Agency Partners
US Secret Service, FBI Cyber Division, DHS-CISA, HSI, etc.
Panels, presentations, investigation insights and case studies
Associations Who Invited Their Members
ISACA, InfraGard, ISSA, ISC2, CSA, IAFCI, ACAMS
Inviting members from all local chapters, and providing input on the agenda
Overview
Succinct presentations will focus on topics that give cyber leaders immediately actionable insights. Moderated discussion will follow each topic, with streamlined talking points to maximize audience take-aways.
The Forum is Graciously Supported by Solution Providers
As a community-first gathering, supporting organizations do NOT get registration information, and post-event communications will be limited to details requested by participants.
John Kindervag, Creator of Zero Trust & Chief Evangelist, Illumio
Zero Trust is revolutionizing network security architecture: it is data and device-centric and designed to stop data breaches while protecting critical infrastructure and making cyber-attacks unsuccessful. In this session, the Creator of Zero Trust, John Kindervag, will discuss the reality of the concept of Zero Trust. Additionally, John will explain how adopting Zero Trust leads to accelerated and more secure cloud adoption. Learn how your Zero Trust journey will help you achieve tactical and operational goals that make cybersecurity a business enabler, not a business inhibitor
Today, we will hear from numerous agencies from the federal and state governments, all charged with education, information and/or enforcement around fraud and cyber. Our tax dollars at work, they provide a plethora of services and direct help for private and public sector organizations.
In this discussion, we will hear from some of the CISOs who have been leveraging intelligence, education, and services from those agencies as well as leaders from within CISA, the FBI and the NJ State Fusion Center, NJCCIC. They will discuss how they have been working together in recent years, and suggest ways in which the private sector and government agencies can learn from each other.
Dr. Chase Cunningham, "Dr. Zero Trust", Cyber WarFare Expert & Author
How NOT to Lead: Lessons Every Manager Can Learn from Dumpster Chickens, Mushroom Farmers, and Other Office Offenders is a timely and lively discussion of the mistakes and missteps that many leaders make as they do their best to guide their teams to success and achievement. Cybersecurity veteran and author Dr. Chase Cunningham walks you through a variety of failed-leader archetypes―including the Dumpster Chicken, the Mushroom Farmer, the Unicorn Chaser, and the Cat Herder―as well as timeless lessons and in-depth case studies
Dr. Chase Cunningham, "Dr. Zero Trust", Cyber WarFare Expert & Author
How NOT to Lead: Lessons Every Manager Can Learn from Dumpster Chickens, Mushroom Farmers, and Other Office Offenders is a timely and lively discussion of the mistakes and missteps that many leaders make as they do their best to guide their teams to success and achievement. Cybersecurity veteran and author Dr. Chase Cunningham walks you through a variety of failed-leader archetypes―including the Dumpster Chicken, the Mushroom Farmer, the Unicorn Chaser, and the Cat Herder―as well as timeless lessons and in-depth case studies
Expect a fun, informative, and surprsing discussion with John Kindervag. In this session, he will chat with our Forum Moderator and explain the derevation of Zero Trust, how it came to be and the journey of discovery it has been. From his time as a Forrester Analyst, through the path that has lead to the most widely leveraged (and often misinterpreted) term in cybersecurity.
William Ray, Supervisory Special Agent, FBI Criminal Investigative Division, IC3
IC3's mission is to provide the public with a reliable and convenient reporting mechanism to submit information to the Federal Bureau of Investigation concerning suspected Internet-facilitated criminal activity and to develop effective alliances with law enforcement and industry partners. Information is analyzed and disseminated for investigative and intelligence purposes to law enforcement and for public awareness.
Look for detailed data that will help security leaders as they think crtically about today's biggest threats
Michelle Liu, Senior Special Agent, FBI Newark Field Office
John Varrone, Special Agent in Charge, Homeland Security Investigations
US Department of Homeland Security
Third-party risk is not limited to servers and OT devices (i.e. Target’s thermostat systems). As FinTech relationships with Banks and Credit Unions have expanded dramatically over the past several years, so has the exposure to risks associated with these connections among data, systems and customers. In the financial services sector, this has led to many of the significant fraud and regulatory fines, notable breaches, and losses for financial institutions of all sizes..
In this session, Mark Wolfrey, ACAMS Philadelphia founding members and audit executive will discuss the practices necessary to manage third-party relationships to limit fraud and regulatory risk. The follow-on discussion from this talk will explore how this plays out for both fraud fighters and cybersecurity professionals, and what each can learn from the other.
Increasingly, there is a coming together of these two areas. Fraud Fighters are the savvy professionals helping their organizations prevent Account Take Over (ATO), identity theft-related fraud, and the like… They are often thinking about Know Your Customer (KYC) and Anti-Money Laundering (AML) initiatives, as well as compliance in regulated industries. We have started to see more often financial fraud professionals merged into the teams that report to a CISO.
In this discussion, our panelists will debate this idea, and talk about what cybersecurity professionals can learn from each other.
Christopher Kay, Cybersecurity State Coordinator, Region II
Cybersecurity and Infrastructure Security Agency
U.S. Department of Homeland Security
Ken Fishkin, President, ISC2 New Jersey Chapter
Michael Hiskey, Community Organizer, CxO Security Forum