Cyber threats are evolving at a rapid pace, posing significant financial and reputational risks. How can your organization stay ahead?

Join our expert panel to discover how leading security teams prioritize investments to achieve business outcomes like lower costs, faster incident response, and stronger defenses. Learn why organizations that adopt frameworks like Cyber Threat Exposure Management (CTEM) are three times less likely to suffer a breach.

This session, designed for CISOs and key decision-makers, we will hear from the CISO at USC on her journey to secure not just a college but a small town! We will highlight the essential role of a proactive, process-driven approach to CTEM. We'll delve into how structured strategies enhance threat visibility, streamline risk assessment, and ensure effective mitigation, translating into substantial financial ROI.

Attendees will gain a deep understanding of:

•  The strategic benefits of adopting Exposure Management
•  How it applies to enhanced threat visibility, streamlined risk assessment, and effective mitigation strategies
•  The financial savings ROI
•  Learn from industry experts about real-world applications

Secure your spot now to stay ahead of the curve and fortify your defenses against ever-evolving cyber threats.

Be sure to submit your questions for our presenter in the box when you register. Attendees are eligible to receive 1 CPE credit.

Generously supported by:

supported by logo
Speakers
speaker photo
Sandy Taylor
CISO, USC

Strategic and people centric information security leader with 20+ years of experience with notable success in designing, planning, analysis, and implementation of large and complex security initiatives across federated organizations. Strength in providing comprehensive and practical security risk reduction plans and roadmaps to the business. Impactful record of efficiently evaluating and reducing / mitigating risks, protecting high value systems, and ensuring usability in lieu of high friction controls.

speaker photo
Will Baxter
Security Engineer, Team Cymru

Will began his career serving in the US Marine Corps. Joined CISA as an Incident Handler, Senior Watch Officer, and later a Network Security Analyst where he developed signatures for tracking nation state intrusion sets. After 10 years in government and military roles, Will moved into the private sector and continued his role as a Senior Security Analyst and Engineer, developing and deploying security monitoring and detection controls and capabilities as part of the creation of a global Security Operations Center, in his role of CTO and CISO, for one of the largest private companies in the U.S. Will joined Team Cymru in April of 2022.

speaker photo
Mike Wyatt
Vice President, Threat Management, Cyderes

Mike is an experienced cybersecurity executive who actively advises, practices, and leads security teams across almost every domain.  Prior to his work at CYDERES, Mike was instrumental in building and leading cross-functional security capabilities at RiskIQ and Koch Industries. He has obtained many well-recognized certifications, holds a Master of Science in Information Security and Assurance, completed post-graduate work in Organizational Leadership, and most recently earned an Executive CISO certificate from Carnegie Mellon University.

Moderator
speaker photo
Tom Bechtold
Digital Event Director, SecureWorld

Tom has been part of the SecureWorld team for over 14 years. He has launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the Remote Sessions webcasts while also working closely with the SecureWorld event directors to build relevant agendas at the regional conferences.