The Future of Cybersecurity is Integration

By Mary Frantz, Founder & Managing Partner, Enterprise Knowledge Partners, LLC May 21, 2020 The cybersecurity industry has continued on a steady migration from being reactive to proactive, enhanced by mobile and cloud, and moving from a known threat-based prevention model to an artificial intelligence (AI) predictive and resilience model. At the same time, the threat actors […]

Read more

The Covid Crossroads – and the Path to Resilience

By Tom Patterson, Chief Trust Officer, Unisys Corporation May 21, 2020 The U.S. is at a critical moment in time. We face a backdrop of ever-increasing cybersecurity threats coupled with an ever-increasing dependence on internet technologies critical to almost every facet of our day-to-day lives. And both the security risks we face and our reliance […]

Read more

Lessons From the Energy Sector

Thank you to all critical infrastructure sectors for your continued focus and dedication during this challenging time. The Electric Sector continues working hard to “keep the lights on” and coordinate together on mitigation efforts related to COVID-19. One example is the joint work facilitated by the Electricity Subsector Coordinating Council and their key message during […]

Read more

Three Practical Tips For Securing Your Small Business

By Kathy Washenberger, Director Information Security/GRC April 15, 2020 This current environment has many attackers targeting small businesses. Attackers want to exploit areas they perceive to be the weakest. As a way to combat these attackers and provide you with some practical ways to recognize issues early, here are some things you can be thinking […]

Read more

Evolving Our Communications As We All Work Remotely

By Chris Veltos, Cyber Risk Strategist; Digital Trust Advisor; Dr. InfoSecApril 15, 2020 This past month has been one for the record books. IT and cybersecurity staff across the globe have managed to move tens or possibly hundreds of databases, applications, and services online so their organization could continue operating. That initial shift happened with […]

Read more

Inaugural Newsletter Carries Forward Summit Mission

By Eileen Manning, Executive Producer, Cyber Security Summit April 15, 2020 As the Summit enters its 10th year connecting cyber security leaders to drive change and protect our global infrastructure, we do so in precarious times. The COVID-19 pandemic has upended the world as we know it, and as we collectively work to “flatten the curve,” this […]

Read more

Coronavirus

For ten years we’ve been building the Cyber Security Summit into a successful platform to network thought leaders and those involved in the everyday defense of our cyber infrastructure. In light of coronavirus (COVID-19) and its impact on public gatherings, we understand you may be evaluating your decision to attend this year’s Summit later this […]

Read more

Building and retaining your security team

Building and retaining your security team If you are a cybersecurity leader/hiring manager, you are probably getting tired of being reminded that there aren’t enough skilled cybersecurity staff to fill your open positions.  We know already, can we stop complaining about it?  Yes, there are currently 500K open cyber positions in the US and nearly 3 […]

Read more

Target’s Tim Crothers and Catharine Trebnick of Dougherty & Company to lead the Ninth Annual Cyber Security Summit

Target’s Tim Crothers and Catharine Trebnick of Dougherty & Company to lead the Ninth Annual Cyber Security Summit Oct. 28-30 in Minneapolis MEDIA CONTACTS Lynn Nelson | LIN Public Relations, Inc. 612.990.0126 lnelson.linpr@gmail.com FOR IMMEDIATE RELEASE Target’s Tim Crothers and Catharine Trebnick of Dougherty & Company to lead the Ninth Annual Cyber Security Summit Oct. […]

Read more

Adopting Economic Analysis Gives Cyber Execs Leverage in Demonstrating Value

“If you’re in cyber security, you’ve got a problem,” said Scott Borg, CEO of Cyber Consequences Unit. C-level cyber security people may be topped out career-wise in their organizations because management may not understand what they do and security terminology is alien to businesspeople. Speaking on the “Economics of Cybersecurity,” Borg advocated that his security […]

Read more

Threat Hunting Reduces Hacker Residence on a Breached Site

Average dwell time, where a hacker inhabits a breached system, is 200 days, said Bob Stasio of DreamIt Ventures, a cybersecurity company that hunts for intruders on organization systems. He has worked in security positions for IBM, NSA, FAA and NASA. Addressing Cyber Security Summit 2018, Stasio said that 80 percent of hacks are stopped […]

Read more