Agenda

Get ready for CyberSecure with our pre-conference resources

Click the dates below to view the schedule by day. Sessions are listed in Eastern Time.
Subject to change as details are confirmed.

Day 1: Ransomware Response (12:00 p.m. - 5:30 p.m.)
Ransomware Response (12:10 p.m. - 1:30 p.m.)

Increased ROI and limited accountability have made cybercrime explode. Explore the tools and technologies needed to dismantle the ransomware ecosystem.

12:10 p.m.

Get a firsthand account of the landmark SolarWinds cyberattack, from the first moments of discovering the breach to the ways the organization is shoring up security practices in the aftermath. Glean practical takeaways and hard-won lessons from a cyberattack survivor.

12:35 p.m.

Cyberattack victims face an agonizing decision: pay the ransom to recover your data, which could encourage future attacks, or refuse and accept consequences that may include a financial loss higher than the ransom. Evaluate the options with expert advice from a U.S. Secret Service special agent.

1:05 p.m.

Living in seclusion, and routinely receiving death threats from cybercriminal gangs, Fabian Wosar remains undeterred from his mission: developing and deploying tools to fight ransomware. In this one-of-a-kind, protected conversation, find out how his decryption efforts have stymied over a billion dollars’ worth of cybercrime.

Follow the Money (2:00 p.m. - 3:15 p.m.)

From cyber liability insurance to blockchain forensics, understand which options are effective for preventing, reducing, and recovering financial losses.

2:00 p.m.

Take a guided tour through a blockchain investigation to understand how cryptocurrency transactions connect to real-world entities. Explore how tracking blockchain payments can not only identify those responsible for an attack but ultimately disrupt the ransomware supply chain.

2:30 p.m.

At first glance, cyber insurance—policies designed to mitigate the financial losses of a breach—seems an obvious addition to an enterprise’s security toolbox. But now, some threat actors are targeting cyber insurance holders. Walk through an in-depth review of the true protection, and cost, of cyber insurance.

2:55 p.m.

Stemming the tide of cybercrime requires a holistic solution addressing technology and policy. Explore the ways anti-money-laundering regulation can complement emerging technologies in preventing cybercrime.

Attribution and Breach Reporting (3:50 p.m. - 5:25 p.m.)

Identifying who is responsible for an attack matters. Unpack how shared breach reporting can strike a balance between business liability and the public good.

4:45 p.m.

Pinpointing the perpetrators is a crucial element in mounting a cohesive defense against cybercrime. Learn how to navigate attack attribution and share collective intelligence to prevent future attacks.

5:10 p.m.

Understanding existing and emerging cyber threats is paramount to establishing a strong defense against them. Threat actors are exploiting new vulnerabilities and attack vectors every day, and they are sharing expertise. Find out how businesses and government organizations can benefit from the visibility and transparency of centralized breach reporting and intelligence sharing.

Last Call with the Editors (5:25 p.m. - 5:30 p.m.)

Before we sign off for the night, join our last call with all of our editors to get their analysis on the day’s topics, themes, and guests.

Day 2: An Action Plan for Resiliency (12:00 p.m. - 5:05 p.m.)
12:00 p.m.
Welcome Remarks
The Technology of CyberSecurity (12:05 p.m. - 1:25 p.m.)

Technologies like artificial intelligence can identify patterns or irregularities to highlight vulnerabilities. Discover the latest tools to incorporate into your cyber-resiliency toolkit.

12:05 p.m.

Explore the technological advancements that are paving the way for a more secure future. Examine the use of AI for cybersecurity, and learn how other emerging technologies can defend against disinformation and computational propaganda.

1:00 p.m.

Over 80% of data breaches leverage weak or stolen passwords. As a result, such passwords create the single biggest security risk an organization faces. Explore options for eliminating passwords, such as advancements in biometrics, that maintain employee privacy and confidentiality.

The Global Threat Landscape (1:55 p.m. - 3:10 p.m.)

With the global aspects of cybercrime, the current international situation is not sustainable. Criminal accountability requires cooperation across country lines.

1:55 p.m.

Thwarting the rampant onslaught of cyberattacks has become an urgent priority and a matter of national security for government bodies across the world. Learn about the bold strategy the U.S. is adopting and what results it is achieving.

2:25 p.m.

Step through the unique challenges of holding cybercriminals accountable. One expert explains what it takes to find and prosecute hackers worldwide, from penetrating the cybercriminal underground in person to putting “boots on the ground” in countries that may be indifferent toward the crimes.

An Action Plan for Resiliency (3:45 p.m. - 5:05 p.m.)

Cyberattacks are becoming a “when, not if” reality. Get strategies for fixing security vulnerabilities and taking the critical first steps after a breach happens.

4:40 p.m.

Reinforce your organization’s security strategy with practical guidance on how to best prepare for the ever-evolving cyber threat landscape. Take away actionable steps to help you find and fix existing vulnerabilities.

5:00 p.m.
Closing Remarks

Event partners

Partner with MIT Technology Review’s events

Partnering with MIT Technology Review makes a strong statement about your brand's commitment to thought leadership and ground-breaking innovation.

Interested in partnering with us?
Contact Andrew Hendler at 646-520-6981 or via email.