SlideShare a Scribd company logo
1 of 14
Download to read offline
STEPPING INTO LEADERSHIP:
STAYING AHEAD OF TODAY’S
THREATS AND THE EVOLVING
CISO ROLE
Rich Agostino discusses
leadership, the cyber landscape
and what it takes to protect and
advance the cyber security
function for a Fortune 100
company. Agostino shares how he
helped redefine and elevate
Target’s cyber security practices,
and how he and his team try to
stay one step ahead of the bad
guys.
Rich Agostino,
CISO, Target
THE TRUE COST OF
CYBERCRIME
The cost of cybercrime across
industries is accelerating as
attacks continue to succeed.
Kelly Bissell provides insights
into the cost of cybercrime, the
value of current security
investments, and best practices
for prioritizing the cybersecurity
efforts that will truly make a
difference.
Kelly Bissell,
Managing Director,
Accenture Security
@ckellybissell
WORLD-CLASS
CYBERSECURITY OPERATIONS
Most CSOCs continue to fall
short in keeping the adversary –
even the unsophisticated
attacker – out of the enterprise.
Carson Zimmerman offers some
observations on what it takes to
do Computer Network Defense
well in the modern IT enterprise,
presenting 10 fundamental
qualities of an effective CSOC
that cut across elements of
people, process and technology.
Carson Zimmerman,
Author, Cybersecurity
Engineer
DRIVING SECURITY
OPERATIONS EFFICIENCY
THROUGH ORCHESTRATION
AND AUTOMATION
Scott Howitt and Vikram Desai
provide the results of new
research on the rising cost of
cyber crime in retail, sharing a
real-world example of how MGM
has applied orchestration and
automation to simplify
operations, eliminate manual
tasks, and increase threat
visibility and responsiveness.
Vikram Desai,
Managing Director,
Accenture Security
@vkdesai
Scott Hewitt,
CISO, MGM
International
@scotthewitt
FROM GEOPOLITICS TO THE
TWITTERSPHERE: STRATEGIES
FOR NAVIGATING RISK IN THE
SPOTLIGHT
Panelists discuss the real-world
factors that influence cyber risk,
strategies for effective
preparation and response, and
insight on navigating the
implications of brand and
reputation in today’s cyber
threat landscape.
Greg Alexander, VP,
Global Security
Advisor, Priceline
Group
Rebecca Janutis, VP,
Info Security, Kohl’s
Rocco Grillo,
Executive Managing
Director, Stroz
Friedberg
THE NEXT EVOLUTION OF
SECURITY MONITORING AND
ANALYTICS
Kostas Georgakopoulos shares
a global and in-the-trenches
perspective on the inner-
workings of managing cyber
security teams, systems and
incidents. He showcases how
open-sourced capabilities can
transform an organization and
innovative security capabilities,
while bringing flexibility and
cost savings.
Kostas
Georgakopoulos,
CISO, P&G
HOW LEADING SECURITY AND
FRAUD TEAMS FIGHT
ACCOUNT TAKEOVER
To combat attacks and protect
customers against large-scale
ATO using stolen passwords,
retail security, network, and
fraud teams have begun
collaborating more than ever
before. Shuman
Ghosemajumder shares leading
practices and new ideas in
business and technology
across the retail industry to
protect users against ATO.
Shuman
Ghosemajumper,
CTO, Shape Security
THE IMPORTANCE OF WOMEN
IN CYBERSECURITY
Women represent a mere 11% of
the world’s information security
workforce. Leading women in
strategic roles within their
cybersecurity organizations
deliberate the importance of
women in this industry, sharing their
journey into the field, ways to
eliminate barriers for aspiring
female leaders and how to help
shift this trend for the future.
Deborah Dixon, SVP,
Global CISO, Best
Buy
Roseann Larson,
VP & CISO, VF
Corp.
Lauren Dana
Rosenblatt, Exec.
Director, Global
Head, Cyber Threat
Mgmt
Suzie Squier,
Executive Director,
R-CISC
BIG THREATS, SMALL SHOP:
TRACKING MAJOR
CAMPAIGNS WITH LIMITED
RESOURCES
With limited resources, no
purchased tools and no
vendors, Jason Lay shares how
he relies on open source
methods, homegrown practices
and R-CISC intelligence to track
campaigns and mitigate
threats. He covers options for
smaller companies to remain
effective with minimal
resources.
Jason Lay,
Threat Intel, QVC
LEADING WITH EXCELLENCE:
THE FIRST PERSON YOU
MUST LEAD IS YOU!
Through her personal leadership
stories from her experiences in
both combat and peacetime
environments, Becky Halstead
discusses the importance of
curiosity and diverse thinking in
leadership. She believes those
we lead deserve the best from
us as their leader; that each of us
chooses to lead, or not to lead,
and we must lead ourselves first.
Becky Halstead,
Retired Brigadier
General
RISK AND FRAUD MITIGATION:
INSIGHTS FROM THE FRONT
LINES
Panelists discuss current trends in
the fraud space, strategies for
mitigating risk, and examples of
organizational structure and
approach. They share how
organizations are structuring their
departments around fraud,
engaging their cross departmental
teams, and their approaches to
identify and protect fraud.
Tim Brewer, VP,
Engineering,
CashStar
Michel Huffaker, IT
Threat Intel & VM,
MGM Resorts
Scott Roubic, VP,
Internal Audit,
Asset Protection &
Real Estate, Jo-Ann
Stores
Dan Holden, CTO,
Intelligence
Director, R-CISC
THE GREAT TEAMS
UNDERSTAND “THE WHY”
The more a company creates
“mission moments” for
employees and team members
to understand that Greater
purpose, the better off the team
will be when it comes to
enduring any challenges along
the way to achieving its goal.
Don Yaeger shares his findings
from interviews with Olympic and
champion athletes, renowned
thought-leaders and more.
Don Yaeger,
New York Times,
Best-Selling Author
@donyaeger
12 Top Talks from the 2017 R-CISC Summit

More Related Content

What's hot

Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015CSO_Presentations
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsScalar Decisions
 
Strategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleStrategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleKevin Duffey
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasTripwire
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The BoardPaul Melson
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMatthew Rosenquist
 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEOKevin Duffey
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 
The July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeThe July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeCraig McGill
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureCraig McGill
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapDominic Vogel
 
5 ways erp can boost your company’s security
5 ways erp can boost your company’s security5 ways erp can boost your company’s security
5 ways erp can boost your company’s securityERP solutions
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyAgus Wicaksono
 
How much security is enough?
How much security is enough?How much security is enough?
How much security is enough?Sherry Jones
 
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeNearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeprcircle
 
[Webinar Slides] The Simplest Route to Security and Compliance
[Webinar Slides] The Simplest Route to Security and Compliance[Webinar Slides] The Simplest Route to Security and Compliance
[Webinar Slides] The Simplest Route to Security and ComplianceAIIM International
 

What's hot (19)

Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
Strategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleStrategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a Role
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEO
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
The July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeThe July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk Landscape
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
5 ways erp can boost your company’s security
5 ways erp can boost your company’s security5 ways erp can boost your company’s security
5 ways erp can boost your company’s security
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
How much security is enough?
How much security is enough?How much security is enough?
How much security is enough?
 
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeNearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
 
[Webinar Slides] The Simplest Route to Security and Compliance
[Webinar Slides] The Simplest Route to Security and Compliance[Webinar Slides] The Simplest Route to Security and Compliance
[Webinar Slides] The Simplest Route to Security and Compliance
 

Similar to 12 Top Talks from the 2017 R-CISC Summit

Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Matthew Rosenquist
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts finalDaren Dunkel
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)Julie Bridgen
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015John Budriss
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015Scott Smith
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeErnst & Young
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeNishantSisodiya
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Ludmila Morozova-Buss
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazineBradford Sims
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINETopCyberNewsMAGAZINE
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfpreetichaubey4
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Cyber Security importance.pdf
Cyber Security importance.pdfCyber Security importance.pdf
Cyber Security importance.pdfCiente
 

Similar to 12 Top Talks from the 2017 R-CISC Summit (20)

Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
CRI-Exec-Cyber-Briefings (1)
CRI-Exec-Cyber-Briefings (1)CRI-Exec-Cyber-Briefings (1)
CRI-Exec-Cyber-Briefings (1)
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
 
Building Cyber Resilience
Building Cyber ResilienceBuilding Cyber Resilience
Building Cyber Resilience
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Cyber Security importance.pdf
Cyber Security importance.pdfCyber Security importance.pdf
Cyber Security importance.pdf
 

More from Tripwire

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughTripwire
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyTripwire
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationTripwire
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportTripwire
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!Tripwire
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationTripwire
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...Tripwire
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsTripwire
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTripwire
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkTripwire
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksTripwire
 

More from Tripwire (20)

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase Cole
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber Moments
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 

Recently uploaded

Film= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
Film= Dubai Call Girls O525547819 Call Girls Dubai WhsatappFilm= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
Film= Dubai Call Girls O525547819 Call Girls Dubai Whsatappkojalkojal131
 
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779Delhi Call girls
 
The 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyThe 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyKatherineBishop4
 
Dubai Call Girls O525547&19 (Asii) Call Girls Dubai
Dubai Call Girls O525547&19 (Asii) Call Girls DubaiDubai Call Girls O525547&19 (Asii) Call Girls Dubai
Dubai Call Girls O525547&19 (Asii) Call Girls Dubaikojalkojal131
 
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call GirlIndian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call GirlAroojKhan71
 
Supermarket Floral Ad Roundup- Week 17 2024.pdf
Supermarket Floral Ad Roundup- Week 17 2024.pdfSupermarket Floral Ad Roundup- Week 17 2024.pdf
Supermarket Floral Ad Roundup- Week 17 2024.pdfKarliNelson4
 
Korba Call Girls #9907093804 Contact Number Escorts Service Korba
Korba Call Girls #9907093804 Contact Number Escorts Service KorbaKorba Call Girls #9907093804 Contact Number Escorts Service Korba
Korba Call Girls #9907093804 Contact Number Escorts Service Korbasrsj9000
 
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779Delhi Call girls
 
The 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyThe 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyTinuiti
 
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779Delhi Call girls
 

Recently uploaded (11)

Film= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
Film= Dubai Call Girls O525547819 Call Girls Dubai WhsatappFilm= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
Film= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
 
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
 
The 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyThe 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing Study
 
Model Call Girl in Yamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Yamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Yamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Yamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Dubai Call Girls O525547&19 (Asii) Call Girls Dubai
Dubai Call Girls O525547&19 (Asii) Call Girls DubaiDubai Call Girls O525547&19 (Asii) Call Girls Dubai
Dubai Call Girls O525547&19 (Asii) Call Girls Dubai
 
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call GirlIndian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
 
Supermarket Floral Ad Roundup- Week 17 2024.pdf
Supermarket Floral Ad Roundup- Week 17 2024.pdfSupermarket Floral Ad Roundup- Week 17 2024.pdf
Supermarket Floral Ad Roundup- Week 17 2024.pdf
 
Korba Call Girls #9907093804 Contact Number Escorts Service Korba
Korba Call Girls #9907093804 Contact Number Escorts Service KorbaKorba Call Girls #9907093804 Contact Number Escorts Service Korba
Korba Call Girls #9907093804 Contact Number Escorts Service Korba
 
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
 
The 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyThe 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing Study
 
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
 

12 Top Talks from the 2017 R-CISC Summit

  • 1.
  • 2. STEPPING INTO LEADERSHIP: STAYING AHEAD OF TODAY’S THREATS AND THE EVOLVING CISO ROLE Rich Agostino discusses leadership, the cyber landscape and what it takes to protect and advance the cyber security function for a Fortune 100 company. Agostino shares how he helped redefine and elevate Target’s cyber security practices, and how he and his team try to stay one step ahead of the bad guys. Rich Agostino, CISO, Target
  • 3. THE TRUE COST OF CYBERCRIME The cost of cybercrime across industries is accelerating as attacks continue to succeed. Kelly Bissell provides insights into the cost of cybercrime, the value of current security investments, and best practices for prioritizing the cybersecurity efforts that will truly make a difference. Kelly Bissell, Managing Director, Accenture Security @ckellybissell
  • 4. WORLD-CLASS CYBERSECURITY OPERATIONS Most CSOCs continue to fall short in keeping the adversary – even the unsophisticated attacker – out of the enterprise. Carson Zimmerman offers some observations on what it takes to do Computer Network Defense well in the modern IT enterprise, presenting 10 fundamental qualities of an effective CSOC that cut across elements of people, process and technology. Carson Zimmerman, Author, Cybersecurity Engineer
  • 5. DRIVING SECURITY OPERATIONS EFFICIENCY THROUGH ORCHESTRATION AND AUTOMATION Scott Howitt and Vikram Desai provide the results of new research on the rising cost of cyber crime in retail, sharing a real-world example of how MGM has applied orchestration and automation to simplify operations, eliminate manual tasks, and increase threat visibility and responsiveness. Vikram Desai, Managing Director, Accenture Security @vkdesai Scott Hewitt, CISO, MGM International @scotthewitt
  • 6. FROM GEOPOLITICS TO THE TWITTERSPHERE: STRATEGIES FOR NAVIGATING RISK IN THE SPOTLIGHT Panelists discuss the real-world factors that influence cyber risk, strategies for effective preparation and response, and insight on navigating the implications of brand and reputation in today’s cyber threat landscape. Greg Alexander, VP, Global Security Advisor, Priceline Group Rebecca Janutis, VP, Info Security, Kohl’s Rocco Grillo, Executive Managing Director, Stroz Friedberg
  • 7. THE NEXT EVOLUTION OF SECURITY MONITORING AND ANALYTICS Kostas Georgakopoulos shares a global and in-the-trenches perspective on the inner- workings of managing cyber security teams, systems and incidents. He showcases how open-sourced capabilities can transform an organization and innovative security capabilities, while bringing flexibility and cost savings. Kostas Georgakopoulos, CISO, P&G
  • 8. HOW LEADING SECURITY AND FRAUD TEAMS FIGHT ACCOUNT TAKEOVER To combat attacks and protect customers against large-scale ATO using stolen passwords, retail security, network, and fraud teams have begun collaborating more than ever before. Shuman Ghosemajumder shares leading practices and new ideas in business and technology across the retail industry to protect users against ATO. Shuman Ghosemajumper, CTO, Shape Security
  • 9. THE IMPORTANCE OF WOMEN IN CYBERSECURITY Women represent a mere 11% of the world’s information security workforce. Leading women in strategic roles within their cybersecurity organizations deliberate the importance of women in this industry, sharing their journey into the field, ways to eliminate barriers for aspiring female leaders and how to help shift this trend for the future. Deborah Dixon, SVP, Global CISO, Best Buy Roseann Larson, VP & CISO, VF Corp. Lauren Dana Rosenblatt, Exec. Director, Global Head, Cyber Threat Mgmt Suzie Squier, Executive Director, R-CISC
  • 10. BIG THREATS, SMALL SHOP: TRACKING MAJOR CAMPAIGNS WITH LIMITED RESOURCES With limited resources, no purchased tools and no vendors, Jason Lay shares how he relies on open source methods, homegrown practices and R-CISC intelligence to track campaigns and mitigate threats. He covers options for smaller companies to remain effective with minimal resources. Jason Lay, Threat Intel, QVC
  • 11. LEADING WITH EXCELLENCE: THE FIRST PERSON YOU MUST LEAD IS YOU! Through her personal leadership stories from her experiences in both combat and peacetime environments, Becky Halstead discusses the importance of curiosity and diverse thinking in leadership. She believes those we lead deserve the best from us as their leader; that each of us chooses to lead, or not to lead, and we must lead ourselves first. Becky Halstead, Retired Brigadier General
  • 12. RISK AND FRAUD MITIGATION: INSIGHTS FROM THE FRONT LINES Panelists discuss current trends in the fraud space, strategies for mitigating risk, and examples of organizational structure and approach. They share how organizations are structuring their departments around fraud, engaging their cross departmental teams, and their approaches to identify and protect fraud. Tim Brewer, VP, Engineering, CashStar Michel Huffaker, IT Threat Intel & VM, MGM Resorts Scott Roubic, VP, Internal Audit, Asset Protection & Real Estate, Jo-Ann Stores Dan Holden, CTO, Intelligence Director, R-CISC
  • 13. THE GREAT TEAMS UNDERSTAND “THE WHY” The more a company creates “mission moments” for employees and team members to understand that Greater purpose, the better off the team will be when it comes to enduring any challenges along the way to achieving its goal. Don Yaeger shares his findings from interviews with Olympic and champion athletes, renowned thought-leaders and more. Don Yaeger, New York Times, Best-Selling Author @donyaeger