Standing up to Nation-State Hackers (12:10 p.m. - 1:35 p.m.)

Fighting cybercrime requires a new kind of leadership that champions a holistic approach to cybersecurity. The global average cost of a data breach from a 2019 study is $3.92 million and rising each year. How are smart companies striking preemptively, and what are the emerging technologies proven to support smart security?

12:10 PM

This session examines the emerging and ongoing threats in the cybersecurity landscape across industries and stakeholder lines. Achieving cyber-resiliency is an imperative that requires the full muscle of leadership teams, across C-suites, boards, and investors.

12:30 PM

Citing examples and stories from hidden archives, this session wraps context around the very real geopolitical digital pursuit of achieving nation-state cyber advantage. From espionage to elections, from blackouts to data breaches, from million-dollar ransoms to staged supply chain disruption; cyber warfare is transforming statecraft and national security policy.

1:10 PM

If there’s one thing security is not, it’s simple. The attack surface is growing, the tools employees use to communicate are expanding, and more systems doesn’t automatically translate into stronger security. In this session we will discuss how to develop an effective and efficient cybersecurity strategy by focusing on relevant threat vectors, appropriate use of intelligence, data analytics, and deep understanding of risk factors.

MIT Inside Track (1:35 p.m. - 2:05 p.m.)

Join one of the concurrent sessions to engage more deeply with our content, speakers, and your fellow attendees during mainstage programming breaks.

1:35 PM
MIT Technology Review’s Cybersecurity Senior Editor Patrick Howell O’Neill has his finger on the pulse of the world of cybersecurity. From the risks of ransomware to the nebula of nation-state hacking, join this session to interact with Patrick and get answers to all your cybersecurity questions and concerns.

The CyberSecure program research uncovered many useful sources of information, including books from celebrated authors who are also speakers at this event. This bookstore provides access to some of the critical stories and research findings that informed our program development and continue to enlighten security interests, applicable across industries and around the world.

CyberSecure Spotlight on: Threat Detection (2:05 p.m. - 3:05 p.m.)
Our agenda spotlights offer an opportunity to drill down on some of the key topics in cybersecurity. Today’s focus is on threat detection, examining the role of AI in threat identification, and a case study analysis of the infamous Capital One breach.
2:05 PM

Solutions to cybersecurity challenges require, not only technological innovation, but changes in the roles and processes involved in security operations. This session features scenarios that enable the “citizen data scientist” to create machine learning models to hunt for threats and pinpoint cyber-attacks that can otherwise not be detected. 

2:35 PM

The 2019 Capital One breach was the result of a pervasive lack of controls from establishing an effective risk assessment to the design and implementation of their cloud migration initiative. Over 106 million people were impacted, resulting in a hefty civil penalty suit. What happened was clear, but why it happened was not. We look at how proven methodologies can help mitigate risks in your organization.

MIT Inside Track (3:05 p.m. - 3:35 p.m.)

Join one of the concurrent sessions to engage more deeply with our content, speakers, and your fellow attendees during mainstage programming breaks.

3:05 PM

In quest of enhanced security against hackers, new-gen code makers are pivoting from modern (classical) to quantum, exploiting the laws of quantum mechanics for future-proof transactions. What are the keys to activating quantum cryptography intuition, whom will it impact the most, and why does it matter?

The CyberSecure program research uncovered many useful sources of information, including books from celebrated authors who are also speakers at this event. This bookstore provides access to some of the critical stories and research findings that informed our program development and continue to enlighten security interests, applicable across industries and around the world.

Holistic Risk Management (3:35 p.m. - 5:00 p.m.)

How do organizations best ensure a resilient cyber ecosystem- from assessing risk, to implementing and managing controls, to ensuring compliance internally and with external partners? Is it possible for defensive technologies to catch up and move ahead of attackers?

3:35 PM

This session presents a compilation of tactics designed to mitigate cyber risk that span the public-private sector- from implementing security best practices in the White House to establishing a network of intelligence for a leading financial institution.

4:05 PM

There was a 37% increase in mobile phishing attempts with the rise of the pandemic-driven remote workforce. Spear phishing attacks targeted at mobile devices use social engineering to bypass legacy security systems, exploiting human vulnerabilities through manipulative campaigns that are harder to spot on a smaller screen. Twitter is a prime example. How does spear phishing gain access, what makes mobile devices so vulnerable to attack, and what can be done about it?  

4:30 PM

Every cybersecurity professional understands that complexity is the enemy of security. Yet the complexity of the systems we deploy inexorably rises over time as software eats the world. Why is this the case and what can be done about it?

5:00 PM

Join this informal wrap-up session with the MIT Technology Review editorial team and get their reflections and insights on the day’s proceedings.

Ransomware Response and Prevention (12:10 p.m. - 1:20 p.m.)

The proliferation of data hostage-taking is exponential. Recovery in the new shakedown economy varies from insurance payouts to devising techniques to bolster data against common attack vectors and vulnerabilities. What are the cutting-edge technologies and toolsets organizations are using in response, and how do they stand up to attack?

12:10 PM

On March 19, 2019, Norsk Hydro, one of the world’s largest producers of aluminum, faced a systemic, worldwide network ransomware attack. Their response strategy was built upon two principles: pay no ransom and admit the breach. This resulted in unprecedented transparency and a distributed workstream that included forensics, communication management, and rebuilding.

12:30 PM

Attribution is a loaded term but an important process to undergo to ensure national security. Even information security professionals disagree as to whether it can be reliably done or if the process holds any value at all. What can be learned from security professionals who have achieved success, and what are the obstacles?

MIT Inside Track (1:20 p.m. - 1:50 p.m.)

Join one of the concurrent sessions to engage more deeply with our content, speakers, and your fellow attendees during mainstage programming breaks.

1:20 PM

How can organizations infuse the highest of ethical standards in a booming industry with a talent shortfall? With no codified cybersecurity ethics guidelines, it is a question not asked often enough.

The CyberSecure program research uncovered many useful sources of information, including books from celebrated authors who are also speakers at this event. This bookstore provides access to some of the critical stories and research findings that informed our program development and continue to enlighten security interests, applicable across industries and around the world.

CyberSecure Spotlight on: Policy and Economics of Cybercrime (1:50 p.m. - 2:50 p.m.)
Our agenda spotlights offer an opportunity to drill down on some of the key topics in cybersecurity. Today’s focus examines the political challenges of regulating a cybersecurity world unconstrained by geographic boundaries and the economics and tracking of payments in this underground ecosystem.
1:50 PM

The frequency, fluidity, and anonymity of ransomware-level cyberattacks continue to challenge across domains and borders. This session focuses on international policy opportunities and possibilities of cyberspace in the analysis of world politics and addresses how to gain consensus among multi-stakeholders to integrate, collaborate, and harmonize a system of negotiations for treaties and conventions.

2:20 PM

Cryptocurrency’s decentralized, semi-anonymous nature makes it a uniquely appealing option for criminals, and their embrace of the technology has helped shape its overall reputation. But unlike traditional forms of value transfer, cryptocurrency is inherently transparent in a publicly visible ledger. With the right tools, such as blockchain analysis, defenders can gain unprecedented insight into criminal activity and the latest trends in crypto crime.

MIT Inside Track (2:50 p.m. - 3:25 p.m.)

Join one of the concurrent sessions to engage more deeply with our content, speakers, and your fellow attendees during mainstage programming breaks.

2:50 PM

Most organizations lack a robust culture of security. Building a culture of cybersecurity involves transforming the way everyone works, the way leaders lead, the way processes execute, and the way issues are managed. This session looks at how organizations build a culture in which attitudes, beliefs, and values drive behaviors that minimize the human errors that jeopardize cybersecurity. What are the key mechanisms that form a cybersecurity culture?

The CyberSecure program research uncovered many useful sources of information, including books from celebrated authors who are also speakers at this event. This bookstore provides access to some of the critical stories and research findings that informed our program development and continue to enlighten security interests, applicable across industries and around the world.

Building a Cyber-Resilient Organization (3:25 p.m. - 4:30 p.m.)

There is a common checklist of security safeguards every organization needs to put in place to protect enterprise data and stay a step ahead of potential data breaches. What is coming down the technology pipeline, and what are the anticipated results? How is AI used for threat hunting? What protections can truly secure the IoT-linked supply chain, and how best to prepare for the implications of the connected world?

3:25 PM

Today’s pervasive platform economy means that you will never truly know your supply chain. The risks are ubiquitous- from managing outsourced touchpoints, to WIFI-enabled transport, to the manufacturing of custom silicon that warms the heartbeat of your datacenter. What are the indications of trust that citizens need to know in the emerging threat economy?

4:00 PM

The roster of companies suffering massive cyber breaches isn’t slowing down. And while every breach is different, there are common elements and best practices to building a cybersecurity program to better prepare, respond, and prevent future attacks.

Partners

Partnering with MIT Technology Review makes a strong statement about your brand's commitment to thought leadership and ground-breaking innovation.

Watch what our partners say about MIT Technology Review events »

Interested in partnering with us?

Contact Andrew Hendler at 646-520-6981 or via email »