CFP closed at  August 06, 2022 14:45 UTC

Global CISO Forum

Are you ready to lead in the Hackerverse?

Let’s talk about how the lines between our physical and digital selves are beginning to blur and have been for years now.

Space Invaders gave way to Packman and Galaga, which gave away to Atari. Then, it was companies like Activision that put us in the player’s seat in our own living rooms. Blink and it’s the video game revolution where Nintendo battled with Sega and Sony came out with the PS2 and then Microsoft joined the race with the X Box.

Soon the Sims give way to Second Life, and before you know it Bitcoin is all the buzz and corporations, as well as the financial industry are pouring billions into the Blockchain! Blink and Hollywood jumps on board and brings “Ready Player One” to the average person, demonstrating how a person can exist in both a real and a virtual reality. Today people of ages ranging from toddlers to grandparents experience VR and AR via Oculus and other hardware; and again, right at home!

You get the point. Let’s flash forward to today and look back over the past 15 years where literally trillions of dollars have been lost to cyberattacks. There are no attack surfaces that are safe, from Industrial Control Systems, web apps, servers, to even game consoles. In recent news, more than $600M in cryptocurrency was stolen in a single video game hack.

What is the Hackerverse? Life, the Universe, and Everything… hacked. The fact is, we are now and have been living in the Hackerverse. Our everyday realities are becoming more virtual, as protocol upon protocol and layer upon layer of abstraction are stacked upon each other.

The more dependent we and our companies become on our virtual reality the more susceptible we’ll be to malicious hackers. From “War Games” to “Ready Player One,” the question, “Shall we play a game?” is as ominous today as it was in 1983. The Hackerverse is ever-present and whether you choose to play or not, you are already in the game.

CFP Description

Global CISO Forum 2022 is accepting talk submissions that meet the following criteria:

  1. Advanced cybersecurity topics on any area of the industry.
  2. No pitches, no marketing, no buzzwords, no hype.
  3. No general “this is why cybersecurity is important” or “look how scary ransomware is” kind of talks. Our audience is full of cybersecurity experts - don’t explain the basics.

Here are some recommended topics about which our speaker committee is interested in seeing submissions:

  1. Forecasts - what does the next five years look like for security?
  2. Moving beyond GRC
  3. Talks on things that went wrong - tell us your story about a failure! Walk us through what happened, why it happened, and what you did to fix it for next time.
  4. Identity management
  5. Changing regulations from a data protection and privacy perspective. There will be a lot of changes over the next six to twelve months and understanding the impact on security programs will be a huge topic. With more regulations comes inconsistencies between the various laws. Sometimes they conflict between countries, states, industries. How are CISOs supposed to stay up to date and approach a highly regulated job? How to you adjust to changing laws and regs.
  6. The trend toward audits for privacy laws
  7. Navigating stakeholders - CISOs have more visibility at the board level. How do you answer the tough questions? Horror stories about bombed board presentations would be very interesting!
  8. Third, fourth, and fifth party risk management - how deep does your program go?
  9. Open source and zero days - software development companies are part of your supply chain
  10. The need for DevSecOps
  11. How are you coping with the huge increase in the number of vulnerabilities we see each month along with the decrease in time of exploitation?
  12. Visibility into your environment - do you know who is in your organization?
  13. How are you solving for the shortage of skilled workers?

Please use tags when submitting to help us organize a well-rounded event.