MITIGATING GLOBAL SUPPLY CHAIN THREATS WITH INTEROPERABILITY — FROM THREATS TO RESPONSE
At the speed our cyber threat landscape is evolving, dealing with the latest sophistication and dynamics requires you to apply a strategy efficiently and effectively to drive smarter security processes, uniting all resources behind a common defense and taking decisive action to keep your organization on course.
OASIS Open and The National Council of ISACs team up to bring you a two-day virtual cybersecurity program focused on interoperability strategies to help mitigate threats to one of our most critical global areas — Supply Chains.
The event will include a diverse hand-picked group of global cybersecurity experts that will share their views on the right combination of measures needed to ensure your cybersecurity strategy confidence reaches that next level.
Through a mixture of interactive panel discussions and presentations, you’ll hear how you can be part of the global collaboration effort and learn actionable advice needed to avoid being the next target.
Who Should Attend?
Borderless Cyber brings together cyber security and threat intelligence experts from industry, government agencies, academia as well as thought leaders to share experiences, debate, and collaborate on strategies, tactics, and practices that accelerates the speed and scale of cyber defense. This includes C-suite executives, threat intel and cyber security managers, and technical representatives from various disciplines, such as security teams, commercial security vendors, open-source security developers, CSIRTs, researchers and maintainers of open security standards.
About Borderless Cyber
Borderless Cyber is an international conference series that began in 2015. It’s designed to bring together the public and private sectors to evaluate, debate, and collaborate on cybersecurity best practices and solutions. Hosted by the OASIS Open Consortium, previous Borderless Cyber events were held in partnership with The World Bank in Washington, D.C., with the European Parliament in Brussels, with Keio University in Tokyo and with FIRST.org in Prague. The last few USA conferences were held at the U.S. Customs House in New York City and at The World Bank and National Press Club in Washington, D.C.
View some of our past Borderless Cyber events: BC-World Bank | BC-National Press Club
About Online Platform: QiqoChat
QiqoChat (Qiqo) provides a social wrapper around Zoom meetings so that participants can move themselves in and out of different Zoom breakout spaces. This creates a vibrant & empowering online event/conference experience that replicates the freedom of movement that participants have at in-person events. Participants can make choices in real time about which breakout, panel, or meeting they wish to attend.
*EDT time zone
Cybersecurity Plug Fest (OpenC2 & SBOM) | Tuesday, 22 June
STIX 2.1 Workshop | Tuesday, 22 June
|WEDNESDAY, 23 JUNE|
|8:00||Sign-in and help desk|
|9:00||Welcome remarks from the conference organizers |
Guy Martin, Executive Director, OASIS Open
Scott Dickerson, Executive Director, Maritime Transportation System ISAC
|9:30||Keynote: The journey to securing our software supply chains (SBOM) |
Allan Freidman, Director Cybersecurity Initiatives, U.S. Department of Commerce, NTIA
|10:15||Keynote: Product security risks & supplier trust in third party supply chain|
Cassie Crossley, Director Product & Systems Security, Schneider Electric
|11:00||Special Guest Panel: Collaborating for supply chain security: Insights from the ICT Supply Chain Risk Management Taskforce Chairs|
Robert Mayer, Senior Vice President – Cybersecurity, USTelecom Association and Co-Chair, DHS ICT Supply Chain Task Force
John Miller, Senior Vice President of Policy and General Counsel, Information Technology Industry Council (ITI) and Co-Chair, DHS ICT Supply Chain Task Force
Bob Kolasky, Director, DHS National Risk Management Center
|12:00||Break for lunch|
|13:00||Do “Buy American” provisions help enhance supply chain security?|
Christopher Wlaschin, Vice President, Systems Security, Election Systems & Software
|14:00||Trusting the ingredients: Healthcare Software Bill Of Materials (SBOM) proof of concept|
Jennings Aske, Chief Information Security Officer, New York Presbyterian Hospital
|14:40||Panel: Unique perspectives on the best ways to mitigate supply chain disruption|
|15:50||Defending against next-gen attacks |
James Cabe, Cybersecurity Leader, CyberX a Microsoft Company
|16:30||DBOM and efforts underway with regards to supply chain integrity/assurance|
|17:00||Conference closes for the day|
|THURSDAY, 24 JUNE|
|8:00||Sign-in and help desk|
|9:00||Importance of collaboration at all levels|
|9:40||Cybersecurity open standards working together to tackle ransomware hacks (using the recent Colonial Pipeline as an example), featuring STIX, OpenC2, CACAO playbooks|
Jane Ginn, Co-Founder, Cyber Threat Intelligence Network (CTIN)
David Lemire, Systems Engineer, Huntington Ingalls Industries, Inc.
|10:50||Standardization supporting EU Cybersecurity Act|
|11:30||From self-attestation to certification: Understanding Cybersecurity Maturity Model Certification (CMMC) and how it impacts your company|
Jeff Troy, President, CEO, Aviation Information Sharing and Analysis Center (A-ISAC)
Peder Jungck, General Manager Intelligence Solutions, BAE Systems
Bob Dix, Senior Vice President- Strategy & Public Policy at Information Technology Acquisition Advisory Council (IT-AAC ) and Co- Chair, CMMC Center of Excellence
|12:30||Break for lunch|
|13:30||Global reaction: How CERTs reacted to recent SolarWinds hack|
|14:25||The latest from an open ecosystem where cybersecurity products interoperate without the need for customized integrations|
|15:25||Keynote: Joshua Corman, Senior Advisor and Visiting Researcher, |
|16:05||Preparing for next SolarWinds event|