• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360 2021
    • Student360
    • Past Events
      • 2020 Secure360 Twin Cities
      • 2020 Student360
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Beyond the Checkbox

Key Learning Points

  1. How current compliance efforts can be leveraged
  2. Forward-thinking concepts to make the target on your back harder to hit
  3. Demographics of companies falling victim to cyber-attacks
  4. Compromised companies are compliant or very close to compliance
  5. Organizations need to think beyond the checkbox to foster a sound, adaptive cyber security program.

Level: Intermediate

When looking at the demographics of companies falling victim to cyber-attacks, it’s apparent attackers do not discriminate. Every company in all industries are now fair game; each with their own target painted on their backs. The US companies are especially attractive for those foreign adversaries looking to siphon intellectual property and other sensitive data for use on black markets or to gain competitive advantages.  But what you may also pick up on is that many of these compromised companies are compliant or very close to compliance; with some control failures here and there.    Successful compliance programs establish a solid foundation for which organizations need to think beyond the checkbox to foster a sound, adaptive cyber security program.  As many compliance mandates result from some adverse event or malicious activity, companies must establish cyber security programs in response to a cyber-threat landscape that has no end in sight.  This session will not only cover how current compliance efforts can be leveraged to begin building a cyber-security program, but to also discuss some forward-thinking concepts to make the target on your back harder to hit than the company next to you.

About Bob Swanson

 

Bob Swanson is a Compliance Engineer with LogRhythm Labs where he focuses on developing compliance LogRhythm Logopackages according to new regulations, assisting customers in meeting compliance obligations while leveraging the LogRhythm solution to establish cyber security programs.  He has over 5 years of experience in both internal and external IT auditing for Deloitte and Touche, LLP as well as building a risk-based, IT compliance program around SOX, HIPAA and PCI-DSS requirements.   His compliance understanding expands into various areas according to customer’s needs to meet an ever changing compliance environment including, but not limited to: NERC-CIP, NIST 800-53, NIST-CSF, ISO 27001, GPG-13, etc.

Primary Sidebar

Details

Tuesday May 12, 2015
11:00 AM - 12:00 PM
Room 3

Share this page

Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Share on LinkedIn
Linkedin
Buffer this page
Buffer
Email this to someone
email

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2021 Secure360. All rights reserved.