Sharing information is extremely helpful, but some large companies are now assuming that truly determined hackers cannot be kept out. So they are putting more emphasis on building resilience—the ability to bounce back fast in the event of a breach. It is essential to have a well-conceived recovery plan to test it regularly, says Ed Powers of Deloitte, a consulting firm. In financial services, where a problem at one company could easily trigger a system-wide crisis, regulators are urging banks and other firms to consider resilience across markets. —From the Cyber Security Special Report "Defending the Digital Frontier," The Economist, July 12, 2014
In collaboration with the College of Computing and Digital Media and the College of Law, DePaul University's Arditti Center for Risk Management is proud to present an annual conference on cyber risk.
Emerging Technology: Unknown Risks
The Fourth Annual Cyber Risk Conference
Nov. 28, 2017
New and evolving technologies such as artificial intelligence, predictive analytics, machine learning and robotic process automation are now an everyday reality. Similarly, use of the Cloud and third-party systems have grown dramatically as the technology has become more complex.
Business practices are being rapidly transformed in all sectors—from expediting insurance claims, automating financial processes and revolutionizing search algorithms to heralding a paradigm shift in cyber security and military technology. These emerging technologies provide a host of new benefits, but also create a horde of new risks.
In this conference, we’ll discuss the real impact that these technologies have on all businesses—not just tech-firms.
Click here to register
About our previous conferences
The Speed of Change: Threat, Compliance, and Protection
We held our Third Annual Cyber Risk Conference on November 29, 2016 with the theme of the speed of change.
The cyber security landscape is rapidly changing in a dynamic interplay of threat, compliance, and protection. Just as we figure out how to address one risk, a new one takes its place. There is no such thing as a static state in cyber risk. New threats—both individual and state-sponsored—bring new compliance and protection measures in an accelerating cycle of change. As we enter an increasingly connected world, the Internet of Things has become a reality. New technologies bring new vulnerabilities. With these new vulnerabilities come new regulations and compliance issues, as well as a race to proactively protect users.
Behavior is also constantly shifting. A generation has now grown up completely at home with these new technologies and thus has a very different perspective towards privacy and protection. These are just a few of the topics we discussed in our three panels addressing the Speed of Change in Threat, Compliance, and Protection.
A New Manhattan Project: Forging a Proactive Public-Private Collaboration in Cyber Security
Our Second Annual Cyber Risk Conference was held on December 2, 2015
“… We've got to get people that are at the C-suite boardroom level [and the] same position in the federal government, who understand enough about cyber security and enough about business so they can make the tough business tradeoffs that have to be made in order to make us more secure.”
--Major General Brett Williams, On Meet the Press, July 12
In an ideal world, what would a large-scale collaboration between public institutions and private companies look like? In a realistic world, what kinds of collaboration are actually achievable? How does collaboration work (or not work) now? How do we navigate the difference between compliance and protection? How can greater collaboration shift us more towards the latter than the former?
Our second annual cyber risk conference addressed these issues through three panels and a keynote speaker. Our keynote speaker was Major General USAF (retired) Brett Williams, Former Director of Operations, U. S. Cyber Command (2012-2014).
After the Breach
Our Inaugural Cyber Risk Conference launched on December 2, 2014
With the list of companies that have been attacked growing daily, the needs and questions of the industry are beyond simple solutions like "don't click on links in emails." The conference began with a demonstration of an actual breach through a live-hacking of a phone. Recognizing that a focus solely on prevention is short sighted, our three expert panels then followed through the three phases of breach response, providing concrete answers and discussion that attendees could take with them and apply to their own businesses.
Noted cybersecurity expert Peter W. Singer served as our inaugural keynote speaker.