The tactics of cyberwarfare are constantly changing, and methods to counter attacks must adapt to keep pace. At the 2014 North America Information Security and Risk Management (ISRM) conference, 19-21 November 2014, at Caesars Palace in Las Vegas, Nevada, USA, global IT association ISACA will equip security professionals with guidance to help defend and protect their organizations.
Keynote Speaker Curtis KS Levinson, CDP, CISSP, MBCP, CCSK, United States cyber defense advisor to NATO, will present “Digital Doomsday—What Happens to Facebook If the World Ends?” Levinson has more than 25 years of experience in cybersecurity, information governance and continuity of operations. He has served two US presidents, two chairmen of the Joint Chiefs of Staff, and the chief justice. Additionally, he has been selected by the North Atlantic Treaty Organization (NATO) to represent the US as an advisory subject matter expert on cyber defense. Levinson will help attendees prepare for the inevitable and look at how fighting the cybersecurity battle involves learning, adapting and using intelligence and creativity.
“The methods and tools of warfare have changed, yet the paradigm of the warfighter has not,” said Levinson. “At ISACA’s North America ISRM conference, I will urge attendees to act quickly and decisively to secure the foundations of our electronic society.”
Also keynoting is Alec Ross, former Hillary Clinton advisor and author, who will share “Lessons from the Cyber Battlefield.” Ross was a senior advisor to Clinton when she was secretary of state. In that role, he advanced the State Department on issues including Internet freedom, cybersecurity, disaster response and the use of network technologies in conflict zones. He will discuss how the weaponization of code has turned the Internet into a battlefield, and the best strategies to protect against cyberattackers.
“Cyberthreats are costing us billions and we need updated strategies to arm our enterprises against cyberpredators,” said Ross. “I look forward to the opportunity at this conference to share strategies and gain the upper hand in protection of our information and systems.”
The conference will cover the latest topics in information security and risk management in the following tracks: Compliance, Privacy, Risk Management and Cybersecurity.