How to Run an Effective Cybersecurity Program

Cybersecurity was the top spending priority for CIOs in 2021, according to Gartner. Not all spending is equally effective, however. Whether you have an emerging cybersecurity program or a mature operation, there is always room to be more effective and efficient. Today’s top threats—including supply-chain attacks, ransomware, data breaches and more—can all be addressed through simple, low-cost techniques. In this fast-paced talk, we’ll step through the key elements of a highly successful cybersecurity program, including:
  • Information lifecycle management
  • High-impact security technologies, such as:
  • MFA
  • Patch management
  • Backups
  • EDR
  • Detection & monitoring
  • Continuous risk management
  • & more

We’ll wrap up with an easy-to-follow checklist that your organization can use as a foundation for running a strong, effective, and budget-friendly cybersecurity program.

Speakers


Matt Durrin
Director of Training and Research
LMG Security

Matt Durrin is the Director of Training and Research at LMG Security and a Senior Consultant with the organization. He is an instructor at the international Black Hat USA conference, where he has taught classes on ransomware and data breaches. Matt has conducted cybersecurity seminars, tabletop exercises and classes for thousands of attendees in all sectors, including banking, retail, healthcare, government, and more. He is also the co-author of a new book, Ransomware and Cyber Extortion: Response and PreventionA seasoned cybersecurity and IT professional, Matt specializes in ransomware response and research, as well as deployment of proactive cybersecurity solutions. Matt holds a bachelor’s degree in computer science from the University of Montana, and his malware research has been featured on NBC Nightly News.

Sherri Davidoff
Chief Executive Officer
LMG Security

Sherri Davidoff is the CEO of LMG Security and the author of three books, including “Ransomware and Cyber Extortion” and “Data Breaches: Crisis and Opportunity. As a recognized expert in cybersecurity, she has been called a “security badass” by the New York Times. Sherri is a regular instructor at the renowned Black Hat trainings and a faculty member at the Pacific Coast Banking School. She is also the co-author of Network Forensics: Tracking Hackers Through Cyberspace (Prentice Hall, 2012), and has been featured as the protagonist in the book, Breaking and Entering: The Extraordinary Story of a Hacker Called “Alien.” Sherri is a GIAC-certified forensic examiner (GCFA) and penetration tester (GPEN) and received her degree in Computer Science and Electrical Engineering from MIT.

CONTACT US