • Post published:July 13, 2017
  • Post category:Blog/Business/Cyber Crime

Target Corp. experienced a serious system breach in 2013, introduced through an inadequately protected downstream supplier in what has become a textbook case of a hack to avoid. Tim Crothers…

Continue ReadingTarget Cyber Security Chief Shares His Formula for Building a Loyal Team

Understanding Human Element in Cybercrime is Key to Stemming the Problem

  • Post author:Cyber Security Summit
  • Post published:July 6, 2017
  • Post category:Blog/Cyber Crime

  Summit Keynote Speaker Dr. Shima Keene presented The Nexus of Cybersecurity, Crime and Terrorism. She is a Director of the Conflict Studies Research Centre, Oxford, UK, and is affiliated…

Continue ReadingUnderstanding Human Element in Cybercrime is Key to Stemming the Problem

FireEye Threat Analyst Lists Current Cyberattack Statistics

  • Post author:Cyber Security Summit
  • Post published:June 29, 2017
  • Post category:Blog/Cyber Crime

Kevin Thompson, Threat Analyst for FireEye, earlier worked as a cyber analyst for the CIA, covering Eastern Europe and Russia and briefing numerous government agencies on future potential incidents. His…

Continue ReadingFireEye Threat Analyst Lists Current Cyberattack Statistics

Risks Factors Growing, Cyber Defense Only Partly Defined

  • Post author:Cyber Security Summit
  • Post published:June 22, 2017
  • Post category:Blog/Cyber Crime/Government/Legislation

Truman Center Policy Program Manager Dan Paltiel, a keynote speaker at Cyber Security Summit 2016, spoke on the current state of cyber defense in Cyber After 2016: Protecting Your Network…

Continue ReadingRisks Factors Growing, Cyber Defense Only Partly Defined

Teasing Out Data Jumble to Make Plots and Actors Emerge

  • Post author:Cyber Security Summit
  • Post published:June 15, 2017
  • Post category:Blog/Business/Cyber Crime

Senior Product Manager Bob Stasio of IBM i2 Safer Planet was keynote speaker for Cyber Security Summit 2016. Prior to joining IBM, Mr. Stasio worked in threat intelligence programs at…

Continue ReadingTeasing Out Data Jumble to Make Plots and Actors Emerge
Read more about the article Lt. Gen. Ron Burgess: Weakest link in security chain generally the individual

Lt. Gen. Ron Burgess: Weakest link in security chain generally the individual

  • Post author:Cyber Security Summit
  • Post published:April 14, 2017
  • Post category:Blog/Cyber Crime/Government

Lt. Gen. (ret) Ronald Lee Burgess, Jr., who served as the 17th Director of the Defense Intelligence Agency, was one of the keynote speakers at Cyber Security Summit 2016 in…

Continue ReadingLt. Gen. Ron Burgess: Weakest link in security chain generally the individual
Read more about the article DHS Under Secretary: Vibrancy Makes Us Attractive Target for Hackers

DHS Under Secretary: Vibrancy Makes Us Attractive Target for Hackers

  • Post author:Cyber Security Summit
  • Post published:November 9, 2016
  • Post category:Blog/Cyber Crime/Government/Legislation

  “Minnesota is adding tech jobs at the greatest rate of anywhere in the country,” declared Suzanne Spaulding, Under Secretary for the National Protection and Programs Directorate (NPPD) at the…

Continue ReadingDHS Under Secretary: Vibrancy Makes Us Attractive Target for Hackers
Read more about the article Cyber Due Diligence Should be a Key Component of a Corporate Acquisition

Cyber Due Diligence Should be a Key Component of a Corporate Acquisition

  • Post author:Cyber Security Summit
  • Post published:November 1, 2016
  • Post category:Blog/Business

In July, Verizon announced that it would acquire Yahoo’s Internet business for $4.8 billion. In September, Yahoo disclosed that a massive data breach had compromised 500 million user accounts.  The breach…

Continue ReadingCyber Due Diligence Should be a Key Component of a Corporate Acquisition
Read more about the article Realities of today’s digital economy

Realities of today’s digital economy

  • Post author:Cyber Security Summit
  • Post published:October 7, 2016
  • Post category:Blog/Business/Cyber Crime/Research

Amid mushrooming IoT device sales and attendant channel transaction growth, findings from a recent study raise serious concerns about just how effectively online businesses are able to safeguard their stakeholders’…

Continue ReadingRealities of today’s digital economy
Read more about the article Study: Once inside, hackers don’t need malware

Study: Once inside, hackers don’t need malware

  • Post author:Cyber Security Summit
  • Post published:August 3, 2016
  • Post category:Blog/Cyber Crime

Once they have breached a system, most hackers no longer need malware, according to a new study by LightCyber, a provider of Behavioral Attack Detection solutions. According to the company's…

Continue ReadingStudy: Once inside, hackers don’t need malware
Read more about the article Cleveland cyber firm predicts GOP Convention will draw cyber attacks

Cleveland cyber firm predicts GOP Convention will draw cyber attacks

  • Post author:Cyber Security Summit
  • Post published:July 14, 2016
  • Post category:Blog/Uncategorized

According to the CEO of Stealthcare, a Cleveland-based cyber security firm, the next major cyber security attack will likely be tied to the GOP Convention, although he believes it won’t…

Continue ReadingCleveland cyber firm predicts GOP Convention will draw cyber attacks
Read more about the article Cyber Insurance Coverage Disputes: Not What Your Company Expected

Cyber Insurance Coverage Disputes: Not What Your Company Expected

  • Post author:Cyber Security Summit
  • Post published:July 13, 2016
  • Post category:Blog/Cyber Crime

While cyber insurance policies are popular, and can be an effective risk-mitigation tool, we have advised clients to be cautious, to evaluate policy language carefully, and to anticipate coverage disputes.…

Continue ReadingCyber Insurance Coverage Disputes: Not What Your Company Expected
Read more about the article Survey: Most companies don’t budget for ransomware attacks

Survey: Most companies don’t budget for ransomware attacks

  • Post author:Cyber Security Summit
  • Post published:July 7, 2016
  • Post category:Blog/Cyber Crime

Based on the prevalence of the scam, some security experts have called 2016 “the year of ransomware,” yet a new survey shows most businesses don’t budget extra funds to regain…

Continue ReadingSurvey: Most companies don’t budget for ransomware attacks
Read more about the article RSA: Most companies still exposed to significant cyber risk

RSA: Most companies still exposed to significant cyber risk

  • Post author:Cyber Security Summit
  • Post published:June 16, 2016
  • Post category:Blog/Business/Cyber Crime/Research

Is your company exposed to significant cyber risk? If not, you're in the minority, according to a new report from RSA. For the second year in a row, RSA, The…

Continue ReadingRSA: Most companies still exposed to significant cyber risk
  • Go to the previous page
  • 1
  • …
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • …
  • 16
  • Go to the next page

Recent Posts

  • MEET THE MINNESOTA CONSUMER DATA PRIVACY ACT (MCDPA)
    June 4, 2024/
    0 Comments
  • FROM THE DESERT TO THE DESKTOP
    May 29, 2024/
    0 Comments
  • INSIGHT ON NATIONAL SECURITY AND THE FISA REAUTHORIZATION
    April 17, 2024/
    0 Comments

  Subscribe to Cyber Security Summit Newsletter

  Follow Us on LinkedIn

Copyright © 2026, Event Shows, LLC., dba Cyber Security Summit. All Rights Reserved.
Close Menu
  • Summit
    • History
    • Think Tank
    • Volunteer
    • Scholarship
    • Intern Program
      • Intern Application
      • CSS15 Student Interns
    • Visionary Leadership Awards
      • VLA 2026 Nominations
      • VLA Honorees
    • Past Events
      • Past Summits Directory
      • Photo Galleries
        • 15th Annual Summit
        • 14th Annual Summit
        • 13th Annual Summit
        • 12th Annual Summit
        • 2025 Mid-Year Cheer!
        • 2024 Spring Soirée
        • 2023 Spring Gala
        • 2022 Spring Gala
    • Cyber Blog
      • Cyber Pro Podcast
        • Podcast Channel
        • Webinars
          • Webinar Series
          • Video Archive
    • Contact
  • Sponsors & Partners
    • Sponsor Resources
    • 2026 Sponsors & Partners
  • CSS15 Fearlessly Forward
    • Full Agenda
    • Cyber Sports CTF Competition
    • MedTech Seminar
    • Public Sector Seminar
    • Cyber101 Workshop
    • Visionary Leadership Awards
    • Military Awards
    • 2025 Summit Presentations
  • Subscribe