The Impact of a Data Breach
To understand the cyber risk your organization faces, you need to understand the likelihood of a breach – and its potential cost. In this session, a top expert discusses the many – and sometimes hidden – costs of a data breach, including its impact on customers and end users. You'll also get insight on the frequency of data breaches and a better understanding of how likely it is to happen to your organization.
Who Are the Bad Guys? Cyber Criminals and Their Motivations
Today's cyber attackers range from financially motivated criminals to politically motivated hacktivists to state-sponsored hacker units. What are the motives and methods of these disparate adversaries? This session offers a look at the different types of cyber attackers and offers advice about how you can build a cyber defense strategy that extends across a wide variety of threats.
Developing and Testing an Effective Incident Response Program
If your organization doesn't have a plan for handling a major data breach, you're already in trouble. In order to swiftly and effectively respond to a cyber compromise, you must develop a program for first response in the data center as well as downstream response in the business units and in the public eye. This session offers some guidance on how to build an incident response plan that can identify and repair compromises as quickly as possible -- and how to test and practice that plan so that you're ready for the real thing.
Detecting and Mitigating Ransomware and Other Sophisticated Attacks
In the past, most cyber attack campaigns were primarily random, and they simply exploited the most vulnerable systems they could find. Today, however, there is an increasing number of sophisticated attacks – in particular, ransomware -- that target specific companies, data, or even employees. These attacks are often extremely well disguised and may escape the security tools that most enterprises use to screen out more random attacks. What tools and defenses are there to prevent targeted attacks on your organization? In this session, you will hear about the latest types of targeted attacks and what your enterprise can do to stop them.
Collecting and Using Threat Intelligence Data
The good news in IT security is that there is a growing list of resources and services that can inform you on the latest threats in cyber space and the criticality of each. The bad news is that with so many sources and so much data, using threat intelligence to improve your cyber defenses can be a bewildering process. This session will look at some of the different types and sources of threat intelligence data and provide advice on how to choose the right ones and use them to improve your defenses.
Finding and Fixing Security Issues In Your Electronic Supply Chain
As organizations such as Target have discovered, cyber attackers sometimes attack indirectly, through suppliers, contractors, and customers that have access to corporate systems. How can you ensure that third parties are keeping their own systems secure – and are not providing an avenue of compromise for your data? How should you work with your partners in the event of a security incident? In this session, our speaker discusses the methods you can use to vet your suppliers’ security -- and how to work with your partners if a compromise is found.
How to Talk to Management About Cybersecurity and Risk
As an IT professional, you’ve developed some ideas on how cyber attackers might compromise your enterprise data and how you can defend against them. Now you have another challenge: presenting those threats and strategies to business managers who know nothing about IT security technology. How can you convey the current state of your IT security posture to top management and make a business case for investing in additional IT security resources? In this informative session, you’ll get advice and recommendations on how to present security issues to your management in language they can understand.
Understanding the Legal Side of Cybersecurity
A major data breach may not only present technical problems and interrupt your business, it may land you in court. What are your organization’s legal responsibilities when it comes to cybersecurity, and what can you do to minimize legal risks? A top legal expert will discuss some of the issues and liabilities associated with cybersecurity, including the strengths and weaknesses of cyber insurance policies – and the hidden costs that they may not cover.