WEDNESDAY, OCTOBER 7, 2020
LEGISLATIVE UPDATE
Every week, the Chamber will serve up what’s happening now and how you can plan for what’s next. In this one-hour session, experts will be diving into cyber legislation, with a focus on the U.S. Cyberspace Solarium Commission recommendations. Released in March, many of the Commission’s recommendations were included in the FY 2021 National Defense Authorization Act (NDAA). This panel will discuss the importance of these recommendations and their legislative proposals and how they advance a new strategic approach to national cyber defense, emphasizing layered cyber deterrence. Our expert panelist will forecast which provisions will ultimately be adopted during the NDAA conference, what they will mean for the business community, and how they can unleash new enterprise cybersecurity resources.
WEDNESDAY, OCTOBER 14, 2020
GLOBAL SUPPLY CHAIN CYBERSECURITY
Cybersecurity is a supply chain issue. This one-hour session will explore the smart development of viable approaches and solutions to identifying trusted suppliers and steps that can be taken to ensure that your organization does not pose a cyber threat to those you provide goods or services to, and how you can evaluate your third-party partners and protect yourself.
WEDNESDAY, OCTOBER 21, 2020
CYBERSECURITY CLOUD
Global business are quickly pursing and fiercely innovating new commercial solutions leveraging cloud as a platform, software, or infrastructure. Over the past several months, use of cloud infrastructure has skyrocketed in the work from home and remote operations environment. According to one industry estimate, use of cloud service providers has increased by over 700% during the COVID-19 pandemic. At the same time, and predating the pandemic, there has been a rise of data privacy laws, localization, or cybersecurity rules, regulations, certifications, or statues focused on cloud services providers. This program will discuss the changing cybersecurity policy landscape for cloud service providers, with a view towards promoting global alignment and mutual recognition of cloud cybersecurity measures. Within the cloud context, experts will also touch on approaches to data localization and data flows that balances data driven innovation with safety and security.
FRIDAY, OCTOBER 23, 2020
ICT SUPPLY CHAIN RISK MANAGEMENT TASK FORCE YEAR-TWO REPORT ROLLOUT
In October 2018, the Cybersecurity and Infrastructure Security Agency (CISA) launched the Information and Communications Technology (ICT) Supply Chain Risk Management (SCRM) Task Force, a public-private partnership to provide advice and recommendations to CISA and its stakeholders on means for assessing and managing risks associated with the ICT supply chain. Today’s program will discuss the year two reports findings, recommendations, and discuss the next steps.
WEDNESDAY, OCTOBER 28, 2020
ARTIFICIAL INTELLIGENCE
Should business leaders be thinking seriously about the role of artificial intelligence (AI) in enterprise security strategy? This session will discuss the benefits of combine the strength of AI with cybersecurity, and approaches to how security professional can leverage AI, in addition to traditional security measures deployed in each organization’s architecture, to defend vulnerable networks and data form cyberattackers.
THURSDAY, OCTOBER 29, 2020
LOGISTICAL CHALLENGES OF VACCINE DISTRIBUTION
The world awaits anxiously for a vaccine to the COVID-19 virus, but what happens once we have it? Please join us for a discussion with senior business and government leaders that explores the logistical, manufacturing, and distribution challenges of delivering vaccines to 7.8 billion people – including ensuring a sufficient supply of hypodermic needles, keeping vaccines from spoiling, how to deliver the vaccine globally, and why pharmaceutical companies are mass producing vaccines that are still being developed. These are some of the topics that will be discussed during this Now + Next virtual event.
MONDAY, NOVEMBER 9, 2020
SANDWORM
Talk about an organization that has been written about that is behind several high-profile cyber incident. This organization, and others like it, are still operating. The importance of companies fighting against nation states. How can companies work with each other, their ISACs, and government agencies work together? If these institutions were working together, could they have prevented largescale attacks like NotPetya. The importance of public attribution by like-minded governments to publicly attribute nation state sponsored attacks on critical infrastructure that violate well establish cyber norms. Cyber enabled physical destruction. Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers by Andy Greenberg.