Tuesday, November 16

Day 1: Ransomware Response (12:00 p.m. - 5:30 p.m.)
Ransomware Response (12:10 p.m. - 1:30 p.m.)

Increased ROI and limited accountability have made cybercrime explode. Explore the tools and technologies needed to dismantle the ransomware ecosystem.

12:10 p.m.
Anatomy of a Breach

Get a firsthand account of the landmark SolarWinds cyberattack, from the first moments of discovering the breach to the ways the organization is shoring up security practices in the aftermath. Glean practical takeaways and hard-won lessons from a cyberattack survivor.

12:35 p.m.
Ransomware: To Pay or Not To Pay

Cyberattack victims face an agonizing decision: pay the ransom to recover your data, which could encourage future attacks, or refuse and accept consequences that may include a financial loss higher than the ransom. Evaluate the options with expert advice from a U.S. Secret Service special agent.

1:05 p.m.
Meet the Ransomware Slayer

Living in seclusion, and routinely receiving death threats from cybercriminal gangs, Fabian Wosar remains undeterred from his mission: developing and deploying tools to fight ransomware. In this one-of-a-kind, protected conversation, find out how his decryption efforts have stymied over a billion dollars’ worth of cybercrime.

MIT Inside Track (1:30 p.m. - 2:00 p.m.)

Join the Inside Track sessions to engage more deeply with our content, speakers, and your fellow attendees during mainstage programming breaks.

1:30 p.m.
Networking Break
1:35 p.m.
Cybersafety: Protecting Power

Without power, our digital world goes dark. It is essential that the systems that generate this power be protected from cyber threats. Explore the risks and challenges of safeguarding the systems that power our digital world.

Follow the Money (2:00 p.m. - 3:15 p.m.)

From cyber liability insurance to blockchain forensics, understand which options are effective for preventing, reducing, and recovering financial losses.

2:00 p.m.
Deconstructing Cybercrime Through Blockchain Forensics

Take a guided tour through a blockchain investigation to understand how cryptocurrency transactions connect to real-world entities. Explore how tracking blockchain payments can not only identify those responsible for an attack but ultimately disrupt the ransomware supply chain.

2:30 p.m.
Is Cyber Liability Insurance... a Liability?

At first glance, cyber insurance—policies designed to mitigate the financial losses of a breach—seems an obvious addition to an enterprise’s security toolbox. But now, some threat actors are targeting cyber insurance holders. Walk through an in-depth review of the true protection, and cost, of cyber insurance.

2:55 p.m.
Unsung Disruptors: Money-laundering Laws

Stemming the tide of cybercrime requires a holistic solution addressing technology and policy. Explore the ways anti-money-laundering regulation can complement emerging technologies in preventing cybercrime.

MIT Inside Track (3:15 p.m. - 3:50 p.m.)

Join the Inside Track sessions to engage more deeply with our content, speakers, and your fellow attendees during mainstage programming breaks.

3:15 p.m.
Networking Break
3:25 p.m.
Cybersecurity in the C-Suite

The implications of a cyber breach have elevated the discussion from an IT issue to the C-Suite. A new language is needed to impart the information needed at this level to make smart decisions on breach prevention and incident response.

Attribution and Breach Reporting (3:50 p.m. - 5:25 p.m.)

Identifying who is responsible for an attack matters. Unpack how shared breach reporting can strike a balance between business liability and the public good.

4:15 p.m.
4:45 p.m.
Does Attribution Matter?

Pinpointing the perpetrators is a crucial element in mounting a cohesive defense against cybercrime. Learn how to navigate attack attribution and share collective intelligence to prevent future attacks.

5:10 p.m.
The Case for Threat Intelligence Sharing

Understanding existing and emerging cyber threats is paramount to establishing a strong defense against them. Threat actors are exploiting new vulnerabilities and attack vectors every day, and they are sharing expertise. Find out how businesses and government organizations can benefit from the visibility and transparency of centralized breach reporting and intelligence sharing.

Last Call with the Editors (5:25 p.m. - 5:30 p.m.)

Before we sign off for the night, join our last call with all of our editors to get their analysis on the day’s topics, themes, and guests.

Wednesday, November 17

Day 2: An Action Plan for Resiliency (10:00 a.m. - 5:05 p.m.)
10:00 a.m.
Welcome Remarks
European Community Spotlight (10:05 a.m. - 12:00 p.m.)

One of the challenges of cybercrime is that while organizations operate under regional laws, cybercriminals know no borders. Examine a variety of topics from a European perspective, and see how information sharing across borders is good for both national and international interests.

10:05 a.m.
Combating Cybercrime in the EU and Beyond

Europe — like much of the world— continues to see increasingly sophisticated attacks coming from both inside and outside the EU. Unpack key findings from the EC3’s annual report on cybercrime that will help benchmark your current cybersecurity strategy, shape future practices, and enable more informed decision-making around technology investments and resource allocation.

10:30 a.m.
A Harmonized Approach to Cybersecurity Across Europe

Get an overview of EU cyber policy and find out how ENISA contributes to it by fostering cooperation and information sharing across Member States. Discuss EU cybersecurity schemes, certifications, and frameworks, and understand their implications for businesses inside ---and outside of--- the European Union.

11:30 a.m.
Networking Break
The Technology of CyberSecurity (12:00 p.m. - 1:25 p.m.)

Technologies like artificial intelligence can identify patterns or irregularities to highlight vulnerabilities. Discover the latest tools to incorporate into your cyber-resiliency toolkit.

12:00 p.m.
Technologies to Combat Emerging Security Threats

Explore the technological advancements that are paving the way for a more secure future. Examine the benefits and drawbacks of AI for cybersecurity, and learn how other emerging technologies can defend against disinformation and computational propaganda.

12:30 p.m.
Defending Critical Infrastructure From Cyberattacks

Recent high-profile cyberattacks against the nation’s critical infrastructure have resulted in not only financial loss and stolen data, but also supply chain disruptions and threats to human safety. Get actionable steps for detecting, investigating, and mitigating both known and unknown attacks at their earliest stages – before the damage is done.

1:00 p.m.
Securing your People

Over 80% of data breaches leverage weak or stolen passwords. As a result, such passwords create the single biggest security risk an organization faces. Explore options for eliminating passwords, such as advancements in biometrics, that maintain employee privacy and confidentiality.

MIT Inside Track (1:25 p.m. - 1:55 p.m.)

Join the Inside Track sessions to engage more deeply with our content, speakers, and your fellow attendees during mainstage programming breaks.

1:25 p.m.
Networking Break
1:30 p.m.
The Intersection of Machine Learning and Cybersecurity

Machine learning-based cybersecurity is only as good as the detection models it’s based on. This session looks at requirements and best practices for maintaining detection logic to keep up with the increasingly complex and evolving nature of cyberattacks.

The Global Threat Landscape (1:55 p.m. - 3:10 p.m.)

With the global aspects of cybercrime, the current international situation is not sustainable. Criminal accountability requires cooperation across country lines.

1:55 p.m.
The United States Global Cyber Defense Posture

Thwarting the rampant onslaught of cyberattacks has become an urgent priority and a matter of national security for government bodies across the world. Learn about the bold strategy the U.S. is adopting and what results it is achieving.

2:25 p.m.
Boosting International Collaboration on Cybercrime

The rise in cross-border cyberattacks has become a tipping point for the federal government’s move towards a zero-trust strategy. But is that a good thing? And is it enough to combat international cybercrime? Get both sides of the story from a former cybersecurity official with the U.S. Department of Homeland Security and current CSO of an international telecom provider.

2:50 p.m.
Putting Handcuffs on Hackers

Step through the unique challenges of holding cybercriminals accountable. One expert explains what it takes to find and prosecute hackers worldwide, from penetrating the cybercriminal underground in person to putting “boots on the ground” in countries that may be indifferent toward the crimes.

MIT Inside Track (3:10 p.m. - 3:45 p.m.)

Join the Inside Track sessions to engage more deeply with our content, speakers, and your fellow attendees during mainstage programming breaks.

3:10 p.m.
Networking Break
3:20 p.m.
Confronting Global Cybercrime

Cybercriminals exploit both the lack of international cybercrime mandates and the existence of unregulated financial systems that enable anonymous transfer of funds. Examine the changes necessary to stem the tide of global cybercrime.

An Action Plan for Resiliency (3:45 p.m. - 5:05 p.m.)

Cyberattacks are becoming a “when, not if” reality. Get strategies for fixing security vulnerabilities and taking the critical first steps after a breach happens.

3:45 p.m.
Identifying and Addressing Security Vulnerabilities

Reinforce your organization’s security strategy with practical guidance on how to best prepare for the ever-evolving cyber threat landscape. Take away actionable steps to help you find and fix existing vulnerabilities.

4:15 p.m.
Preventing Cyberattacks in a Connected World

Cybercriminals are exploiting the security vulnerabilities associated with tech advances like AI and machine learning, IoT, and 5G. Understand what’s required to strengthen your cybersecurity strategy to keep pace with tech-savvy cybercriminals and protect your data from getting into the wrong hands.

4:40 p.m.
First Response: Surviving a Cyberattack Crisis

Will you know what to do when the unthinkable happens? Your first steps after you realize your organization's systems have been compromised can make all the difference in how your business recovers. Get a critical step-by-step guide to surviving a cyber crisis.

5:00 p.m.
Closing Remarks