CybersecurityCrucialCollaborations 2018 Jan. 18, 2018 to Jan. 19, 2018, new york,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Next Wave:The Fully Engaged Board and the Quantification of Cybersecurity Value Larry Clinton True organization-wide, cross-functional cybersecurity strategy requires a fully engaged board and leadership that can quantify ...
The Cross-Functional Challenge of Measuring Risk Appetite Talvis Love , G. Sonny Cave Measuring, and making decisions based on, cyber risk appetite poses unique challenges in assessing and ...
Scenario 1: Third Party Risk and IP Under Attack Pamela Passman , Craig Moss In interactive role-playing exercises conducted over the two days of the conference, attendees will work ...
Insiders and Immune Systems: When Rules and Signatures Don’t Work Brad Hong , Dan Fein Rules and signatures struggle to keep pace with rapidly evolving cyber attacks. From insiders to ...
Case Study: How Microsoft Transformed its Cyber Security Governance Lisa Reshaur Explore the reasons behind, the process of, and the results emerging from Microsoft’s transformation of ...
The Cybersecurity-Privacy Partnership Lydia Payne Johnson As cyberatacks lead to ever-larger breaches of private data, the missions of privacy and cybersecurity ...
Transcending Silos with a Compliance Framework Paul Flanagan Learn how to use a compliance framework to break through silos around cybersecurity, privacy, and ...
Conference Board Research: Digital Transformation and Evaporating Boundaries Mary Young In this interactive session, attendees will build from the Conference Board research study, Driving Digital ...
Closing Remarks: Joan Greco N/A
Opening Remarks: Joan Greco N/A
Scenario 2: Ransomware Robert Clyde In our Day 2 interactive role-playing exercise, we explore who is part of the decision-making ...
How Your Business Becomes Russia’s Business: Understanding the Players, Methods and Motives behind Russian Cyberattacks David j. Smith , Khatuna Mshvidobadze Russian political cyber- and information warfare have captured the headlines, but they are one part ...
The Battle for Cybersecurity Talent: Creative and Collaborative Solutions Robert Clyde Research indicates that the challenges of recruiting cybersecurity talent are only going to intensify in ...
Case Study: Public-Private Partnerships in IoT Innovation Edison Alvarez Learn how BD manages and benefits from a network of partnerships with the FDA, DHS, ...
Strengthening Lines of Communication: Information Sharing among Business, Government, and Academia Jason Healey , Talvis Love , Anthony Ferrante , D. Frank Hsu , Lydia Payne Cybersecurity leaders from the private sector, public sector, and academia discuss why and how to ...
Building a More Defensible Cyberspace: The New York Cyber Task Force Report Jason Healey How can cyberspace be made more defensible without sacrificing the utility, flexibility, and convenience that ...
The Human-Centric Future of Cybersecurity Jim Routh Learn how behavior-based security - an approach that sees the human factor as a design ...