The Attacker’s POV: How to Build the Right Continuous Threat Exposure Management (CTEM) Program to Reduce Risk

Executive Event

October 10, 2024 - Seattle, WA

Visionaries

Harald Upegui HealthPoint (CHC)
Harald Upegui

Director of Information Security

HealthPoint (CHC)

Dinner

Experienced Security Officer with a demonstrated history of working in the hospital & health care industry. Skilled in Computer Repair, Software Documentation, Healthcare, Business Process Improvement, IT Operations, and Troubleshooting. Strong customer service, positive thinker, and problem solver professional with a Masters of Information Systems focused in Business and Technology Integration from University of Phoenix.

Steve Zalewski Levi Strauss & Co.
Steve Zalewski

Former CISO

Levi Strauss & Co.

Dinner

Mr. Zalewski currently provides CISO, security consulting and security advisory services. These include: • International cybersecurity advisor and trainer. • Executive advisory board member for security startups, providing guidance on security market direction and product requirements. • CISO advisory board member for venture capital firms internationally. • vCISO for companies requiring temporary or part-time CISO expertise. Services also include guidance and solutions to address incident response, security program design, security assessment, security due-diligence, vendor/supplier due-diligence, security architecture review, board reporting and other key security leadership requirements. Operational experience in Healthcare, Utilities and International Retail verticals. Key Strengths: •Organizational Management •Strategic Planning & Execution •Enterprise Security Architecture/Strategy •Executive and BOD Security Governance/Reporting •Cybersecurity Incident Response •Security Risk & Compliance Management Additionally, I co-hosts the CISOSeries Defense-in-Depth Podcasts and am a frequent speaker and panel moderator at industry events.

October 10, 2024

Agenda

All times Pacific Time

5:30 PM-9:00 PM

The Attacker’s POV: How to Build the Right Continuous Threat Exposure Management (CTEM) Program to Reduce Risk

Today’s cybersecurity leaders are under constant pressure to demonstrate their ability to manage risks effectively. With threats constantly evolving, companies need dynamic strategies to mitigate risks, especially in the cloud. This session will explore how CISOs can use Cyber Threat Exposure Management (CTEM) to stay ahead of threats and maintain strong security by analyzing attack methods and threat actor behavior. The only way security practitioners can effectively manage the ever-changing threat landscape and maximize defensive strategies is by leveraging automation, orchestration, and continuous, evidence-based validation of the tools and technologies deployed in their enterprise environment. Effective threat management must be an ongoing, continuous, and integrated service, not just a one-time analysis or isolated mitigation effort.

In this session, attendees will learn about: Generating an effective organizational threat profile Identifying the threat actors and adversarial TTPs that pose the greatest risk to your organization Understanding the business and security risks of threat exposure Gathering meaningful metrics to develop the business case for enhanced cybersecurity Developing a threat management program that is continuous, efficient, and proactive


Together With