Get ready for CyberSecure with our pre-conference resources

Click the dates below to view the schedule by day. Sessions are listed in Eastern Time.
Subject to change as details are confirmed.

Day 1: Ransomware Response (12:00 p.m. - 5:05 p.m.)
Ransomware Response (12:10 p.m. - 1:30 p.m.)

Increased ROI and limited accountability have made cybercrime explode. Explore the tools and technologies needed to dismantle the ransomware ecosystem.

12:10 PM

Get a firsthand account of the landmark SolarWinds cyberattack, from the first moments of discovering the breach to the ways the organization is shoring up security practices in the aftermath. Glean practical takeaways and hard-won lessons from a cyberattack survivor.

12:35 PM

Cyberattack victims face an agonizing decision: pay the ransom to recover your data, which could encourage future attacks, or refuse and accept consequences that may include a financial loss higher than the ransom. Evaluate the options with expert advice from a U.S. Secret Service special agent.

1:00 PM

Living in seclusion, and routinely receiving death threats from cybercriminal gangs, Fabian Wosar remains undeterred from his mission: developing and deploying tools to fight ransomware. In this one-of-a-kind, protected conversation, find out how his decryption efforts have stymied over a billion dollars’ worth of cybercrime.

MIT Inside Track (1:30 p.m. - 2:05 p.m.)

Join the Inside Track sessions to engage more deeply with our content, speakers, and your fellow attendees during mainstage programming breaks.

1:30 PM
Networking Break
1:40 PM

Without power, our digital world goes dark. It is essential that the systems that generate this power be protected from cyber threats. Explore the risks and challenges of safeguarding the systems that power our digital world.

Follow the Money (2:05 p.m. - 3:30 p.m.)

From cyber liability insurance to blockchain forensics, understand which options are effective for preventing, reducing, and recovering financial losses.

2:05 PM

Take a guided tour through a blockchain investigation to understand how cryptocurrency transactions connect to real-world entities. Explore how tracking blockchain payments can not only identify those responsible for an attack but ultimately disrupt the ransomware supply chain.

2:35 PM

At first glance, cyber insurance—policies designed to mitigate the financial losses of a breach—seems an obvious addition to an enterprise’s security toolbox. But now, some threat actors are targeting cyber insurance holders. Walk through an in-depth review of the true protection, and cost, of cyber insurance.

3:00 PM

Stemming the tide of cybercrime requires a holistic solution addressing technology and policy. Explore the ways anti-money-laundering regulation can complement emerging technologies in preventing cybercrime.

MIT Inside Track (3:30 p.m. - 4:00 p.m.)

Join the Inside Track sessions to engage more deeply with our content, speakers, and your fellow attendees during mainstage programming breaks.

3:30 PM
Networking Break
3:35 PM

The implications of a cyber breach have elevated the discussion from an IT issue to the C-Suite. A new language is needed to impart the information needed at this level to make smart decisions on breach prevention and incident response.

Attribution and Breach Reporting (4:00 p.m. - 5:00 p.m.)

Identifying who is responsible for an attack matters. Unpack how shared breach reporting can strike a balance between business liability and the public good.

4:00 PM

Pinpointing the perpetrators is a crucial element in mounting a cohesive defense against cybercrime. Learn how to navigate attack attribution and share collective intelligence to prevent future attacks.

4:30 PM

Understanding existing and emerging cyber threats is paramount to establishing a strong defense against them. Threat actors are exploiting new vulnerabilities and attack vectors every day, and they are sharing expertise. Find out how businesses and government organizations can benefit from the visibility and transparency of centralized breach reporting and intelligence sharing.

Last Call with the Editors (4:55 p.m. - 5:05 p.m.)

Before we sign off for the night, join our last call with all of our editors to get their analysis on the day’s topics, themes, and guests.

Day 2: An Action Plan for Resiliency (10:00 a.m. - 5:15 p.m.)
European Community Spotlight (10:05 a.m. - 12:00 p.m.)

Take a deep dive into EU cyber policy and key findings from the European Cybercrime Centre to understand the implications for businesses inside and outside the European Union.

10:05 AM

Europe — like much of the world— continues to see increasingly sophisticated attacks coming from both inside and outside the EU. Unpack key findings from the EC3’s annual report on cybercrime that will help benchmark your current cybersecurity strategy, shape future practices, and enable more informed decision-making around technology investments and resource allocation.

10:30 AM

Get a guided tour of ENISA’s latest threat landscape report for insight into the most common cyberattack techniques and key trends, including the impact of the COVID-19 crisis. Come away with actionable insights to prepare your organization for emerging cyber threats and challenges.

11:00 AM

Understand the advantages and requirements of cloud-based security, including the impact of zero trust frameworks and what this means for regulated industries like financial services. Come away with cybersecurity transformation advice, including the evolution of control, risk, and governance for cloud.

11:25 AM
Networking Break
The Technology of Cybersecurity (12:00 p.m. - 1:25 p.m.)

Technologies like artificial intelligence can identify patterns or irregularities to highlight vulnerabilities. Discover the latest tools to incorporate into your cyber-resiliency toolkit.

12:00 PM

Explore the technological advancements that are paving the way for a more secure future. Examine the benefits and drawbacks of AI for cybersecurity, and learn how other emerging technologies can defend against disinformation and computational propaganda.

12:30 PM

Recent high-profile cyberattacks against the nation’s critical infrastructure have resulted in not only financial loss and stolen data, but also supply chain disruptions and threats to human safety. Get actionable steps for detecting, investigating, and mitigating both known and unknown attacks at their earliest stages – before the damage is done.

12:55 PM

Over 80% of data breaches leverage weak or stolen passwords. As a result, such passwords create the single biggest security risk an organization faces. Explore options for eliminating passwords, such as advancements in biometrics, that maintain employee privacy and confidentiality.

MIT Inside Track (1:25 p.m. - 1:55 p.m.)

Join the Inside Track sessions to engage more deeply with our content, speakers, and your fellow attendees during mainstage programming breaks.

1:25 PM
Networking Break
1:30 PM

Machine learning-based cybersecurity is only as good as the detection models it’s based on. This session looks at requirements and best practices for maintaining detection logic to keep up with the increasingly complex and evolving nature of cyberattacks.

The Global Threat Landscape (1:55 p.m. - 3:30 p.m.)

With the global aspects of cybercrime, the current international situation is not sustainable. Criminal accountability requires cooperation across country lines.

1:55 PM

In this 5-part series from MIT Technology Review and ProPublica, we look at the money, people, and technology behind the explosion of ransomware that is delivering hundreds of millions of dollars to cybercriminals around the world. Meet the series host, Meg Marco, and get an inside look at the story behind the stories.

2:10 PM

Thwarting the rampant onslaught of cyberattacks has become an urgent priority and a matter of national security for government bodies across the world. Learn about the bold strategy the U.S. is adopting and what results it is achieving.

2:40 PM

In this no-holds-barred session, a former cybersecurity official with the U.S. Department of Homeland Security and current CSO of an international telecom provider discusses what needs to be done —at both the organizational and national level—to address the issue of global supply chain security. Get constructive take-aways for achieving a common, objective, and transparent basis for trustworthiness and accountability.

3:05 PM

Step through the unique challenges of holding cybercriminals accountable. One expert explains what it takes to find and prosecute hackers worldwide, from penetrating the cybercriminal underground in person to putting “boots on the ground” in countries that may be indifferent toward the crimes.

MIT Inside Track (3:30 p.m. - 4:05 p.m.)

Join the Inside Track sessions to engage more deeply with our content, speakers, and your fellow attendees during mainstage programming breaks.

3:30 PM
Networking Break
3:40 PM

Cybercriminals exploit both the lack of international cybercrime mandates and the existence of unregulated financial systems that enable anonymous transfer of funds. Examine the changes necessary to stem the tide of global cybercrime.

An Action Plan for Resiliency (4:05 p.m. - 5:15 p.m.)

Cyberattacks are becoming a “when, not if” reality. Get strategies for fixing security vulnerabilities and taking the critical first steps after a breach happens.

4:05 PM

Reinforce your organization’s security strategy with practical guidance on how to best prepare for the ever-evolving cyber threat landscape. Take away actionable steps to help you find and fix existing vulnerabilities.

4:35 PM

Will you know what to do when the unthinkable happens? Your first steps after you realize your organization's systems have been compromised can make all the difference in how your business recovers. Get a critical step-by-step guide to surviving a cyber crisis.

5:05 PM
Closing Remarks

Event partners

Partner with MIT Technology Review’s events

Partnering with MIT Technology Review makes a strong statement about your brand's commitment to thought leadership and ground-breaking innovation.

Interested in partnering with us?
Contact Andrew Hendler at 646-520-6981 or via email.