
Conference
Columbus
Cybersecurity Conference
In cybersecurity, information sharing is critical. One vulnerability can bring down government agencies, businesses, and critical infrastructure.
The Columbus Cybersecurity Conference is connecting the region’s top security professionals, with topics ranging from leadership best practices on delegation, setting metrics, training, and building effective teams to protect your organization from advanced threat actors. Other topics include effective incident response and strategies in cybersecurity resilience.
Join us at the Columbus Cybersecurity Conference to earn CPE credits and enjoy a networking reception with peers! Learn more about Data Connectors here!
Date
Thu. Jan 19
-
Featured Speakers
Steven H. Roesing
Keynote Presentation: Steven Roesing
Satya MoutairouProtecting Against Cyber Attacks
Dave GuntherProtecting Against Cyber Attacks
Brian DoyleProtecting Against Cyber Attacks
John SpiegelProtecting Against Cyber Attacks
Michael FieldsCyber Inter-Agency Collaboration Panel
Anthony DeCiccoCyber Inter-Agency Collaboration Panel
Mark SangsterGuest Keynote Presentation – Mark Sangster
Brian SheaCyber Executive Roundtable
Steven H. RoesingCyber Executive Roundtable
Jared PriceCyber Executive Roundtable
Rich NagleCyber Executive Roundtable
Event Schedule
Times for this Event are in Eastern Time (EDT/EST).
The Conference will be open from 8:00 AM to 6:30 PM Thursday, January 19th.
- Welcome to the Columbus Cybersecurity Conference
-
Lessons from my Private Sector Crash Course 10:00 am
The presenter spent over 20 years in the military doing both IT and cybersecurity, including running private sector partnerships for US Cyber Command the last three years. He then moved to be the CISO of a fast-moving startup. Through all of those experiences, he has gained a unique perspective on what makes the private sector great… and a few things that are not so great. This talk will unpack some of the biggest concepts around the private sector IT/security space today.
Speaker:
-
The Journey to the Security Service Edge 10:30 am
Due to the growth of “Cloud” over the past ten years, organizations have moved from the data center to “centers of data”. As applications are now distributed, the networks and security solutions have become more complex and brittle. Adding fuel to this fire of complexity, network and security solutions must now address the demands of the hybrid workforce. In this talk, John will discuss how you can use Security Service Edge in a simple way to solve some of the complex network security problems no matter how large your organization.
Speaker:
-
Refuse the Ransom: Need for a Scaleable Response Strategy 11:30 am
An adversary who attacks an organization from within can prove fatal to the business and is generally impervious to conventional defenses. Social science research has been used to explain why traditional methods fail against these trusted betrayers. Every company must identify and utilize new management techniques, increase security, and revise workplace strategies for categorizing and defeating insider threats.
There are key players in positions to either effectively support or undermine the insider threats. Leadership style can make a difference in the way an institution recognizes and identifies these threats from rethinking background investigations to recognizing deception and using lawful disruption. Join this session to learn about how organizations must circumvent these predators before they jeopardize the workplace and sabotage business operations.
Panel Participants:
-
Importance of Validating Your Security Posture 11:50 am
For years, organizations have invested millions of dollars into best-of-breed security solutions. Yet, organizations are breached daily. Modern challenges require modern solutions. Stop assuming you are secure and prove security effectiveness before attackers come after your organization.
The audience will gain understanding in:
- Proactive security models vs. reactive models
- Answers to the test is NOT cheating
- Optimizing security solutions to become ransomware resilient
- Quantify risk in your environment with binary artifacts.
Speaker:
- Lunch Break
-
Keynote Presentation: Steven Roesing 12:45 pm
Third-Party Risk: Balance Risk, Resilience and Cost to Achieve the Most Effective TPRM Program
Today Third-Party Risk Management is about the ability to balance risk, business resilience and cost. In this session we’ll learn:
- Why do we evaluate Risk from Third Parties and what is Supply Chain Resilience?
- What is the value of a good TPRM Program?
- What are the components of an Enterprise Risk Management Program?
- How can technology help us with TPRM?
- What should we look for in a TPRM platform?
Speaker:
-
Protecting Against Cyber Attacks 1:40 pm
We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.
Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.
Panel Participants:
-
Have Your Cake and Eat It Too 2:30 pm
IT constantly faces the uphill battle of trying to be secure, stay in compliance, and still provide a good working experience for their end users. This is further complicated with things like cyber security insurance needs, renewals, and demanding end users. CyberFOX empowers IT teams to satisfy both the security and compliance requirements and the needs of its end users. Check out how we can help solve your privileged management and password needs, two of the biggest areas of risk in today’s IT.
Speaker:
-
Cyber Inter-Agency Collaboration Panel 2:50 pm
Submit your bio for consideration to participate on one our Cyber Executive Panels to
[email protected] or fill out our Call for Speakers form here.
Panel Participants:
-
Guest Keynote Presentation – Mark Sangster 3:40 pm
Finding Factors not Fault: Building Cyber Resilience
Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of an organization’s security, or worse, bury the true causes of incidents and lead to repeated data breaches or operations disrupting cyber incidents. Join Mark Sangster, author of No Safe Harbor and Adlumin Chief of Strategy, as he explores a famous aviation accident to identify human biases, best practice root cause analysis, and explores how blaming single factor robs us of the opportunity to identify system causes and make the changes necessary to prevent repeat incidents.
- Explore human biases and how they skew our findings
- Examining a full range of factors and documenting impact
- Continuous improvement through impartial examination
Speaker:
-
Cyber Executive Roundtable 4:30 pm
Submit your bio for consideration to participate on one our Cyber Executive Panels to
[email protected] or fill out our Call for Speakers form here.
Panel Participants:
- Conference Closing Session 5:20 pm
- Happy Hour Networking Reception 5:30 pm
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners