Business Risks 2022
Business Risks 2022: Cybersecurity Risk Management Conference
The rapidly evolving cybersecurity landscape presents operational challenges to all businesses, from start-ups to large corporations. Far beyond the technical challenges of keeping data secure, cyber-attacks create liability and regulatory compliance issues across the entire chain of vendor/client relationships.
The 2nd annual event will explore the business impact of cybersecurity with experts across multiple industries to help attendees understand cybersecurity trends, challenges and impact on business operations. What are the technology trends impacting cybersecurity today? How can organizations evaluate and mitigate exposure to threats, data loss and theft? What are the unique business risks to manufacturing organizations? How much cybersecurity insurance is necessary? How does cybersecurity risk affect my supply chain? Who are the cybersecurity service providers and where do they come from? These questions and more will be covered.
This conference is an in-person event, with an option for virtual attendance.
Who Should Attend?
- Manufacturing professionals
- Corporate compliance officers and risk managers
- Small businesses/startups
- Government contractors
- Cybersecurity service providers
- Students seeking real-world experience
Register by Feb. 14th for early bird pricing!
IN-PERSON attendance registration
VIRTUAL attendance registration
KEYNOTE SESSION #1: THE STATE OF CYBERSECURITY INVESTING
Venture capital investing has been at record levels. Cybersecurity is an area that is particularly active. This presentation will provide an overview of current venture investing trends as they pertain to cybersecurity. We’ll look both nationally as well as regionally — and take a look at what technologies areas are of most interest. In addition, we’ll touch on useful tips for effectively engaging with investors.
John Funge, Managing Director at DataTribe
John Funge is the Managing Director of DataTribe. He has co-founded and built three successful technology firms, all of which have been acquired by larger companies: Clara Vista acquired by CMGI (1999), Pickle.com acquired by Scripps Networks (2007), and BrightContext acquired by WealthEngine (2014).
John started his career as a software developer around the time the Mosaic browser was first released in the early 1990’s. His experience spans a wide range of markets including cybersecurity, digital media, telecommunications, television, healthcare, and disaster response. Earlier in his career, John has held management, sales and engineering roles at Sapient, Bell Atlantic and Pulse Technologies. Johns holds a BS in electrical engineering from Carnegie Mellon University and received an MBA from INSEAD.
KEYNOTE SESSION #2: THE ROLE OF CYBER INSURANCE IN MANAGING CYBER RISK IN MANUFACTURING COMPANIESCyber insurance is a relatively new insurance product and is rapidly maturing in an age of heightened security threats, ransomware, and business disruption. Organizations need to combine IT security, Industrial Control technology, and cyber insurance as part of an overall cyber risk management program to reduce their cyber exposures to an acceptable level. Meanwhile, cyber insurance is becoming more expensive and in some cases, not even offered if organizations do not meet the increasingly specific requirements of insurance companies for certain IT Security controls. In this session, learn how to best approach purchasing and managing cyber insurance in a highly disrupted market, and how to best use cyber insurance before, during, and after a cyber disruption with special considerations for manufacturing companies.
Dr. Phil Moulton, Director of Risk Management, Colfax
Dr. Philip’s professional mission is to help global companies manage risk better and improve their business decisions to sustainably create value. He is known for designing and implementing risk management programs, leading teams, facilitating workshops, presenting to Boards and Executive teams, collaborating with others across global organizations, and managing complex corporate projects. With a business career in both corporates and consulting firms, he has lived and worked in Australia, Singapore, the Netherlands, and the United States. He works in key areas of risk management including Enterprise Risk Management (ERM), Business Continuity Management (BCM), Insurance Program Leadership, Project Risk Management, and Cyber Risk Management. In 2020, Dr. Philip successfully defended a dissertation on cyber insurance purchasing by Risk Managers in the United States.
KEYNOTE SESSION #3: WELCOME TO THE DATA CARE INDUSTRY
The term “cybersecurity” must change with society. “Data Care” allows us to emphasize the concept of cybersecurity being a team sport, where everyone has a responsibility to take care of their data to keep it protected and private. Meanwhile, the federal government has implemented cybersecurity mandates across industries. These protocols are a necessary foundation for data care and should be bolstered by organizations’ own processes and cybersecurity measures just as they have been in healthcare. In this session, relevant cybersecurity history, a case study, discussion of board roles in cybersecurity, and data care best practices for businesses will be shared
Ron Gula, President at Gula Tech Adventures
Ron is President at Gula Tech Adventures which focuses on cyber technology, strategy and policy. Since 2017, GTA has invested in dozens of cyber start-ups and funds and supported multiple cyber nonprofits and projects. From 2002 to 2016, Ron was the co-founder and CEO of Tenable Network Security. He helped grow the company to 20,000 customers, raise $300m in venture capital and grow revenues to $100m, setting up the company for an IPO in 2018. Prior to Tenable, Ron was a cyber-industry pioneer and developed one of the first commercial network intrusion detection systems called Dragon, ran risk mitigation for the first cloud company, was deploying network honeypots in the mid-90s for the DOD and was a penetration tester for the NSA and got to participate in some of the nation’s first cyber exercises. Ron is involved in a variety of cyber nonprofits and think tanks including Defending Digital Campaigns, the Cyber Moonshot, the National Security Institute and the Wilson Center.
Click here for the full conference agenda!
INTERESTED IN BEING A VENDOR/SPONSOR FOR THE EVENT? PLEASE EMAIL INFO@ADVANTAGE-C.COM FOR INFORMATION. OPPORTUNITIES ARE OUTLINED BELOW.
PLATINUM $1,000 (3 available)
- Opportunity to introduce self and organization from podium during the conference (3 minutes) or pre-recorded video to be shared
- Company logo and link on conference website
- Company recognition by program facilitators
- Logo electronically displayed throughout the conference
- 6’ skirted vendor table with two chairs at conference (includes registration for up to two reps) in main conference area
- Lunch at the conference for up to two reps who are manning the exhibit table
PANEL $500 (SOLD OUT)
- Company logo and link on conference website
- Company recognition by panel moderator (prior to panel discussion)
- Logo electronically displayed throughout the conference
- 6’ skirted vendor table with two chairs at conference (includes registration for up to two reps) in main conference area
- Lunch at the conference for up to two reps who are manning the exhibit table
TRIVIA $250 (2 available)
- Company logo and link on conference website
- Registration for one company representative
- Lunch at the conference for named representative
VIP EVENT $2,500 (SOLD OUT)
- Opportunity to introduce self and organization at VIP Event (3 minutes)
- Company logo and link on conference website
- Company recognition by program facilitators
- 6’ skirted vendor table with two chairs at conference in main conference area
- Logo electronically displayed throughout the conference
- 6 tickets to conference and VIP Event (6 drink tickets per VIP Event registration)
Thank You To Our Event Sponsors
Platinum Sponsors
Panel Sponsors
Trivia Sponsors