Paola Saibene has dedicated 25 years to IT, having been a Chief Information Officer, Chief Technology Officer, Chief Strategy Officer, VP of Enterprise Risk Management, and former Global Privacy Officer.
Did you ever think that as a cybersecurity or risk professional you would need to start educating yourself on transhumanism or cyborgs? The new frontier is the Internet of Bodies, and risk, security, and privacy professionals should take note. In this session we will explore what it takes to mitigate the traditional risk of IoT, in a new domain – the human body.
Abu Sadeq is currently the Founder and CEO at Zartech where his mission is to empower organizations to obtain greater cybersecurity maturity.
Successful, experienced, and award-winning Chief Information Security Officers and Risk Officers share their ‘tips of the trade’ with those who want to accelerate their paths in these fields. The combination of technical sophistication, fervent determination, and strong business acumen of this remarkable group, is what makes them excel consistently and against all odds. This is a ‘must-read’ for cyber and risk professionals that fulfill a daily crucial, global mission, and compete in one of the most intense careers in the world.
With 20+ years in information security, Allan Alford has served as CISO five times in three industries.
Christian Espinosa is the Founder and CEO of Alpine Security, a cybersecurity engineer, certified high-performance coach, professor, and lover of heavy metal music and spicy food.
Cyberattack—an ominous word that strikes fear in the hearts of nearly everyone, especially business owners, CEOs, and executives. With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company?
Leah McLean is Head of Business Development and Cybersecurity Programs at Cyber Future Foundation, a non-profit and think tank of doers.
The news headlines that tout “Cybersecurity Talent Shortage,” is a fallacy. There is plenty of talent in the industry – especially in the younger generation – and in those who are transitioning careers to get into cybersecurity.
Yet, these talented individuals are struggling to enter into our industry. We need to break this barrier and solve the problems – it shouldn’t be this difficult. The bad actors aren’t doing less, the attacks aren’t stopping. The number of jobs posted is rising.
George Finney is a Chief Information Security Officer that believes that people are the key to solving our cybersecurity challenges.
Who you believe yourself to be dictates almost everything you will do in your life. Many people identify with the personas identified in tests like Myers-Briggs, but there hasn’t been a cybersecurity personality test…until now!
George Finney has developed a cybersecurity personality assessment based on his award-winning book Well Aware and his research around the nine cybersecurity habits that can help anyone find their cyber identity.
This session will help attendees understand the nine habits, how the habits work together to form the different cybersecurity personas, and how attendees can use the test to help themselves and their users align their identities with their careers.
Jessica Nemmers is the Chief Security Officer of Elevate Credit, headquartered in Ft. Worth, Texas.
Securing critical infrastructure has been forced into the headlines with the ransomware attack on Colonial Pipeline. This discussion is long overdue and companies must face the fact they have to invest in their security program before it is too late.
Currently serving as the Director of Information Security & IT at Rehrig Pacific Company.
The dramatic and sudden shift to remote learning and leveraging video conferencing as a replacement for all manner of social activities has erased the idea of managing screen time for kids or slowly managing the entrance of our kids into the complex world of connected devices. At Rehrig, we began a conversation about how to help our employees, including those with very little comfort in technology, to evaluate and work through these challenges at home–believing that improving that awareness not only improved home life, but also would materially, if incidentally, improve the overall security of the enterprise. We have barely scratched the surface, though, and it would be significantly beneficial to hear what other leaders are doing to address this–whether in their own homes or facilitating discussion for the home lives of their respective employees.