CSHub Wraps Up Its First ‘Digital Summit’ Featuring Global ExpertsAdd bookmark
Last week, cyber security professionals explained the ins and outs of the industry – from pressing needs and pain points, to trending content and emerging threat vectors.
The inaugural Cyber Security Digital Summit was held from May 8 – 10, and featured seasoned cyber professionals eager to communicate with folks charged with IT administration. It also boasted over 690 registrants.
The speaker lineup included Phil Lea (Group CISO, Computacenter), Nazmul Islam (Chief Information Officer, UAB Department of Medicine), Rebecca Wynn (Senior Director, Head of Information Security
Matrix Medical Network), Patrice Brusko (Senior Vice President, US Chief Privacy Officer, TD), Orrie Dinstein (Global Chief Privacy Officer, Marsh & McLennan Companies, Inc.), Giacomo Collini (Director of Information Security, King.com), Erich Kron (Security Awareness Advocate, KnowBe4), Alexandra Shulman-Peleg (Senior Vice President, Citi), Stacy Stevens (Unit Chief, Mission Critical Engagement Unit, Federal Bureau of Investigation (FBI)) and Glenda Lopez (Director of Global Risk & Compliance, Henry M. Jackson Foundation).
On Monday, Computacenter’s Lea led a session dedicated to incident response. Fields included decision-making in a reactive scenario, building a plan, including third parties in said plan, and running tests to measure effectiveness.
Later that day, Matrix Medical Network’s Wynn discussed “new world cyber security” in an age of the Internet of Things (IoT). Wynn stressed that security professionals must find ways of ensuring the use of emerging solutions on the devices, which fall within the boundaries of regulatory best practices and privacy protection.
On Wednesday, Shulman-Peleg discussed ways to scale DevSecOps to enterprises. The session addressed the main design considerations that should be taken into account to meet the requirements of segregated and controlled environments.
Another highlight included a Thursday panel on compliance – as GDPR sits right on the horizon and is breathing down the necks of security professionals worldwide. Marsh & McLennan Companies’ Dinstein, along with Wynn and UAB Department of Medicine’s Islam, discussed must-do tasks for minimum compliance.
Why Are These Summits Crucial?
Throughout the enterprise, it’s now clear that security education, awareness and brainstorming have reached a sort of zenith. Organizations are constantly under attack, meaning security practitioners are forced to learn from peers and grasp the larger industry movements. That, coupled with regular but mindful media consumption, informs today’s practitioners. But it may still prove difficult to gain a full scope of how to implement processes and policies. That’s where the Digital Summit came in handy.
The informative, three-day event helped cyber security heads begin to comb through the media maelstrom and manage new and emerging threats, obligations and opportunities.
In the Summit’s strategic and informative sessions and panels, cyber experts provided their two cents, detailed their own security journeys and helped vocalize useful points for orchestrating a resiliency blueprint.
In Short – Plus Perks!
The Digital Summit featured the aforementioned presentations from global professionals, and allowed attendees to remain affixed to the content – but in the comfort of their own offices or homes.
This May event featured free dial-in for delegates, meaning exposure to the larger security teams was perfectly attainable. Another perk: Cutting down on travel time and expenses!
Afterward, slides and podcasts became downloadable, allowing for repeat access and the ability to share with colleagues. (Click here to register for On Demand sessions.)
Throughout the accessible summit, attendees were able to ask presenters questions in real time, thus facilitating dialogue and providing direct feedback to urgent questions.
What’s more, because the nature of the event, attendees were able to juggle work demands with the conference sessions, and select criteria that were relevant to them!
Be Sure To Check Out: 'Verify Everything': Cyber Pro Outlines 'Zero Trust' Model