Cyber threats are increasing in frequency, scale, and sophistication, and cybersecurity must be a partnership between government and industry. Goldstein will discuss how DHS executes its mission as the central federal interface for the private sector in responding to and recovering from cyber threats. He will also discuss how DHS is improving and expanding its capability to send and receive cyber threat information to the private sector.
Small doesn’t necessarily mean secure. More and more, small and midsize businesses are targeted for cyberattacks because they typically lack the resources to adequately defend themselves. Cybersecurity is no longer an IT problem; it’s an organizational problem. So how do businesses find a balance between cost and security? What resources exist for businesses to enhance cybersecurity? This panel will provide an overview of existing frameworks and advice on finding affordable solutions to cybersecurity challenges.
The cloud has changed the way companies view information technology. Increased flexibility, on-demand scalability, and the transition of costly capital expenditures to operating expenses are just a few of the reasons why cloud computing is on the rise. However, security remains the No. 1 concern when it comes to the cloud. Learn how businesses can take advantage of the cloud while mitigating their security risks.
Panel Discussion: Protecting the South Carolina Manufacturing Ecosystem
It is estimated that by 2020 as many as 15 billion devices will be connected to the internet. This creates a significant security challenge. An attack on a manufacturer’s industrial controls systems could impact the entire production system. This panel’s experts will help companies identify, mitigate, and close security and resilience gaps that threaten manufacturing capabilities.
Luncheon Keynote: Combating Cyber Threats to U.S. National Security
Introduced by: Lester D. Eisner, Major General (USA, Retired), Founder, SC Cyber
U.S. businesses face blended threats—criminal and national security—to their digital networks. In today’s interconnected economy, industry is a key partner in confronting these threats. A seemingly small cyber intrusion by a criminal actor on a U.S. business may transmit personally identifiable information to a terrorist network or fund militant activity on battlefields far from U.S. jurisdiction. Rogers will discuss these cyber threats and actors and how critical cooperation between businesses and federal agencies works to disrupt cyberattacks.
LIVE HACK: How Not to Code and Build IoT Devices and Deal with Responsible Disclosure
The world has woken up to the internet of things, but it is plain that the IoT has not woken up to its responsibilities. With every new product comes the risk that it will disclose private user data, provide an increased attack surface, and further enable mega-DDoS attacks. Ken will show you how hackers can abuse IoT devices because of poor standards, and how some manufacturers attempt to dodge their responsibilities.
We must understand where we are before determining where to go. A baseline of normal starts with an inventory of endpoints, applications, and infrastructure. A breach is a symptom, usually the inability to identify abnormal behavior. Learn all applications, endpoints that power or access apps, and how endpoints talk to each other. Knowing your environment is key to knowing normal; normal is key to identifying abnormal. Your ability to identify abnormal is the end result.
From shipping to staffing, the Chamber and its partners have the tools to save your business
money and the solutions to help you run it more efficiently. Join the U.S. Chamber of Commerce
today to start saving.
Subscribe for updates
Above the Fold is your window on policy, with analysis, commentary and real stories about the intersection of government and business.