Day 3, August 23, 2019
8:15 am - 8:55 am Networking Breakfast
8:55 am - 9:00 am Chairperson's Opening Remarks
9:00 am - 9:10 am Thoughtexchange Market Question
What are some things organizations must do more of to
transform and remain competitive?
9:10 am - 9:55 am Deep Dive into Navigating Budgets and Reducing RiskHolly Greaves - Chief Financial Officer, U.S. Environmental Protection Agency
Spending on cybersecurity technologies involves engaging the board of directors and the rest of the C-Suite in settings where there are competing organizational priorities.
In this session, explore:
•How to present the right metrics in a compelling manner to increase budgets and lessen the potential impact of a breach
•Shaping the discussion and budget to build a program with stakeholder priorities
•Focusing on protecting people and processes while mitigating risk
•Translating how a cyber attack could impact healthcare setting
•Exploring risk tolerance and increasing funding to lessen impact
Holly GreavesChief Financial Officer
U.S. Environmental Protection Agency
9:55 am - 10:25 am Business Meetings
10:25 am - 10:55 am Business Meetings
10:55 am - 11:25 am The Holistic Integrative Medicine (H.I.M) Approach to CyberJothi Dugar - Chief Information Security Officer, NIH Clinical Center
Change is inevitable, and one is desperately needed in the complex world of Cyber and the CISO’s role in an organization. By exploring a “whole-istic” Integrative Medicine approach to Cyber, organizations can benefit from looking at Cyber with a new change in perspective vs the same old techniques. A Whole360 approach to Cyber entails diving into the “mind-body-energy” connections as they pertain to the business and Cyber worlds. The Science of Diversity, Implicit Bias, Women in Cyber, and the Psychology behind the Security all fit together as pieces of the puzzle that need to be brought to light and explored.
In this session examine:
•Exploring the Science of Diversity & Implicit Bias in Cyber
•The art of women in the Cyber Workforce
•Exploring how Pieces of the puzzle all fit together (Diversity, Women, Psychology, Cybersecurity, Healthcare)
Jothi DugarChief Information Security Officer
NIH Clinical Center
11:25 am - 12:00 pm Evolving Threat Trends: Cryptojacking, Botnets, What’s Next?
Staying ahead of the latest cyber threats and attack vectors is critical. Cyber criminals continue to successfully penetrate and exploit corporate networks looking for unpatched vulnerabilities and new entry points. Proactive hunting and mitigating of potential security incident is necessary since current cyber threats are often missed by traditional tools. Threat hunting assumes a breach with the focus on quickly detecting and responding with clear visibility of the network and endpoints. In this session, explore the necessary proactive stance along with the current types of threats.
In this session:
•Exploring the latest threats and trends
•Deriving threat intelligence from malware discovered during incident response
•Strengthening incident response and threat hunting skills