- This event has passed.
Cyber Security Summit
November 17, 2015 @ 9:00 am - 4:00 pm
|9:15am – 10:00am||John (Dave) Frymier, Vice President and Chief Information Security Officer, Unisys Corporation
Underlying causes of cybersecurity problems on the Internet and the Strategy to mitigate the problem
|10:00am – 10:15am||Break|
|10:15am – 11:00am||Chuck Davis, MSIA, CISSP-ISSAP
Executive Malware Defense & Vulnerability Management Architect, IBM CHQ, BT/IT CIO
Malware Defense: From The Endpoint to the EnterpriseBest practices and strategic insight for Prevention, Detection, Analysis and Remediation
Malware is a threat that remains dynamic in its delivery and attack methods. It has been well-known for many years that signature based anti-malware solutions are not enough to detect and prevent many malware attacks. So how do we protect our organizations from the constantly growing threat of malware? Chuck Davis will talk about the threat, review today’s best practices and provide strategic insight on methods of Prevention, Detection, Analysis and Remediation.
|11:00am – 11:15am||Break|
|11:15am – Noon||Joe Cudby, Senior Director Professional & Security Services, Level3
This talk will cover the role of Security Leadership in the Organization’s Culture, Security Education and Awareness Training, Mitigating Vulnerabilities & Threats in regard to aspects of Shared Computing (cloud) and Managing the Organization’s Technical Security Solutions Portfolio
|Noon – 1:00pm||Lunch – On your Own|
|1:00pm – 1:45pm||Srini Subramanian, Principal
State Sector Risk Advisory Services LeaderDeloitte & Touche LLP, Camp Hill, Pennsylvania
Improve Response to Cybersecurity Risks by Getting Closer to the Business
To improve response to cyber threats and compliance, there is a need to better identify potential business-specific risks and improve communication around these risks. The new channels of connecting to citizens and onset of the Internet of Things (IoT) makes this approach even more critical. In addition, documenting citizen privacy issues – the business outlook of “why” citizen data needs to be protected – and possible business implications of a breach are necessary steps to manage changing risks. Join this session to learn more about the need and options for getting closer to the business.
|1:45pm – 2:00pm||Break|
|2:00pm – 2:45pm||Renault Ross, US Security Business Principal (Distinguished), Public Sector Strategic Programs, Symantec Corporation
· Global Threat Landscape — Who and what you’re protecting against.
· Methodology for Building Security Program and Aligning Technologies – moving from tactical to strategic.
· Real World Examples/Business Use Cases – Best practices security principles and associated technology capabilities
|2:45pm – 3:00pm||Break|
|3:00pm – 3:45pm||Steve Caimi, Industry Solutions Specialist, US Public Sector Cybersecurity, CISCO Systems
Cybersecurity Best Practices: Learn and Apply the NIST Cybersecurity Framework
It’s time for a threat-centric approach, as traditional defenses that rely exclusively on detection and blocking for protection are no longer adequate. In this session, we’ll explore cybersecurity best practices from the National Institute of Standards and Technology (NIST). It shows how agencies and organizations can apply a new security model that covers the entire attack continuum – before, during, and after the attack.
|3:45pm – 4:00pm||Wrap-up|