ISC East 2023 is coming up Nov. 14-16 in New York City, and the Security Industry Association (SIA) and ISC East recently revealed full conference details for the SIA Education@ISC East program, including keynote presentations from top luminaries and over 40 sessions from top industry expert speakers on the most current business trends, technologies and industry developments.
Among the robust lineup of conference sessions are several dynamic presentations on critical cybersecurity topics. At ISC East, you’ll discover expert insights on cloud security and data breaches, ensuring cybersecurity of physical security installations, key government cyber defense initiatives and more. Here are five sessions you won’t want to miss; make sure to add them to your ISC East calendar!
All Times EST
Tuesday, Nov. 14, 10:00-11:30 a.m.
In this session, attendees will explore the anatomy of a data breach, including how breaches occur, the potential consequences and the importance of incident response plans. Speakers will highlight effective incident response strategies, including detection, containment, eradication and recovery, and share popular examples from some of the most infamous data breaches of all time. Learn how could these breaches have been avoided and how you can better protect your networks!
“Dive into the ever-evolving realm of cloud security in this immersive session, where leading experts unravel the complexities of modern-day data breaches and the essentials of crafting an effective incident response. This session will delve into real-world scenarios, harnessing actionable insights to fortify your cloud infrastructure, anticipate vulnerabilities and orchestrate swift, decisive responses to security challenges. Equip yourself with the knowledge and tools to navigate the nebulous terrains of the cloud, ensuring a resilient and secure digital future for your organization.”Will Knehr, Senior Manager of Information Assurance and Data Privacy, i-PRO Americas
- Will Knehr, senior manager of information assurance and data privacy, i-PRO Americas
Tuesday, Nov. 14, 2:00-2:45 p.m.
In this session, experts will demonstrate how existing and emerging technologies affect global physical security and emergency management operations. Key topics of discussion will include the personal data economy, who profits and how it affects safe operations for the public and private sectors; how criminals operate to form synthetic identities and pierce personal and organizational security; what’s here for Web3 and what is likely coming; demystifying the buzz and fears around artificial intelligence; how today’s advanced technology affects individual physical safety; and best practices for security professionals; how businesses can effectively deal with novel risks and dangers.
“Come learn how new technologies and individual employee privacy play into your cybersecurity strategy.”Mark Kapcynski, Senior Vice President, Strategic Partnership and Privacy Expert, OneRep
Mark Kapczynski, senior vice president, strategic partnerships and privacy expert, OneRep
Wednesday, Nov. 15, 9:30-10:15 a.m.
This session will help security leaders and others who are responsible for purchasing security technology understand more about the importance of having security installation projects performed by teams who understand cyber hygiene, what to ask vendors and partners about their cybersecurity postures to ensure a good fit with your own, how SIA’s Security Industry Cybersecurity Certification (SICC) might play into the future of security integration projects and more. Attendees will access insights from experienced security installers on how to better approach the cybersecurity of partner-managed projects.
“In our session on cybersecurity of physical security systems, Mark Folmer and I are going to discuss the critical topic of cyber-hygiene in relation to the physical systems security teams implement in their programs. For security professionals, this is a topic that is going to be more and more impactful as security and technology become more converged. We’ll talk about cyber-hygiene basics, how to make sure your security vendors and partners have acceptable cyber practices, and the SICC and why it’s important now, and will be even more important to security projects in the future.”Rachelle Loyear, Vice President, Integrated Security Solutions, Allied Universal
- Mark Folmer, president, Robotic Assistance Devices
- Rachelle Loyear, vice president, integrated security solutions, Allied Universal
Wednesday, Nov. 15, 10:30-11:15 a.m.
This presentation will describe the nature of the Cybersecurity and Infrastructure Security Agency (CISA) Joint Cyber Defense Collaborative (JCDC) collaborative planning process, as it relates to ICS. The session will elaborate on how JCDC utilizes its unique collaborative planning authorities to partner with members of the ICS ecosystem, including ICS vendors, ICS software maintainers and operators of ICS products, and how these recent planning efforts parse the question of how ICS vendors, through collaboration with JCDC, can be valuable partners for operators’ cybersecurity goals. Attendees will also learn about the importance of trust-building, validating problem statements and the criticality of established relationships and pre-positioning jointly in times of crisis.
- Thomas Klein, cyber operations planner, CISA
Thursday, Nov. 16, 11:30 a.m. – 12:15 p.m.
Every operating system, from Windows to all of the various Linux distributions, based their security models on effective physical security. If the physical security is ineffective, then all the encryption, access control and other security mechanisms are for naught. So how do you know if you are doing physical security right and if the physical security controls are truly protecting your information technology assets? Physical security is a unique challenge, as there are times where physical access is needed and physical access to data is a crucial aspect of data access. Even if you have processes and access entry systems in place to understand who can access systems, and different levels and types of access granted to specific individuals, how can you ensure they are working correctly? This session, led by experts with decades of in-depth industry experience, will show how you can audit your physical security to ensure that all aspects of your IT infrastructure are secure.
“Last year someone bid $19 million at auction to win a private lunch with Warren Buffett. Imagine if Buffett brought his laptop to the meeting. While the laptop might be worth a few thousand dollars, the data in the laptop could be worth hundreds of millions of dollars. The message is that the computer is almost a throwaway, but the data is the crown jewel. And crown jewels are protected by extensive levels of security. While data may be stored digitally, physical security is critical. In fact, every operating system, from Windows to Linux, premise its digital security effectiveness on strong physical security. This session will discuss how to audit the physical security controls in your organization to ensure your information technology assets are secured. Given you can fit all the books of the Library of Congress in your pocket on a single USB drive, physical security of digital assets is paramount. The last thing any CEO wants is their crown jewels walking out the door. And if that happens, it won’t be long until they are walked out the door.”Ben Rothke, Senior Information Security Manager, Tapad
- Art Cooper, principal security consultant, TrustedSec
- Jeff Hall, principal security consultant, Truvantis
- David Mundhenk, senior security consultant, eDelta Consulting
- Ben Rothke, senior information security manager, Tapad
You can access the full SIA Education@ISC conference program for only $170 by registering for a SIA Education@ISC 3-Day Pass here. And don’t forget to use SIA’s free registration link to sign up for the ISC East trade show.
The views and opinions expressed in guest posts and/or profiles are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association (SIA).