Afleveringen
-
Behind the scenes conversation from the 13th Annual Cyber Security Summit, Keynote Speaker, Jennifer Giroux talks with Summit Co-chair Sean Costigan about her Bridging Realms General Session, straddling the in between, the moment we are in, the potential futures we want to create and more... why not listen in >>>
www.cybersecuritysummit.org
-
Zijn er afleveringen die ontbreken?
-
Our At Summit Cyber Pro Podcast episodes continue connecting you with the top minds in Cyber on what's now and next. Today we will take you behind the scenes in this week's Cyber Pro Podcast episode from our #CSS13 Summit featuring Oscar Minks, Chief Technology Officer, FRSecure.
Cyber Security Summit | cybersecuritysummit.org
#resilienceunlocked #css13 #cyberpro #podcast
-
During the 13th Annual Cyber Security Summit we hosted a Podcast Studio, we get to capture and release over the coming weeks… as you can see November is a who’s who of insightful leaders from the top organizations across the cyber landscape.This week Sean Costigan and Nancie Williams talk updates on Red Sift, Summit Water Cooler Conversation and Healthcare and Medical Device Seminar with Dan Cunningham, Program Chair of this year's Summit.
https://www.cybersecuritysummit.org/cyber-pro-podcast/
Sean S. Costigan PhD
Nancie Williams
Red Sift
Dan Cunningham
-
Our At Summit Cyber Pro Podcast episodes continue connecting you with the top minds in Cyber on what's now and next. Today we will take you behind the scenes in this week's Cyber Pro Podcast episode from our #CSS13 Summit featuring Drew Perry, Chief Innovation Officer, Ontinue.
Cyber Security Summit | cybersecuritysummit.org
#resilienceunlocked #css13 #cyberpro #podcast
-
We were busy during Summit Connecting with the top minds in Cyber on what's now and next. Today we will take you behind the scenes in this week's Cyber Pro Podcast episode from our #CSS13 Summit featuring Brian Kenyon, Chief Strategy Officer, Island.
Cyber Security Summit | cybersecuritysummit.org
#resilienceunlocked #css13 #cyberpro #podcast
-
Cyber Security Summit > 12/29/22 > AT SUMMIT Podcast Conversation with Sean Costigan Professor; Director and Co-Founder, George C. Marshall European Center for Security Studies; ITL Security and Eileen Manning, Founding Partner, Executive Producer, Cyber Security Summit #css12
During the 12th Annual Cyber Security Summit, leading Cyber Professionals connected and shared their insights with us.
We thought you would want these key insights in "quick-listen" AT SUMMIT Conversation Glimpses so you can easily Join in our active Cyber Pro Community via our Podcast Channels and we invite you to Join Us our Social Community and Cyber Security Conversation on LinkedIn at https://bit.ly/LinkedInCyberSecuritySummit
Today's Glimpse is a candid conversation between Sean Costigan Professor; Director and Co-Founder, George C. Marshall European Center for Security Studies; ITL Security and Eileen Manning, Founding Partner, Executive Producer, Cyber Security Summit as they talk about the impact of the pandemic on the international cyber security community and how they are coming back together IRL at the Cyber Security Summit.
Join the CyberSecuritySummit.org Conversation on LinkedIn #css12 #css
www.cybersecuritysummit.org
-
During the 12th Annual Cyber Security Summit, we pulled aside leading Cyber Professional to share their Cyber Security Solutions and insights with us.
We thought you would want these key insights in "quick-listen" AT SUMMIT Conversation Glimpses so you can easily Join in our active Cyber Pro Community via our Podcast Channels and we invite you to Join Us our Social Community and Cyber Security Conversation on LinkedIn at https://bit.ly/LinkedInCyberSecuritySummit
Today's Glimpse is with Ben Corll Business Executive, CISO of Zcsaler hosted by Wendy Meadley, Next Phase Studio for the Cyber Security Summit. And added guest Zscaler Account Executive Jack Lampert.
We'll explore where Zscaler fits into the cyber ecosystem - as a center switchboard by the way- and learn why Ben doesn't think "US vs. THEM" along with his tip that we are now moving from inherent to explicit trust in cybersecurity.
(We had an active crowd for this podcast and you will hear them in the background)
Ben Corll is a 25 year veteran in the cybersecurity industry with a passion to protect enterprise organizations. He has spent his career establishing security programs for companies of all types and sizes, from 500 to 50,000. Ben has held just about every technical security role, from AV, firewall, SIEM, and DLP management, security architect, and CISO roles.
Prior to joining Zscaler, Ben was the VP/Head of Cybersecurity (CISO) for Coats, a global manufacturer of industrial thread. This was a newly created role which allowed Ben to build a program: from by policies, creating and refining processes, to choosing technology controls. Ben is passionate about engaging with both security practitioners and business leaders on the value of digital transformation and preparing businesses to defend against threats. Much of his time is spent focusing teams on the fundamental practices or basics and doing them well before pivoting to more advanced solutions.
Join the CyberSecuritySummit.org Conversation on LinkedIn #css12 #css
www.cybersecuritysummit.org
-
During the 12th Annual Cyber Security Summit, we pulled aside leading Cyber Professional to share their Cyber Security Solutions and insights with us.
We thought you would want these key insights in "quick-listen" AT SUMMIT Conversation Glimpses so you can easily Join in our active Cyber Pro Community via our Podcast Channels and we invite you to Join Us our Social Community and Cyber Security Conversation on LinkedIn at https://bit.ly/LinkedInCyberSecuritySummit
Today's Glimpse is with Jerrod Montoya, Principal of Truvantis hosted by Dr. Shayla Treadwell, Vice President of Governance, Risk and Compliance; Cyber Center of Excellence, ECS.
Jerrod Montoya is a leading cybersecurity attorney in Minnesota who helps companies take strategic and decisive action to mitigate legal risk regarding all aspects of cybersecurity. He has over a decade of experience at the intersection of law and cybersecurity including various work on legal, cybersecurity, privacy, and compliance issues in the energy sector. Jerrod has experience as Deputy CISO and Project Manager for a premier Software as a Service (SaaS) provider in the energy industry. He is also the past-President for InfraGard Minnesota Members Alliance, a non-profit public/private partnership with the FBI focused on Critical Infrastructure protection.
Join the CyberSecuritySummit.org Conversation on LinkedIn #css12 #css
www.cybersecuritysummit.org
-
During the 12th Annual Cyber Security Summit, we pulled aside leading Cyber Professionals to share their Cyber Security Solutions and insights with us.
We thought you would want these key insights in "quick-listen" AT SUMMIT Conversation Glimpses so you can easily Join in our active Cyber Pro Community via our Podcast Channels and we invite you to Join Us our Social Community and Cyber Security Conversation on LinkedIn at https://bit.ly/LinkedInCyberSecuritySummit
Today's Glimpse is with Tissa Richards, Cybersecurity Entrepreneur + Author of No Permission Needed hosted by Dr. Shayla Treadwell, Vice President of Governance, Risk and Compliance; Cyber Center of Excellence, ECS.
Tissa Richards' resume is impressive and chocked full of the expertise needed to coach executive cyber professionals in their leadership development and into their next board position and more. She is a repeat Silicon Valley founder and CEO who has funded and led software companies.
Join the CyberSecuritySummit.org Conversation on LinkedIn #css12 #css
www.cybersecuritysummit.org"AT SUMMIT" Cyber Pro Insights Podcast Episodes NOW available on Spotify, Apple and Google Podcasts > 12th Annual Cyber Security Summit
-
Join this complimentary Webinar to learn from our panel of top cyber leaders on courses to take and organizations to get involved with as part of you student-to-professional career path within this high-demand field.
Cyber security is a complex and exciting field of work, and many roles can be found within banks, retailers, e-tailers, healthcare, and government organizations. Your role in the organization may include safeguarding an organization's files and network, install firewalls, create security plans, guard customer data, and monitor activity.
Pursuing a career in cybersecurity means joining a rapidly growing industry where available jobs outnumber qualified candidates. According to the US Bureau of Labor Statistics, the number of cybersecurity jobs is expected to increase by 35 percent between 2021 and 2031. And, the COVID-19 pandemic has only accelerated this demand.
As cybersecurity continues to grow in importance, more specialized roles are emerging. Starting as an entry level analyst, for example, creates the opportunity to follow your interests within the world of information security and create a career path that’s just right for you.
This webinar is perfect for current post secondary students and recent graduates.
Cyber Security Summit - Minneapolis, MN cybersecuritysummit.org #cybersecurity #MaryFrantz #MichaelKearn #AimeeMartin #TinaMeeker
-
EPISODE 3 > Today's Glimpse is with Cody Wass, Vice President of Services and Cody Chamberlain, Head of Product, of NetSPI hosted by Wendy Meadley, CEO, Next Phase Studio
The Cody's as they are "affectionately nicknamed" shed light on how technology alone cannot solve the greatest cyber security challenges. It is achieved when you effectively leverage technology to maximize the value of human creativity, experience and ingenuity.
Check out our Cyber Leader Insider Glimpses from #CSS12
12th Annual Cyber Security Summit > Summit Podcast on Spotify, Apple Podcasts and Google Podcasts > Subscribe to Stay in Touch with our Weekly Podcasts.
Since there is so much great insight in these glimpses, we are releasing a new Cyber Security Summit "AT SUMMIT" Podcast Episode every week!
And, Join our LinkedIn Cyber Pro Community @cybersecuritysummit
www.cybersecuritysummit.org
#cybersecurity
#cybersummit
#podcast
-
During the 12th Annual Cyber Security Summit, we pulled aside leading Cyber Professional to share their Cyber Security Solutions and insights with us.
We thought you would want these key insights in "quick-listen" AT SUMMIT Conversation Glimpses so you can easily Join in our active Cyber Pro Community via our Podcast Channels and we invite you to Join Us our Social Community and Cyber Security Conversation on LinkedIn at https://bit.ly/LinkedInCyberSecuritySummit
Today's Glimpse is with Shawn Riley, Chief Information Officer of the State of North Dakota hosted by Dr. Shayla Treadwell, Vice President of Governance, Risk and Compliance; Cyber Center of Excellence, ECS.
Self-professed "IT Guy" Shawn shares how the State of North Dakota is reimagining and redefining how and what to teach today's youth so they are technologically-savvy. A necessary approach for future success for the youth of today.
Join the CyberSecuritySummit.org Conversation on LinkedIn #css12 #css
www.cybersecuritysummit.org
-
During the 12th Annual Cyber Security Summit, we pulled aside leading Cyber Professional to share their Cyber Security Solutions and insights with us.
We thought you would want these key insights in quick-listen AT SUMMIT Conversation Glimpses so you can easily Join in our active Cyber Pro Community via our Podcast Channels and we invite you to Join Us our Social Community and Cyber Security Conversation on LinkedIn at https://bit.ly/LinkedInCyberSecuritySummit
Today's Glimpse is with Brian Kenyon, Chief Strategy Officer of Island hosted by Dr. Shayla Treadwell, Vice President of Governance, Risk and Compliance; Cyber Center of Excellence, ECS.
Today's Topic is the role of the Enterprise Browser and how it specifically is addressed in the Healthcare and Medical Device Industries.
Join the CyberSecuritySummit.org Conversation on LinkedIn #css12 #css
www.cybersecuritysummit.org
-
Mary Frantz, CISO. EKPartners Host" src="https://is1-ssl.mzstatic.com/image/thumb/Podcasts126/v4/9f/fc/d2/9ffcd2e5-7d3d-a220-a204-f4c46073aef8/mza_13372797309436851533.jpg/80x80bb.jpg" height="80" width="80" onload="const rect=this.getBoundingClientRect();this.onload=null;this.sizes=Math.ceil(rect.width/window.innerWidth*100)+'vw';this.width=rect.width;this.height=rect.height;" sizes="80px" srcset="https://is1-ssl.mzstatic.com/image/thumb/Podcasts126/v4/9f/fc/d2/9ffcd2e5-7d3d-a220-a204-f4c46073aef8/mza_13372797309436851533.jpg/80x80bb.jpg 80w, https://is1-ssl.mzstatic.com/image/thumb/Podcasts126/v4/9f/fc/d2/9ffcd2e5-7d3d-a220-a204-f4c46073aef8/mza_13372797309436851533.jpg/160x160bb.jpg 160w, https://is1-ssl.mzstatic.com/image/thumb/Podcasts126/v4/9f/fc/d2/9ffcd2e5-7d3d-a220-a204-f4c46073aef8/mza_13372797309436851533.jpg/320x320bb.jpg 320w, https://is1-ssl.mzstatic.com/image/thumb/Podcasts126/v4/9f/fc/d2/9ffcd2e5-7d3d-a220-a204-f4c46073aef8/mza_13372797309436851533.jpg/640x640bb.jpg 640w, https://is1-ssl.mzstatic.com/image/thumb/Podcasts126/v4/9f/fc/d2/9ffcd2e5-7d3d-a220-a204-f4c46073aef8/mza_13372797309436851533.jpg/1280x1280bb.jpg 1280w" loading="lazy" />
Creating a Strategic Penetration Testing Program
Traditional check-the-box penetration testing is a thing of the past. Modern penetration testing must be strategic and human delivered.
So, how can you make this shift?
In this session, Sam Horvath, Technical Client Director at NetSPI, the Minneapolis-based leader in offensive security, will explore the two core pillars of a successful pen testing program, share real examples of pen testing program transformations, and detail the steps your organization can take to get there.
Webinar Guest
SAM HORVATH
Technical Client Director
NetSPISam Horvath fills the role of trusted adviser at NetSPI for many of our enterprise accounts to ensure client success, while also working in a strategic advisory capacity on specific engagements. Previously, Sam worked as a senior consultant specializing in web applications and social engineering. He also has experience providing technical leadership and penetration testing program guidance for large financial institutions and global cloud providers. Sam earned his B.A. in computer science from Augsburg University and began his career at NetSPI in 2018 through the NetSPI University program.
Webinar Host
MARY FRANTZ
CISO, EKPartnersMary Frantz is the CEO of Enterprise Knowledge Partners, LLC (EKP). She has performed and led advanced ethical hacking (red teams), security assessments, managed multiple incident investigations for companies. She was the primary technical cyber expert in the Equifax, Yahoo and many other high profile breaches and security incidents. Mary holds 4 bachelor degrees and two masters degrees and various active and non-active certifications in systems auditing, ethical hacking, penetration testing, forensics, engineering and architecture. She is a national advocate and mentor of women and minorities in STEM, a Board Officer for the Minnesota Academy of Science, board advisor for the Minneapolis Cyber Summit, and an elected School Board Director for MN District 719.
Special Thanks:
NetSPI > 12th Annual Cyber Security Summit Sponsor -
The Security Equals Compliance Disconnect
Security will never be perfect; there will always be a residual risk that must be managed and controlled. Compliance does equal security, at least as best as your preferred standard or framework defines it.
Keep hiding behind “compliance does not equal security,” and you will forever be living off of your “luck” until it runs out – usually sooner rather than later.
Use the tools at your disposal correctly, stay current on threats, monitor your security posture, and live a long, prosperous, secure life.
Speaker:
JEFF HALL
Principal Security Consultant
TruvantisJeff has over thirty years of experience in information technology, information security and IT governance. He started his career as an IBM systems programmer writing and supporting operating systems, moved into application development, enterprise project management, CIO roles, CISO roles and then started a multinational consulting firm’s information security and PCI practices.
Jeff’s expertise ranges from operating systems to networking, enterprise application suites, information security and the cloud. He has been involved in a variety of projects to develop and implement innovative applications and services for small and midsized businesses to the Fortune 100. He has worked with manufacturing, distribution, financial institution, insurance, health care, and government organizations.
Moderator:
SEAN COSTIGAN
Professor, George C. Marshall European Center for Security StudiesSean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security.
His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.
Special Thanks:
A special thanks goes out to Truvantis who helped conceive this important conversation. -
What if the browser was designed for the enterprise?
The application enterprises use the most is the browser. In fact, it has become our primary work environment, but the browser is not an enterprise application. So we have surrounded it with an endless, complex and expensive stack that overwhelms your security teams and interrupts end users. But what if the browser was designed for the enterprise? What could that do for security, productivity and work itself?
Discover how an enterprise browser can:
• Protect critical SaaS and web applications
• Streamline and secure third-party contractor access and BYOD strategies
• Free you from the cost and poor user experience of VDI and DaaS solutions
• Give you the last mile control you have been seeking
• Deliver it in a familiar, Chromium-based application that is simple for users to access and operateSpeaker:
BRIAN KENYON
Chief Strategy Officer of Island.ioBrian Kenyon drives corporate strategy at Island as its Chief Strategy Officer and one of the company’s founding members. Brian has also held the role of CSO at Symantec and Blue Coat Systems. He built his early career in technical roles for more than a decade at McAfee where he was Chief Technical Strategist, as well as CTO, and served as chief architect at start-up Foundstone.
Brian is the author of Security Battleground: An Executive Field Manual; Security Sage: Guide to Hardening the Network Infrastructure; and Special Ops: Host and Network Security. He holds a B.A. degree in Finance from Loyola Marymount University.
Moderator:
SEAN COSTIGAN
Professor, George C. Marshall European Center for Security StudiesSean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security. His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.
-
In 2022 we are still seeing compromises as a result of not fully implementing basic security hygiene in organizations and not enforcing and enterprising logging and monitoring. This includes oversight of third parties and third party/open source APIs and software. We know that threat actors are becoming more creative in their attack vectors and methods, ensuring the basic / industry standard practices are implemented and knowing the key areas to monitor for cyber resilience and early warning signs of threat actor reconnaissance and compromise.
Speakers:
MARY FRANTZ Managing Partner and Founder, Enterprise Knowledge Partners, LLC
CHRIS BRINKWORTH Director, Forensics and eDiscovery, Enterprise Knowledge Partners, LLCModerator:
SEAN COSTIGAN Professor, George C. Marshall European Center for Security Studies
-
The hybrid workforce is no longer a concept, it is a reality. But as employees embrace new working environments, this hybrid approach poses a unique challenge for security leaders. During this discussion, we explore how organizations will need to create a security strategy rooted in the variability of the hybrid workforce — one that meets employees where they are and helps them learn the role they play in securing this new model.
Speaker: GARY SORRENTINO Global Deputy CIO, Zoom Video Communications, Zoom Gary Sorrentino currently serves as Global Deputy CIO for Zoom Video Communications. A former Managing Director for J.P. Morgan Asset & Wealth Management, Gary was the Global Head of Client Cyber Awareness and Education. For over 12 years, Gary was the Chief Technology Officer for J.P. Morgan AWM’s global technology infrastructure initiatives, where he managed its Data Privacy program and was responsible for Infrastructure, Application and End User Technology Production Support. In 2014, he assumed a new role as the lead for their Cybersecurity efforts and developed a firm wide “Protect the Client” Cyber program designed to raise cybersecurity awareness among employees and clients. With almost 40 years of experience in Information Technology, Gary has served in various other IT leadership positions in firms across the financial services industry. Prior to joining J.P. Morgan in 2005, Gary was Head of Global Infrastructure and Head of Technology Efficiencies at Citi Private Bank, where he was responsible for Global Infrastructure Support and strategic technology initiatives. Other roles he has held include Global Technology CFO at Credit Suisse and North America IT Controller at UBS.
Moderator: SEAN COSTIGAN Professor, George C. Marshall European Center for Security Studies Sean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security. His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.
Special Thanks: A special thanks goes out to Zoom who helped conceive this important conversation.
-
Artificial intelligence (AI) has become a security industry buzzword so broadly applied as to become almost meaningless. When every product boasts AI capabilities, security decision makers may quickly become cynical, even in the face of the most exciting innovation shaping cybersecurity today.
--What is the benefit of a cybersecurity solution powered by Artificial Intelligence and Machine Learning?
--Why does the number of generations of AI matter?
--How smart is the AI machine?
--How does AI provide a predictive advantage to prevent breaches for my organization?
--How can a ‘Prevention First’ cybersecurity approach help my business?
Speaker: TOM CAMERON
Solutions Architect, BlackBerry powered by Cylance AITom Cameron spent 15 years in the Intelligence Community as a U.S. Navy Cryptologic Technician and DoD contractor with Northrop Grumman. He was deployed worldwide supporting cryptologic missions during Operations Enduring Freedom/Iraqi Freedom, East Africa, and European theaters. He and his wife, Loretta, met while stationed together in Pearl Harbor, Hawaii, and have two sons both born in Puerto Rico. Tom is from St. Paul, Minnesota, and is a member of InfraGard and ISSA. Tom started his SE career with Symantec, was Mandiant SE of the Year in 2014, and is currently an SE for Blackberry by way of the Cylance acquisition.
Moderator: SEAN COSTIGAN
Professor, George C. Marshall European Center for Security StudiesSean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security. His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.
- Laat meer zien