From shipping to staffing, the Chamber and its partners have the tools to save your business money and the solutions to help you run it more efficiently. Join the U.S. Chamber of Commerce today to start saving.
Cybersecurity has become a top priority for DHS. The department works with the public and private sectors to mitigate cyberattacks, which starts by sharing information about cyber threats. Elaine Duke will discuss the department’s priorities for strengthening the security and resilience of federal networks and critical infrastructure and how DHS promotes public-private partnerships to mitigate cyber threats
Michael Daniel provides a global outlook on security and risk management in the 21st century. Breaking down the short and long-term challenges we face as a society and those that affect the public and private sector, he stresses the importance of collaboration and information sharing across business and industry as key to effective defense against online adversaries. Daniel’s insights are crucial to a comprehensive knowledge of today’s security landscape, including the potential impact of the Trump administration’s approach to cybersecurity and the heightened power of the Internet of Things and Big Data to thrive in an interconnected world.
Data is the lifeblood of the global economy and it is under continuous threat from bad actors and malevolent third parties seeking to steal and monetize it. Cybercrime represents one of the largest illegal economie in the world The statistics on data that has been lost, stolen, or compromised continues to grow. Data security technology is here and the market continues to innovate, so how can this continue? This panel will discuss changing the economics of cybercrime--so it does not pay--through new strategies, approches, and collaborations. What behavioral and policy shifts need to happen in order to enable the public and private sector to share data, tools, and expertise to beat the bad guys at their own game.
America’s natural gas delivery system is the safest, most reliable energy delivery system in the world. This said, industry operators recognize there are inherent cyber vulnerabilities with employing web-based applications for industrial control and business operating systems. A leading cybersecurity mechanism is the existing partnership between the federal government and industry operators. Dave McCurdy will provide an overview of an unprecedented public/private collaboration for assessing and advancing natural gas pipeline cybersecurity in a nonregulatory environment.
The world has woken up to the internet of things, but it is clear that the IoT has not woken up to its responsibilities. With every new product comes the risk that it will disclose private user data, provide an increased attack surface, and further enable mega-DDoS attacks. Ken Munro will show you how hackers can abuse IoT devices because of poor standards and how some manufacturers attempt to dodge their responsibilities
Cybercrime is an exponentially growing threat to the world's businesses, governments, and citizens. Attackers have been easily evading signature-based antivirus solutions for years. Making matters worse, the exponential growth in weaponized malware is overwhelming the capacity of enterprise security teams. Public and private entities are being systematically targeted with ransomware developed and distributed by international criminal organizations and nation states. This panel will discuss the current state of the ransomware crisis using case studies to learn about the impact and cost of recent attacks. In addition, this panel will discuss how intelligence can detect and prevent threats, redefining how endpoint security protects an organization.
Marketing databases, customer analytics, open source intelligence and behavioral patterns are easier to manage with big data—but are these data elements safe from hackers? What is the impact of new technologies, from Pokémon GO to the Internet of Things? Theresa Payton explains how to harness big data to achieve business goals while incorporating safeguards to fight cybercriminals and how the Internet of Things may be the driver of global change.
A cybersecurity storm is brewing over the rapid adoption of the consumerization of the Internet of Things. The implications to critical infrastructure and national security are enormous when such a high volume of these consumer devices are so easily hacked. Are we doing the right things to prepare? This panel will share real-world data and how lessons learned from industry can infuence our approach to combating the coming storm
Maintaining consumer trust in the fnancial sector is critical not just for individual banks but for our economic and national security. Banks do not compete on safety and security; they partner to maintain trust and soundness of the industry. Defending against a cyber threat is truly a partnership between technology and business leaders within and between institutions. Jeff von Gillern will explore the cyber risk landscape from his leadership vantage point at a major bank. He will discuss the nexus between technology innovation and fntech with security and why U.S. Bancorp has invested resources to be a leader in partnering across the private and public sectors.
U.S. businesses face blended threats—criminal and national security—to their digital networks. In today’s interconnected economy, industry is a key partner in confronting these threats. A seemingly small cyber intrusion on a U.S. business may transmit personally identifiable information to a terrorist network or fund militant activity on battlefields far from U.S. jurisdiction. Boente will discuss cyber threat from nation states and how critical cooperation between business and federal agencies is disrupting cyberattacks.
Cyberattacks are increasing in frequency, scale, and sophistication and will continue to grow in the future. The internet of things is benefiting our lives in countless ways, but it also creates new opportunities for cybercriminals to take advantage. This panel will debate current cybersecurity trends and policy actions, as well as what leaders can do to defend critical infrastructure, deter malicious actors, and respond to significant cyber incidents.