Skip to main content
CYBER SECURITY SUMMIT

CYBER SECURITY SUMMIT

By Join Cyber Security Summit Community on LinkedIn + WWW.CYBERSECURITYSUMMIT.ORG

The Original Cyber Security Summit at CyberSecuritySummit.ORG draws thought leaders from across industry, government and academia with a robust agenda with actionable takeaways for all experience levels. In our 13th year themed Resilience Unlocked, IDENTIFY. RESPOND. RECOVER. LEARN
As cybersecurity incidents have become more frequent and sophisticated, it’s no longer sufficient to solely focus on their prevention.
Get an insider view of top Cyber Pros through AT SUMMIT Podcast Conversations/ On LinkedIn at www.linkedin.com/company/cyber-security-summit/ #css13
Available on
Apple Podcasts Logo
Google Podcasts Logo
Pocket Casts Logo
RadioPublic Logo
Spotify Logo
Currently playing episode

Cyber Security Summit Webinar Sept 2021 - The Significance of AI & Ml in Cybersecurity.mp4

CYBER SECURITY SUMMITOct 13, 2021

00:00
01:01:15
Cyber Pro Podcast > Jennifer Giroux and Sean Costigan talk Bridging Realms at Summit

Cyber Pro Podcast > Jennifer Giroux and Sean Costigan talk Bridging Realms at Summit

Behind the scenes conversation from the 13th Annual Cyber Security Summit, Keynote Speaker, Jennifer Giroux talks with Summit Co-chair Sean Costigan about her Bridging Realms General Session, straddling the in between, the moment we are in, the potential futures we want to create and more... why not listen in >>>


www.cybersecuritysummit.org

Dec 14, 202324:21
Cyber Pro Podcast > Cindi Carter, Check Point Software Solutions talks about what Global CISOs are Watching with Wendy Meadley

Cyber Pro Podcast > Cindi Carter, Check Point Software Solutions talks about what Global CISOs are Watching with Wendy Meadley

This week's AT SUMMIT Cyber Pro Podcast features Cindi Carter from Check Point Software... Want to put your finger on the pulse, give a listen!


Nov 30, 202329:02
Cyber Pro Podcast > Oscar Minks, FRSecure talks People-first Security and Identifying a Common Language to Educate People and Reduce Risk with Wendy Meadley

Cyber Pro Podcast > Oscar Minks, FRSecure talks People-first Security and Identifying a Common Language to Educate People and Reduce Risk with Wendy Meadley

Our At Summit Cyber Pro Podcast episodes continue connecting you with the top minds in Cyber on what's now and next. Today we will take you behind the scenes in this week's Cyber Pro Podcast episode from our #CSS13 Summit featuring Oscar Minks, Chief Technology Officer, FRSecure.

Cyber Security Summit | cybersecuritysummit.org

#resilienceunlocked #css13 #cyberpro #podcast


Nov 21, 202330:49
Cyber Pro Podcast > Sean Costigan and Nancie Williams of Red Sift are joined by Dan Cunningham
Nov 15, 202319:01
Cyber Pro Podcast Episode > Drew Perry, Ontinue talks Microsoft Teams and Reimaging Security Success with Wendy Meadley

Cyber Pro Podcast Episode > Drew Perry, Ontinue talks Microsoft Teams and Reimaging Security Success with Wendy Meadley

Our At Summit Cyber Pro Podcast episodes continue connecting you with the top minds in Cyber on what's now and next. Today we will take you behind the scenes in this week's Cyber Pro Podcast episode from our #CSS13 Summit featuring Drew Perry, Chief Innovation Officer, Ontinue.

Cyber Security Summit | cybersecuritysummit.org

#resilienceunlocked #css13 #cyberpro #podcast


Nov 08, 202310:12
Cyber Pro Podcast Episode > Brian Kenyon, Island talks Enterprise Browser and AI with Wendy Meadley
Nov 01, 202320:03
Cyber Security Summit > 12/29/22 > AT SUMMIT Podcast Conversation with Sean Costigan and Eileen Manning
Dec 29, 202203:10
Cyber Security Summit > 12/15/22 > AT SUMMIT Podcast Conversation with Ben Corll of Zscaler > Podcast Host Wendy Meadley, Next Phase Studio > #css12

Cyber Security Summit > 12/15/22 > AT SUMMIT Podcast Conversation with Ben Corll of Zscaler > Podcast Host Wendy Meadley, Next Phase Studio > #css12

During the 12th Annual Cyber Security Summit, we pulled aside leading Cyber Professional to share their Cyber Security Solutions and insights with us.

We thought you would want these key insights in "quick-listen" AT SUMMIT Conversation Glimpses so you can easily Join in our active Cyber Pro Community via our Podcast Channels and we invite you to Join Us our Social Community and Cyber Security Conversation on LinkedIn at https://bit.ly/LinkedInCyberSecuritySummit

Today's Glimpse is with Ben Corll Business Executive, CISO of Zcsaler hosted by Wendy Meadley, Next  Phase Studio for the Cyber Security Summit. And added guest Zscaler Account Executive Jack Lampert.

We'll explore where Zscaler fits into the cyber ecosystem - as a center switchboard by the way- and learn why Ben doesn't think "US vs. THEM" along with his tip that we are now moving from inherent to explicit trust in cybersecurity.

(We had an active crowd for this podcast and you will hear them in the background)

Ben Corll is a 25 year veteran in the cybersecurity industry with a passion to protect enterprise organizations. He has spent his career establishing security programs for companies of all types and sizes, from 500 to 50,000. Ben has held just about every technical security role, from AV, firewall, SIEM, and DLP management, security architect, and CISO roles.

Prior to joining Zscaler, Ben was the VP/Head of Cybersecurity (CISO) for Coats, a global manufacturer of industrial thread. This was a newly created role which allowed Ben to build a program: from by policies, creating and refining processes, to choosing technology controls. Ben is passionate about engaging with both security practitioners and business leaders on the value of digital transformation and preparing businesses to defend against threats. Much of his time is spent focusing teams on the fundamental practices or basics and doing them well before pivoting to more advanced solutions.

Join the CyberSecuritySummit.org Conversation on LinkedIn #css12 #css

www.cybersecuritysummit.org

Dec 15, 202207:59
Cyber Security Summit > 12/08/22 > AT SUMMIT Podcast Conversation with Jerrod Montoya of Truvantis > Podcast Host Dr. Shayla Treadwell Vice President GRC ECS > #css12

Cyber Security Summit > 12/08/22 > AT SUMMIT Podcast Conversation with Jerrod Montoya of Truvantis > Podcast Host Dr. Shayla Treadwell Vice President GRC ECS > #css12

During the 12th Annual Cyber Security Summit, we pulled aside leading Cyber Professional to share their Cyber Security Solutions and insights with us.

We thought you would want these key insights in "quick-listen" AT SUMMIT Conversation Glimpses so you can easily Join in our active Cyber Pro Community via our Podcast Channels and we invite you to Join Us our Social Community and Cyber Security Conversation on LinkedIn at https://bit.ly/LinkedInCyberSecuritySummit

Today's Glimpse is with Jerrod Montoya, Principal of Truvantis hosted by Dr. Shayla Treadwell, Vice President of Governance, Risk and Compliance; Cyber Center of Excellence, ECS.

Jerrod Montoya is a leading cybersecurity attorney in Minnesota who helps companies take strategic and decisive action to mitigate legal risk regarding all aspects of cybersecurity. He has over a decade of experience at the intersection of law and cybersecurity including various work on legal, cybersecurity, privacy, and compliance issues in the energy sector. Jerrod has experience as Deputy CISO and Project Manager for a premier Software as a Service (SaaS) provider in the energy industry. He is also the past-President for InfraGard Minnesota Members Alliance, a non-profit public/private partnership with the FBI focused on Critical Infrastructure protection.

Join the CyberSecuritySummit.org Conversation on LinkedIn #css12 #css

www.cybersecuritysummit.org

Dec 08, 202208:04
Cyber Security Summit > 12/1/22 > AT SUMMIT Podcast Conversation with Tissa Richards, Cybersecurity Entrepreneur + Author of No Permission Needed > Podcast Host Dr. Shayla Treadwell, VP GRC ECS

Cyber Security Summit > 12/1/22 > AT SUMMIT Podcast Conversation with Tissa Richards, Cybersecurity Entrepreneur + Author of No Permission Needed > Podcast Host Dr. Shayla Treadwell, VP GRC ECS

During the 12th Annual Cyber Security Summit, we pulled aside leading Cyber Professionals to share their Cyber Security Solutions and insights with us.

We thought you would want these key insights in "quick-listen" AT SUMMIT Conversation Glimpses so you can easily Join in our active Cyber Pro Community via our Podcast Channels and we invite you to Join Us our Social Community and Cyber Security Conversation on LinkedIn at https://bit.ly/LinkedInCyberSecuritySummit

Today's Glimpse is with Tissa Richards, Cybersecurity Entrepreneur + Author of No Permission Needed hosted by Dr. Shayla Treadwell, Vice President of Governance, Risk and Compliance; Cyber Center of Excellence, ECS.

Tissa Richards' resume is impressive and chocked full of the expertise needed to coach executive cyber professionals in their leadership development and into their next board position and more. She is a repeat Silicon Valley founder and CEO who has funded and led software companies.


Join the CyberSecuritySummit.org Conversation on LinkedIn #css12 #css
www.cybersecuritysummit.org


"AT SUMMIT" Cyber Pro Insights Podcast Episodes NOW available on Spotify, Apple and Google Podcasts > 12th Annual Cyber Security Summit 

Dec 01, 202203:45
Cyber Security Summit > WEBINAR 11/29/22 - How to navigate into a Cyber Career

Cyber Security Summit > WEBINAR 11/29/22 - How to navigate into a Cyber Career

Join this complimentary Webinar to learn from our panel of top cyber leaders on courses to take and organizations to get involved with as part of you student-to-professional career path within this high-demand field. 

Cyber security is a complex and exciting field of work, and many roles can be found within banks, retailers, e-tailers, healthcare, and government organizations. Your role in the organization may include safeguarding an organization's files and network, install firewalls, create security plans, guard customer data, and monitor activity.

Pursuing a career in cybersecurity means joining a rapidly growing industry where available jobs outnumber qualified candidates. According to the US Bureau of Labor Statistics, the number of cybersecurity jobs is expected to increase by 35 percent between 2021 and 2031. And, the COVID-19 pandemic has only accelerated this demand. 

As cybersecurity continues to grow in importance, more specialized roles are emerging. Starting as an entry level analyst, for example, creates the opportunity to follow your interests within the world of information security and create a career path that’s just right for you.

This webinar is perfect for current post secondary students and recent graduates.


Cyber Security Summit - Minneapolis, MN cybersecuritysummit.org  #cybersecurity #MaryFrantz #MichaelKearn #AimeeMartin #TinaMeeker

Nov 29, 202257:49
Cyber Security Summit > 11/17/22 > AT SUMMIT Conversation with Cody Wass and Cody Chamberlain of NetSPI > #css12

Cyber Security Summit > 11/17/22 > AT SUMMIT Conversation with Cody Wass and Cody Chamberlain of NetSPI > #css12

EPISODE 3 > Today's Glimpse is with Cody Wass, Vice President of Services and Cody Chamberlain, Head of Product, of NetSPI hosted by Wendy Meadley, CEO, Next Phase Studio

The Cody's as they are "affectionately nicknamed" shed light on how technology alone cannot solve the greatest cyber security challenges. It is achieved when you effectively leverage technology to maximize the value of human creativity, experience and ingenuity.

Check out our Cyber Leader Insider Glimpses from #CSS12

12th Annual Cyber Security Summit > Summit Podcast on Spotify, Apple Podcasts and Google Podcasts > Subscribe to Stay in Touch with our Weekly Podcasts.

Since there is so much great insight in these glimpses, we are releasing a new Cyber Security Summit "AT SUMMIT" Podcast Episode every week!

And, Join our LinkedIn Cyber Pro Community @cybersecuritysummit 

www.cybersecuritysummit.org

#cybersecurity

#cybersummit

#podcast

Nov 17, 202212:01
Cyber Security Summit > 11/10/22 > AT SUMMIT Podcast Conversation with Shawn Riley Chief Information Officer, State of North Dakota > Podcast Host Dr. Shayla Treadwell Vice President GRC ECS > #css12

Cyber Security Summit > 11/10/22 > AT SUMMIT Podcast Conversation with Shawn Riley Chief Information Officer, State of North Dakota > Podcast Host Dr. Shayla Treadwell Vice President GRC ECS > #css12

During the 12th Annual Cyber Security Summit, we pulled aside leading Cyber Professional to share their Cyber Security Solutions and insights with us.

We thought you would want these key insights in "quick-listen" AT SUMMIT Conversation Glimpses so you can easily Join in our active Cyber Pro Community via our Podcast Channels and we invite you to Join Us our Social Community and Cyber Security Conversation on LinkedIn at https://bit.ly/LinkedInCyberSecuritySummit

Today's Glimpse is with Shawn Riley, Chief Information Officer of the State of North Dakota hosted by Dr. Shayla Treadwell, Vice President of Governance, Risk and Compliance; Cyber Center of Excellence, ECS.

Self-professed "IT Guy" Shawn shares how the State of North Dakota is reimagining and redefining how and what to teach today's youth so they are technologically-savvy. A necessary approach for future success for the youth of  today.

Join the CyberSecuritySummit.org Conversation on LinkedIn #css12 #css

www.cybersecuritysummit.org


Nov 10, 202214:55
Cyber Security Summit > 11/3/22 > AT SUMMIT Podcast Conversation with Brian Kenyon Chief Strategy Officer Island > Podcast Host Dr. Shayla Treadwell Vice President GRC ECS > #css12

Cyber Security Summit > 11/3/22 > AT SUMMIT Podcast Conversation with Brian Kenyon Chief Strategy Officer Island > Podcast Host Dr. Shayla Treadwell Vice President GRC ECS > #css12

During the 12th Annual Cyber Security Summit, we pulled aside leading Cyber Professional to share their Cyber Security Solutions and insights with us.

We thought you would want these key insights in quick-listen AT SUMMIT Conversation Glimpses so you can easily Join in our active Cyber Pro Community via our Podcast Channels and we invite you to Join Us our Social Community and Cyber Security Conversation on LinkedIn at https://bit.ly/LinkedInCyberSecuritySummit 

Today's Glimpse is with Brian Kenyon, Chief Strategy Officer of Island hosted by Dr. Shayla Treadwell, Vice President of Governance, Risk and Compliance; Cyber Center of Excellence, ECS.

Today's Topic is the role of the Enterprise Browser and how it specifically is addressed in the Healthcare and Medical Device Industries.

Join the CyberSecuritySummit.org Conversation on LinkedIn #css12 #css

www.cybersecuritysummit.org



Nov 03, 202204:58
Cyber Security Summit > WEBINAR 8.30.22 > Creating a Strategic Penetration Testing "Pen Testing" Program featuring Sam Horvath, Technical Client Director, NetSPI > Mary Frantz, CISO. EKPartners Host

Cyber Security Summit > WEBINAR 8.30.22 > Creating a Strategic Penetration Testing "Pen Testing" Program featuring Sam Horvath, Technical Client Director, NetSPI > Mary Frantz, CISO. EKPartners Host

Creating a Strategic Penetration Testing Program

Traditional check-the-box penetration testing is a thing of the past. Modern penetration testing must be strategic and human delivered. 

So, how can you make this shift? 

In this session, Sam Horvath, Technical Client Director at NetSPI, the Minneapolis-based leader in offensive security, will explore the two core pillars of a successful pen testing program, share real examples of pen testing program transformations, and detail the steps your organization can take to get there.

Webinar Guest
SAM HORVATH
Technical Client Director
NetSPI

Sam Horvath fills the role of trusted adviser at NetSPI for many of our enterprise accounts to ensure client success, while also working in a strategic advisory capacity on specific engagements. Previously, Sam worked as a senior consultant specializing in web applications and social engineering. He also has experience providing technical leadership and penetration testing program guidance for large financial institutions and global cloud providers. Sam earned his B.A. in computer science from Augsburg University and began his career at NetSPI in 2018 through the NetSPI University program.


Webinar Host
MARY FRANTZ
CISO, EKPartners

Mary Frantz is the CEO of Enterprise Knowledge Partners, LLC (EKP). She has performed and led advanced ethical hacking (red teams), security assessments, managed multiple incident investigations for companies. She was the primary technical cyber expert in the Equifax, Yahoo and many other high profile breaches and security incidents. Mary holds 4 bachelor degrees and two masters degrees and various active and non-active certifications in systems auditing, ethical hacking, penetration testing, forensics, engineering and architecture. She is a national advocate and mentor of women and minorities in STEM, a Board Officer for the Minnesota Academy of Science, board advisor for the Minneapolis Cyber Summit, and an elected School Board Director for MN District 719.

Special Thanks:
NetSPI > 12th Annual Cyber Security Summit Sponsor 

Sep 07, 202255:37
Cyber Security Summit Webinar_220726 - The Security Equals Compliance Disconnect

Cyber Security Summit Webinar_220726 - The Security Equals Compliance Disconnect

The Security Equals Compliance Disconnect

Security will never be perfect; there will always be a residual risk that must be managed and controlled. Compliance does equal security, at least as best as your preferred standard or framework defines it.

Keep hiding behind “compliance does not equal security,” and you will forever be living off of your “luck” until it runs out – usually sooner rather than later.

Use the tools at your disposal correctly, stay current on threats, monitor your security posture, and live a long, prosperous, secure life.


Speaker: 
JEFF HALL
Principal Security Consultant
Truvantis

Jeff has over thirty years of experience in information technology, information security and IT governance. He started his career as an IBM systems programmer writing and supporting operating systems, moved into application development, enterprise project management, CIO roles, CISO roles and then started a multinational consulting firm’s information security and PCI practices.

Jeff’s expertise ranges from operating systems to networking, enterprise application suites, information security and the cloud. He has been involved in a variety of projects to develop and implement innovative applications and services for small and midsized businesses to the Fortune 100. He has worked with manufacturing, distribution, financial institution, insurance, health care, and government organizations.


Moderator:
SEAN COSTIGAN
Professor, George C. Marshall European Center for Security Studies

Sean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security.

His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.

Special Thanks:
A special thanks goes out to
Truvantis who helped conceive this important conversation.

Aug 02, 202258:06
Cyber Security Summit Webinar May 2022 - What if the browser was designed for the enterprise?

Cyber Security Summit Webinar May 2022 - What if the browser was designed for the enterprise?

What if the browser was designed for the enterprise?

The application enterprises use the most is the browser. In fact, it has become our primary work environment, but the browser is not an enterprise application. So we have surrounded it with an endless, complex and expensive stack that overwhelms your security teams and interrupts end users. But what if the browser was designed for the enterprise? What could that do for security, productivity and work itself?

Discover how an enterprise browser can:
• Protect critical SaaS and web applications
• Streamline and secure third-party contractor access and BYOD strategies
• Free you from the cost and poor user experience of VDI and DaaS solutions
• Give you the last mile control you have been seeking
• Deliver it in a familiar, Chromium-based application that is simple for users to access and operate


Speaker: 
BRIAN KENYON
Chief Strategy Officer of Island.io

Brian Kenyon drives corporate strategy at Island as its Chief Strategy Officer and one of the company’s founding members. Brian has also held the role of CSO at Symantec and Blue Coat Systems. He built his early career in technical roles for more than a decade at McAfee where he was Chief Technical Strategist, as well as CTO, and served as chief architect at start-up Foundstone.

Brian is the author of Security Battleground: An Executive Field Manual; Security Sage: Guide to Hardening the Network Infrastructure; and Special Ops: Host and Network Security. He holds a B.A. degree in Finance from Loyola Marymount University.


Moderator:
SEAN COSTIGAN
Professor, George C. Marshall European Center for Security Studies

Sean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security. His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.

May 31, 202247:15
Cyber Security Summit Webinar Feb 2022 - Back to the Basics

Cyber Security Summit Webinar Feb 2022 - Back to the Basics

In 2022 we are still seeing compromises as a result of not fully implementing basic security hygiene in organizations and not enforcing and enterprising logging and monitoring. This includes oversight of third parties and third party/open source APIs and software. We know that threat actors are becoming more creative in their attack vectors and methods, ensuring the basic / industry standard practices are implemented and knowing the key areas to monitor for cyber resilience and early warning signs of threat actor reconnaissance and compromise.  

Speakers:  

MARY FRANTZ  Managing Partner and Founder, Enterprise Knowledge Partners, LLC  
CHRIS BRINKWORTH Director, Forensics and eDiscovery, Enterprise Knowledge Partners, LLC   

Moderator: 

SEAN COSTIGAN Professor, George C. Marshall European Center for Security Studies

Feb 28, 202258:52
Cyber Security Summit Webinar November 2021 - HYBRID WORK – SECURITY IS THE NEXT DISRUPTION

Cyber Security Summit Webinar November 2021 - HYBRID WORK – SECURITY IS THE NEXT DISRUPTION

The hybrid workforce is no longer a concept, it is a reality. But as employees embrace new working environments, this hybrid approach poses a unique challenge for security leaders. During this discussion, we explore how organizations will need to create a security strategy rooted in the variability of the hybrid workforce — one that meets employees where they are and helps them learn the role they play in securing this new model. 

Speaker:  GARY SORRENTINO  Global Deputy CIO, Zoom Video Communications, Zoom  Gary Sorrentino currently serves as Global Deputy CIO for Zoom Video Communications. A former Managing Director for J.P. Morgan Asset & Wealth Management, Gary was the Global Head of Client Cyber Awareness and Education.  For over 12 years, Gary was the Chief Technology Officer for J.P. Morgan AWM’s global technology infrastructure initiatives, where he managed its Data Privacy program and was responsible for Infrastructure, Application and End User Technology Production Support. In 2014, he assumed a new role as the lead for their Cybersecurity efforts and developed a firm wide “Protect the Client” Cyber program designed to raise cybersecurity awareness among employees and clients.  With almost 40 years of experience in Information Technology, Gary has served in various other IT leadership positions in firms across the financial services industry. Prior to joining J.P. Morgan in 2005, Gary was Head of Global Infrastructure and Head of Technology Efficiencies at Citi Private Bank, where he was responsible for Global Infrastructure Support and strategic technology initiatives. Other roles he has held include Global Technology CFO at Credit Suisse and North America IT Controller at UBS.   

Moderator: SEAN COSTIGAN Professor, George C. Marshall European Center for Security Studies  Sean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security. His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.   

Special Thanks: A special thanks goes out to Zoom who helped conceive this important conversation.

Jan 03, 202256:15
Cyber Security Summit Webinar Sept 2021 - The Significance of AI & Ml in Cybersecurity.mp4

Cyber Security Summit Webinar Sept 2021 - The Significance of AI & Ml in Cybersecurity.mp4

Artificial intelligence (AI) has become a security industry buzzword so broadly applied as to become almost meaningless. When every product boasts AI capabilities, security decision makers may quickly become cynical, even in the face of the most exciting innovation shaping cybersecurity today. 

--What is the benefit of a cybersecurity solution powered by Artificial Intelligence and Machine Learning?

--Why does the number of generations of AI matter?

--How smart is the AI machine?

--How does AI provide a predictive advantage to prevent breaches for my organization?

--How can a ‘Prevention First’ cybersecurity approach help my business?


Speaker: TOM CAMERON
Solutions Architect, BlackBerry powered by Cylance AI

Tom Cameron spent 15 years in the Intelligence Community as a U.S. Navy Cryptologic Technician and DoD contractor with Northrop Grumman. He was deployed worldwide supporting cryptologic missions during Operations Enduring Freedom/Iraqi Freedom, East Africa, and European theaters. He and his wife, Loretta, met while stationed together in Pearl Harbor, Hawaii, and have two sons both born in Puerto Rico. Tom is from St. Paul, Minnesota, and is a member of InfraGard and ISSA. Tom started his SE career with Symantec, was Mandiant SE of the Year in 2014, and is currently an SE for Blackberry by way of the Cylance acquisition.


Moderator: SEAN COSTIGAN
Professor, George C. Marshall European Center for Security Studies

Sean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security. His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.

Oct 13, 202101:01:15
Cyber Security Summit Webinar August 2021 - Ransomware Unplugged: What does the most recent cyber plague mean?

Cyber Security Summit Webinar August 2021 - Ransomware Unplugged: What does the most recent cyber plague mean?

Sam Curry explores the reasons behind the sharp rise in ransomware attacks and the difficult questions brought on by this threat. Should an organization ever pay the ransom? What damage is risked from an attack, not only to revenue but to brand, morale, and insurance premiums? And most importantly, what can an organization do to recover from such an attack, or make sure it doesn’t happen in the first place?   

Speaker:  
SAM CURRY  
Chief Security Officer, Cybereason  

Sam Curry is CSO at Cybereason. Curry was also CTO and CISO for Arbor Networks (NetScout) and was CSO and SVP R&D at Microstrategy in addition to senior security roles at McAfee and CA. He spent seven years at RSA variously as CSO, CTO and SVP of Product and as Head of RSA Labs. Curry also has over 25 patents in security from his time as a Security Architect, has been a leader in two successful startups and is a board member of the Cybersecurity Coalition, of SSH Communications and of Sequitur Labs (in the IoT security space) in addition to a number of advisorships across the security spectrum. Curry is also a Visiting Fellow at the National Security Institute.   


Moderator:
SEAN COSTIGAN
Professor, George C. Marshall European Center for Security Studies  

Sean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security. His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.  


A special thanks goes out to Cybereason who helped conceive of this important conversation. Visit Cybereason to learn about its end-to-end cybersecurity solution built to empower defenders.

Sep 01, 202157:41
Cyber Security Summit Webinar July 2021 - RaaS and the Rise of the Ransomware Extortion Ecosystem

Cyber Security Summit Webinar July 2021 - RaaS and the Rise of the Ransomware Extortion Ecosystem

Ransomware as a service (RaaS) has made extortion more critical than ever. If ransomware actors can’t extort ransom payment from victims in “traditional” means, they have to focus on new ways of blackmailing. This doesn’t just mean stealing files and posting them on an extortion site — instead, ransomware actors have created a whole new extortion ecosystem. While the success of RaaS mimics the success of ransomware, a lot of the success of the RaaS model has to do with extortion. The reality is, the creation of the extortion ecosystem has created a symbiotic relationship between RaaS operators, the dark web forums they advertise on, security press, and security researchers.

In this session, Dmitry Smilyanets, expert threat intelligence analyst, and Allan Liska, expert ransomware researcher from the intelligence company Recorded Future share insight into how the growth of RaaS offerings has helped accelerate ransomware attacks, and what it means for your organization.

Topics covered include:

  • Different RaaS offerings and the tactics, techniques, and procedures (TTPs) employed
  • Current extortion schemes to look out for
  • Why every ransomware attack is a third-party attack
  • RaaS risk reduction best practices

Speaker: 
ALLAN LISKA
Sr. Solutions Architect, Recorded Future

Allan Liska is an intelligence analyst and solutions architect at Recorded Future. Allan has more than 15 years’ experience in information security and has worked as both a blue teamer and a red teamer for the intelligence community and the private sector and is one of the organizers of BSides Bordeaux. Allan has helped countless organizations improve their security posture using more effective and integrated intelligence. He is the author of The Practice of Network Security, Building an Intelligence-Led Security Program, and Securing NTP: A Quickstart Guide and the co-author of DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion.

Speaker: 
DMITRY SMILYANETS
Expert Threat Intelligence Analyst, Recorded Future

Mission-driven Russian-speaking Cyber Threat Intelligence Analyst with type A personality. Twenty years of experience and expertise in cybercrime activity that includes being a former member of an elite Russian-based hacking organization.

Moderator:
SEAN COSTIGAN
Professor, George C. Marshall European Center for Security Studies
Bio

A special thanks goes out to Recorded Future who helped conceive of this important conversation. Visit Recorded Future to learn how by combining persistent and pervasive automated data collection and analytics with human analysis, Recorded Future delivers intelligence that is timely, accurate, and actionable.

Jul 27, 202159:22
Cyber Security Summit Webinar June 2021 - What is a SIEM And Why Do You Need One

Cyber Security Summit Webinar June 2021 - What is a SIEM And Why Do You Need One

Achieving a baseline configuration that detects attacker activity is one of the most effective defenses against cyber-attacks and data breaches. In fact, according to industry reports in healthcare and payment cards, ineffective logging, monitoring and the inability to correlate event logs to tell a story within and across platforms is the primary reason such attacks are successful.    

As a result, statutory and regulatory compliance have strengthened the need for logging, monitoring and retention of event logs. However, many organizations are complying with only minimum requirements, have not implemented their systems effectively, and do not appreciate the enterprise value of systems designed to collect and correlate event logs.  

During this hour-long discussion, Mary Frantz – primary technical cyber expert in the Equifax, Yahoo and many other high-profile breaches – provides a product-agnostic look at the capabilities of enterprise SIEMs, what to look for, how to implement and use them effectively, and how they can benefit the entire organization – not just security.  

Speaker:  MARY FRANTZ  
Chief Information Security Officer, Prescryptive Health, Inc; Founder, Enterprise Knowledge Partners, LLC  

Moderator: SEAN COSTIGAN Professor, George C. Marshall European Center for Security Studies

Jul 08, 202101:02:17
Cyber Security Summit Webinar May 2021: The Confluence of Insider Threat and Cybersecurity

Cyber Security Summit Webinar May 2021: The Confluence of Insider Threat and Cybersecurity

Cyber threats arise from numerous sources, including state actors, terrorist groups, criminals, hackers, business competitors, and even trusted insiders. In fact, it’s the threat from trusted insiders that may pose the most significant threats. Whether as a malicious act —the deliberate exfiltration of information or introduction of malware or other harmful code —or inadvertent actions by careless employees, the greatest threat to an organization’s information system is often on the inside.

On May 25, NCSC Insider Threat Directorate (ITD) will participate in a CyberWeek webinar to discuss the role of insider threat mitigation in cybersecurity. During this hour-long event, we’ll discuss the current risk environment, including heightened vulnerabilities created by the Global Pandemic; identify potential threats posed by trusted insiders and the adversaries who seek to co-opt or exploit them; and share best practices and resources available to mitigate the risk.

Speaker:
REBECCA MORGAN
Deputy Assistant Director, Insider Threat; Deputy Director, National Insider Threat Task Force; National Intelligence and Security Center

Ms. Rebecca Morgan serves as the National Counterintelligence and Security Center (NCSC) Deputy Assistant Director for Insider Threat and as the Deputy Director of the National Insider Threat Task Force (NITTF). NITTF is an interagency task force co-chaired by the Office of the Director of National Intelligence (ODNI) and the Department of Justice.

Moderator:
SEAN COSTIGAN
Professor, George C. Marshall European Center for Security Studies

Sean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security. His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.


A special thanks goes out to the National Counterintelligence and Security Center (NCSC) who helped conceive this important conversation. Visit NCSC to learn how it is leading the effort to protect our nation against intelligence and security threats.

May 26, 202159:16
Cyber Security Summit Webinar April 2021: Supply Chain Strategies – A Call to ACTION

Cyber Security Summit Webinar April 2021: Supply Chain Strategies – A Call to ACTION

Once considered an esoteric domain of cybersecurity, Covid-19 has brought supply chain security to the dinner table conversation. The shortages revealed during the pandemic make it clear: Action must be taken to protect and safeguard us.

As “National Supply Chain Integrity Month” continues, join us on April 27 as Joyce Corell of the National Counterintelligence and Security Center delineates the threat landscape and discusses provoking implications for future supply chain integrity with Sean Costigan of the George C. Marshall European Center for Security Studies. The conversation will cover the current policy landscape, which includes actions from all branches of government, as well as how thinking on risk has evolved over the past several years. Joyce will touch on the notion of shared risk and how to think through responsibilities for government, the private sector and the consumer. This hour-long discussion will help tee up a national conversation on supply chain security as NCSC, DoD, DHS and the Cyber Security Summit raise awareness throughout the year.

Speaker:
JOYCE CORELL
Assistant Director, Supply Chain and Cyber Directorate, National Counterintelligence and Security Center, Office of the Director of National Intelligence

Joyce E. Corell is the Assistant Director of the Supply Chain and Cyber Directorate of the National Counterintelligence and Security Center (NCSC). Prior to this posting, she was the Assistant Director for the Strategic Capabilities Directorate in the Office of the National Counterintelligence Executive (ONCIX.)

Corell served at the National Security Agency (NSA) for 23 years. Her last assignment was as the Chief of Technology Policy in the NSA Commercial Solutions Center. She spent a significant portion of her career focused on various aspects of defensive and offensive computer network operations, from capability development of national policy and legislations. Complementing these roles, Corell also led various activities surrounding partnerships with the private sector ranging from technology transfer, export control licensing, and the development of strategical alliances, both domestic and international.

Corell graduated from William & Mary with a B.A. in Political Science. She received an M.S. in National Security Strategy from the National War College.

Moderator:
SEAN COSTIGAN
Professor, George C. Marshall European Center for Security Studies

Sean S. Costigan is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security. His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats. In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education efforts; Publisher of Defense Press; Adviser at Multivariate, and an Associate at the consultancies of Vision Foresight Strategy and i-Intelligence.

Rapporteur:
LINDSEY KONERZA
IT Business Systems Analyst, ASR-IT and Student, University of Minnesota Technological Leadership Institute – Master of Science in Security Technologies (MSST) program.

May 05, 202159:01
Cyber Security Summit Webinar March 2021: Anatomy of Solarwinds and Implications for Supply Chain Security

Cyber Security Summit Webinar March 2021: Anatomy of Solarwinds and Implications for Supply Chain Security

On the eve of “Supply Chain Security Month” as designated by DHS, the Cyber Security Summit examines the catastrophic attack that occurred last December on SolarWinds, a major U.S.-based provider of cybersecurity tools. The devastating impact rippled across thousands of organizations and gave our industry a moment of pause.

In this one-hour webinar, our expert panelists revisit the attack and discuss how supply chain risk management needs to evolve to counter threats moving forward.


Panel:

CHRIS HALLENBECK is CISO for the Americas at Tanium. Chris provides security leadership and operational insight gained from over 20 years in both public and private sector.  His focus is on helping Tanium customers ensure that the technology powering their business can adapt to disruption.

SEAN S. COSTIGAN is the Director of ITL Security and a Professor at the George C. Marshall European Center for Security Studies. He is an expert in emerging security challenges and a sought-after speaker on matters of technology and national security.  His current focus is on the nexus of cybersecurity capacity building and new challenges. He is the lead for NATO’s cybersecurity curriculum and is widely published on national security matters relating to information security and hybrid threats.

MARK RITCHIE is President of Global Minnesota and as the Civilian Aide to the Secretary of the Army and is Minnesota’s former Secretary of State Over the past decade Mark led the public-private partnership working to bring the 2027 World Expo to Minnesota. Mark’s public service has included serving on the State Board of Investment, Minnesota’s Executive Council, the federal Election Assistance Commission Advisory Board and on the Board of the Minnesota Historical Society.


For additional insight into the topic, we encourage you to read Sean Costigan’s think piece for Diplomatic Courier published earlier this year.

A special thanks goes out to Tanium who helped conceive this important conversation. Visit Tanium to learn how it’s giving the world’s largest enterprises and government organizations the unique power to secure, control, and manage millions of endpoints across the enterprise within seconds.

Apr 12, 202101:01:14
Cyber Security Summit Webinar November 2020: Cyber Norms in a Changing World

Cyber Security Summit Webinar November 2020: Cyber Norms in a Changing World

Governmental experts have offered the world 11 norms to achieve international cybersecurity. Are these recommendations indeed likely to resolve cyber conflict? Are states following their own advice? What will change in international cybersecurity when the experts’ recommendations are put into practice?

Speaker:
DR. ENEKEN TIKK
Executive Producer at the Cyber Policy Institute

Jan 12, 202101:00:52
Cyber Security Summit Webinar September 2020: Cybersecurity Successes and Failures - How Public Institutions Can Do Better

Cyber Security Summit Webinar September 2020: Cybersecurity Successes and Failures - How Public Institutions Can Do Better

During this this 1-hour webinar, Major General Mari K. Eder (U.S. Army Ret.) will speak on the issue of personal privacy versus need to know – how public institutions can regulate, encourage, and demand more transparency and accountability in data collection and what individuals can do to protect personal their personal privacy and manage their data and how it is accessed, shared or sold.

Speaker:
MAJOR GENERAL MARI K. EDER
(USA Ret.)

Jan 12, 202157:22
Cyber Security Summit Webinar August 2020: The Nexus of Cybersecurity and Disinformation

Cyber Security Summit Webinar August 2020: The Nexus of Cybersecurity and Disinformation

Disinformation techniques are rapidly evolving in quality and quantity, while the governmental and private sectors are admiring the problem. The fast-paced progress from non-digital means of spreading disinformation, that were adopted for the digital age, caught our societies completely unprepared. Add the social media platforms, irresponsible usage, business interests and the lack of understanding and capacities on the governmental levels and you have a perfect storm.

From Soviet concepts of active measures to the digital age and microtargeting, this webinar will address the nexus of cybersecurity and disinformation.

Speaker:
DANIEL BAGGE
Cyber Attaché of the Czech Republic to the U.S. and Canada, National Cyber and Information Security Agency

Moderator:
SEAN COSTIGAN
Director and Co-Founder
ITL Security

Jan 12, 202158:24
Cyber Security Summit Webinar July 2020: The New Data Privacy Norm

Cyber Security Summit Webinar July 2020: The New Data Privacy Norm

Finding the right balance between privacy and public health interests is critical and will directly contribute to the long-term shaping of a successful digital society. In this hour-long session, Christel Cao-Delebarre (Global Privacy Officer, CWT) explores the privacy issues raised by the accelerated use of full-scale digital solutions involving large volumes of personal data processing in our global fight against COVID-19.

Speaker:
CHRISTEL CAO-DELEBARRE
Global Privacy Officer
CWT, London Office

Moderator:
SEAN COSTIGAN
Director and Co-Founder
ITL Security

Jan 12, 202101:00:58