2024 EWF Annual Conference Program Book

2024 AGENDA · TUESDAY, OCTOBER 22

Wisdom Circle Code Meets Community – Innovating Secure Pathways in Open-Source Software with Kelley Misata , Chief Trailblazer | President Sightline Security | OISF Open-source software (OSS) is foundational to government, business, and personal technology sectors — highlighting its critical role in the digital ecosystem. In this wisdom circle, delve into the complex dynamics of OSS security by viewing OSS through a wider lens, balancing the openness of OSS with stringent security measures, recognizing the human factors behind the code, and strengthening community and project governance. Wisdom Circles are facilitated group conversations that seek to build communities by bringing together people who are interested in a specific topic area so they can share ideas, insights, and advice while learning from one another.

Wisdom Circle Never Let a Good “Crisistunity” Pass You By with Jennie Clinton , Sr. Director, Microsoft

Real-life case studies offer a guide for taking advantage of opportunities that emerge from crisis events and incidents. In this wisdom circle, explore data, lessons learned, and new technology capabilities such as AI to predict trends, risks, and causes.

Privacy and Risk Elevating Cyber Vigilance: Tackling Human Risk to Improve Security Posture with Helen Beyne , Director, Cybersecurity Awareness, IT Trainings and Procedures, & IT Rotational Development Program, Bristol Myers Squibb; Michele Bersak , Senior Director, IT Risk Operations, Bristol Myers Squibb; and Aparna Bhalivade , Information Security Officer for Drug Development, Bristol Myers Squibb The human element continues to be exploited by threat actors, making it imperative for companies to integrate human risk management into their security strategies. In the session, explore how understanding human risk provides a more holistic view of risk on critical assets; how awareness programs and controls to mitigate risks associated with human error, insider threats, social engineering attacks, adaptive threats, and insider knowledge and access all contribute to bolstering security posture; and how continuous adaptation allows companies to keep pace with the dynamic threat landscape.

18

Made with FlippingBook - Online catalogs