Join us for the GSX General Session on Thursday, 12 September, from 8:30 – 10:30 am, as Tarah Wheeler shares her insights on how the evolving cyber threat is impacting organizations across the globe.
An enterprise security industry veteran, strategist, international conflict scientist, and cybersecurity expert, Wheeler will present Protecting Assets in the Age of Cybersecurity Leaks and Scandals: How to Plan When Risk is a Moving Target. This fascinating session will engage attendees with questions such as: Do you have a comprehensive plan in place to protect your most important assets? If something goes wrong, how will you react, put out fires, and recover lost trust? Have you considered the consequences of information falling into the wrong hands in 10, 20, 30, or 40 years?
Throughout her career, Wheeler has held leading roles with some of the world’s top red teams and data privacy teams. An Offensive Security researcher, she is currently the Cybersecurity Policy Fellow at New America, driving a new international cybersecurity project. She is an inaugural contributing cybersecurity expert for the Washington Post and a foreign policy contributor on cyber warfare. Wheeler is also author of the best-selling book Women in Tech: Take Your Career to The Next Level with Practical Advice and Inspiring Stories, dedicated to teaching women how to succeed in tech careers.
Don’t miss this highly anticipated talk at GSX 2019, where Wheeler will bring depth, warmth, and humor to an otherwise complex subject. From cryptocurrency to how the Internet of Things might provide a gateway to hackers, and from absorbing how a robust cybersecurity plan operates to covering security at live events, Wheeler will provide a razor-sharp breakdown of what you need to know – and do – to protect yourself, your partners, and your clients.
Wheeler will be introduced by Brigadier General Stefanie Horvath, current leader of enterprise service delivery for the state of Minnesota. After her presentation, General Horvath and Wheeler will lead a lively Q&A session drawn from their very different vantage points related to cybersecurity.