theme.jpg

CSO100 - Theme For 2022

Cybersecurity 2022: Business Risk at the Brink

The explosion of ransomware, zero-day attacks, third-party breaches, along with long-term remote work concerns and the integration of operational technology with IT systems have culminated into a crisis of confidence for IT security leaders. Nine out of 10 IT and security leaders believe their organization is falling short in addressing cyber risks, according to IDG’s 2021 Security Priorities Study. In response, they’re implementing best practices for proactive security strategies, investing in hardware and software to better protect sensitive data, and increasing security awareness of employees through training. In many cases, they’re moving to outsource security. 
Evolved threats to critical infrastructure and human implants will increasingly blur the distinction between cyber and physical attack, resulting in offline destruction and physical injury. Moreover, increasing incorporation of augmented and virtual reality technologies into daily life has the potential to result in cybercrimes which entail psychological harm to individuals. 


The IT threat landscape continues to grow broader and more complex, and it’s weighing on security leadership, who overwhelmingly believe that their organization is falling short addressing cyber risks as ransomware and other attacks increase, employees continue to fall for phishing scams and leadership isn’t convinced of the severity of the situation. In response, they’re launching new offensives to be better prepared to respond to the next unexpected security incident, to better protect sensitive and confidential data, and to improve security awareness of employees through training. They’re looking at an arsenal of new solutions, including zero trust and SOAR solutions, as well as increased security and awareness training for employees, and outsourcing of more security functions.

The symposium will broadly discuss on:

  • The Innovation Imperative Conversation on Risk Leadership and Innovation

  • Defensive Strategies and How to Anticipate Threats, Strategies for Ransomware, Fraud, Talent

  • Securing Remote Work, Applications

  • Managing Supply Chain and Third-Party Risks