Get an inside look at the daily life of a CISO, hear their advice for advancing your cybersecurity career, and get their point of view on the most pressing issues in the industry.
Lorem ipsum dolor sit amet consectetur. Feugiat purus non hendrerit blandit amet adipiscing dui. Et molestie aliquet gravida interdum non molestie enim. Lacus leo nunc dui sapien pharetra felis mi. Sed cursus pellentesque nibh ut. Molestie leo vivamus porttitor erat at libero nibh. Vestibulum scelerisque vel pharetra pellentesque ullamcorper et. Quis neque accumsan orci sed ligula phasellus sed.
Et urna ac et maecenas fusce amet. Nibh nec commodo massa sed. Tincidunt porttitor in pharetra egestas sit neque ac lacus. Amet a nunc et cum. Odio at volutpat volutpat in leo eget ipsum diam elementum. Erat magna arcu orci lorem senectus orci fringilla. Tincidunt metus nisl vitae maecenas pretium aliquet. At id pharetra in vestibulum lectus pellentesque venenatis molestie. Nibh ut facilisis.
Lorem ipsum dolor sit amet consectetur ac quis et pellentesque et id faucibus hac facilisis nisi quam euismod pellentesque id est integer felis ac quis vel molestie tristique justo ultricies dui quis tortor hendrerit quam turpis feugiat fames dictumst eu sagittis augue semper euismod.
Get an inside look at the daily life of a CISO, hear their advice for advancing your cybersecurity career, and get their point of view on the most pressing issues in the industry. One twist: these questions will be asked from the perspective of a SOC analyst.
Moderated by Rachelle Mansilungan, IT Security Engineer, Security Operations, HMSA
•Rick Holland, CISO, Reliaquest
• Olivia Rose, CISO and Founder, Rose CISO Group
• Carraig Stanwyck, VP, Global Cybersecurity and Compliance, Avnet
• Michael Meis, Associate CISO, University of Kansas Health System
John Hammond will step you through what a day as a cyber defender would have looked like if you were working the 3CX supply chain attack that occurred in 2023.
This session will review AI use cases, the pros and cons of AI and large language models, how threat actors are using AI in their attacks, and what your security team needs to reap its benefits.