Tulsa Cyber Summit 2021
Session & Panel Descriptions
The virtual Tulsa Cyber Summit will feature four keynote speakers, three panels, and featured speakers on two parallel tracks for leadership and technology. Participants can choose to attend sessions discussing cybersecurity issues at the leadership or technical levels. Participants are free to move between tracks as desired.
Leadership Track Session Descriptions
What is it that drives success in cyber security for the organization? It can be summarized in one word: Culture. Culture sets goals and aspirations rooted in organizational ethos and binds them to practice and habit. This session discusses the ways in which a healthy culture can be cultivated and nurtured within a digital enterprise to combat cyber risk.
Cyber Workforce Development
The unvarnished truth in the world of cyber security is that, while technology abounds, skilled practitioners are in short supply. And while cybersecurity talent is hard to come by, it is even more difficult to develop. This session presents issues that impact cyber security workforce development from an organizational perspective.
Risk is something we live with every day. Even when robust controls are in place, an organization or individual is confronted with residual risk. This session describes various aspects of cyber security risk to the enterprise and discusses some strategies for its management and mitigation.
Education in cybersecurity is not a “one-size fits all” situation. End users and system operators need some cyber security literacy and awareness, security practitioners need specialized skills and training, while management and C-level employees might require an educational background that lets them connect the dots. This session provides a valuable perspective from educational leaders on the spectrum of cybersecurity educational offerings both regional and nationwide.
Healthcare Information Security and Privacy
There is no other category of information that is more personal and intimate in nature than our medical records. As digital healthcare data and information systems mushroom in scope and use, their security and our privacy are at stake. This session highlights the emerging hazards and solutions on this particular battlefront in cyber space.
Technology Track Session Descriptions
Judge Louis Brandeis succinctly characterized privacy as “the right to be left alone.” Its entangled relationship with cybersecurity is underscored with each headline that documents the latest data breach. This session will expose the audience to that intersection with a focus on relevant technology issues and trends.
Applications and software are tempting targets for the cyber adversary. Malicious code and attacks on digital logic can expose the keys to the kingdom, leaving a company or organization completely at the mercy of a threat actor. This session presents tools and techniques for improving the state of affairs for the enterprise concerning the security of applications and system software they develop, field, operate and manage.
Your Digital Footprint
When it comes to the value proposition relating risk management and the size of your organization’s digital footprint, less is more. Balancing mission support and cyber security in this regard can be a high-wire act. This session puts the spotlight on this endeavor and exposes the role of technology in supporting its pursuit.
Vulnerability management has become a micro-industry within cyber security. Indeed, a robust cybersecurity posture calls for a mature approach to managing vulnerabilities with a strategic application of threat intelligence to security control deployment. This session is intended to offer a technological backdrop to the area, helping the audience navigate the confusing maze of terminology and solutions.
The Internet of Things has transformed the everyday appliance into a threat vector. Toasters, kiosks and automobiles collect data, have Internet addresses, and run software susceptible to attack. This session offers a look at some of the threats and on-going work to address them in this new wild west of cyber space.
A constellation of technologies supports cyber security operations. Some are front and center while others operate behind the scenes. This session explores selected technologies fundamental to this aspect of an organization’s cybersecurity presence. A special element of the session is that it considers cybersecurity operations for both IT and OT.
Leadership Panel: Advancements in Cyber Innovation
Any inventor will tell you that the idea is the easy part. Its transformation into a real-world practical solution places the innovator on a path fraught with challenges and pitfalls. This panel opens a conversation on cyber innovation and describes novel programs and efforts to foster it within organizations and communities.
Gender and Diversity in the Cybersecurity Workforce
Establishing and raising the standard for inclusiveness in gender and diversity for the cybersecurity workforce is of paramount importance for the growth of the field and for the health of organizations. But obstacles remain and progress is hard-won. This panel brings to bear the experience of professionals on this topic and presents their insights on how to overcome systemic obstacles and create wins for organizations on this front.
Cybersecurity Challenges for the Small and Medium Enterprise
Not every organization is blessed with the resources a Fortune 500 company can allocate towards the defense of their digital assets. Threat actors now recognize the asymmetry at play: while small to medium enterprises are relatively limited in their ability to build out gold standard security infrastructures and operations, they nevertheless must protect sensitive data and high value assets. Moreover, they often provide an avenue for adversaries targeting bigger game. Panelists in this session will discuss the special challenges small and medium enterprises face in cybersecurity and offer some wisdom on how to cope with them.
Have questions? Email us at email@example.com.