New to CEIC 2015: Financial, Retail, and Healthcare Roundtable Sessions

It’s not too late to sign up for the first-ever roundtable discussions to be held at CEIC 2015 for industry-specific professionals in the financial, retail, and healthcare industry. As part of the new Topics in Management track, the roundtable sessions will provide a forum to discuss pressing cybersecurity and e-discovery challenges that affect today’s organizations and present emerging best practices for addressing them.

CISO/CLO Summit 2015: One Day that Generates Actionable Intelligence

Mark Harrington

As legal chiefs around the world get serious about cybersecurity as part of our mission to defend our organizations, we’re learning fast, but it’s time to go beyond education and begin taking action. Four years ago Guidance Software brought legal, security, and risk and compliance chiefs together at the inaugural CISO/CLO Summit to talk strategy and we’ve come a very long way since.

Last year I was privileged to lead a panel discussion on enabling proactive risk and threat intelligence at CISO/CLO Summit 2014. The panelists included an information security chief for a major defense manufacturer, the CISO for a global automaker, security analyst Jon Oltsik of the Enterprise Strategy Group (ESG), and Ed McAndrew, the Assistant U.S. Attorney and National Cyber Security Specialist for the Department of Justice. 

New Track at CEIC 2015 Targets Critical Executive-level Legal and Security Issues

The explosion of threats in digital forensics and security is pressuring executives to anticipate, assess, and respond with greater assurance and insight than ever before.  Because of this, CEIC® 2015 has developed a new “Topics in Management” conference track for business leaders responsible for legal, security, and risk and compliance initiatives.

The new track expands upon the success of the annual CISO/CLO Summit and is packed with an all-star roster of speakers and topics. We’re eager to share some of the highlights of the management track with you in this blog, but encourage you to review the complete CEIC 2015 conference agenda with session descriptions and speaker bios for all 12 tracks.

The Current Cyber Crisis and the IT Security Budget

Barry Plaga, Interim CEO and CFO, Guidance Software

Last summer, J.P. Morgan Chase suffered a significant cyber breach of its corporate servers that affected approximately 76 million households. Very bad news and no longer an unprecedented event for a major financial institution. Then, two things happened the following fall that are very interesting when considered together:
  1. J.P. Morgan Chairman and CEO James Dimon told a panel discussion audience at the Institute of International Finance that his bank would double its cybersecurity spending over the following five years.
  2. PwC released its latest Global State of Information Security survey that noted that spending on information security fell four percent during a period in which cyber attacks against companies increased 48 percent.

AMP Threat Grid Empowers Law Enforcement to Fight Cybercrime

Jessica Bair, Cisco

Recognizing the critical need for state and local law enforcement agencies to have state-of-the art technologies to effectively fight digital crime, Cisco is creating the AMP Threat Grid for Law Enforcement Program. The program is designed to empower those working to protect our communities from cybercriminals with its dynamic malware analysis and threat intelligence platform.

Computers are central to modern criminal investigations, whether as instruments to commit the crime, as is the case for phishing, hacking, fraud or child exploitation; or as a storage repository for evidence of the crime, which is the case for virtually any crime. In addition, those using computers for criminal activity continue to become more sophisticated, and state and local law enforcement agencies struggle to keep up with their internal computer forensics/digital investigation capabilities. Malware analysis is also a critical part of digital investigation: to prove or disprove a "Trojan defense" for suspects, wherein the accused rightly or falsely claims a malicious software program conducted the criminal activity and not the user; and to investigate unknown software and suspicious files on the computers of the victims of cybercriminal activity for evidence of the crime.