How to Run an Effective Cybersecurity Program

Cybersecurity was the top spending priority for CIOs in 2021, according to Gartner. Not all spending is equally effective, however. Whether you have an emerging cybersecurity program or a mature operation, there is always room to be more effective and efficient. Today’s top threats—including supply-chain attacks, ransomware, data breaches and more—can all be addressed through simple, low-cost techniques. In this fast-paced talk, we’ll step through the key elements of a highly successful cybersecurity program, including:
  • Information lifecycle management
  • High-impact security technologies, such as:
  • MFA
  • Patch management
  • Backups
  • EDR
  • Detection & monitoring
  • Continuous risk management
  • & more

We’ll wrap up with an easy-to-follow checklist that your organization can use as a foundation for running a strong, effective, and budget-friendly cybersecurity program.


Matt Durrin
Director of Training and Response
LMG Security

Matt Durrin is the Director of Training and Response for LMG Security, a Black Hat instructor, and the co-author of the upcoming book, “Ransomware and Cyber Extortion”. A seasoned forensics professional, Matt specializes in incident response, ransomware cases, cryptojacking, and banking trojans. He regularly conducts cybersecurity webinars and seminars for hundreds of attendees in all sectors, including banking, retail, health care, government and more.  Matt holds a Bachelor’s Degree in Computer Science from the University of Montana and previously worked as a “blue team” field technician/system administrator for over 10 years. His malware research has been featured on NBC Nightly News.

Sherri Davidoff
Chief Executive Officer
LMG Security

Sherri Davidoff is the CEO of LMG Security and the author of “Data Breaches: Crisis and Opportunity.” As a recognized expert in cybersecurity, she has been called a “security badass” by the New York Times. Sherri is a regular instructor at the renowned Black Hat trainings and a faculty member at the Pacific Coast Banking School. She is also the co-author of Network Forensics: Tracking Hackers Through Cyberspace (Prentice Hall, 2012), and has been featured as the protagonist in the book, Breaking and Entering: The Extraordinary Story of a Hacker Called “Alien.” Sherri is a GIAC-certified forensic examiner (GCFA) and penetration tester (GPEN) and received her degree in Computer Science and Electrical Engineering from MIT.  Her latest book, “Ransomware and Cyber Extortion,” will be published this year.