Event Wrap-Up: Cyber Security Summit Chicago

The Cyber Security Summit series will host a total of 9 security conferences around the U.S. this year. OPSWAT has attended each one so far in 2017. Cyber Security Summits are a great opportunity for us to connect with critical infrastructure organizations.

On August 8, we attended Cyber Security Summit Chicago at the Hyatt Regency Chicago.

Syed Ahmad OPSWAT Booth Cyber Security Summit Chicago

OPSWAT Sales Manager Syed Ahmad at the OPSWAT booth

Horacio Zambrano, the new OPSWAT VP of Product Marketing, participated in a panel discussion about following compliance requirements and reconciling the different requirements from a variety of sources with the needs of an organization. He was joined by our technology partner Ericom and a number of compliance and risk governance consultants.

Cyber Security Summit Compliance Panel - Horacio Zambrano

The panel discusses compliance

The panel was titled, "The Compliance Nightmare: Using Your Solution Provider as a GPS for Navigating the Perilous Road to Compliance." Compliance is something we specialize in. OPSWAT technology helps organizations comply with all kinds of data security regulations and directives, from governmental and industry requirements to CSO and CEO expectations.

When asked to give 3 suggestions to the audience, Horacio, who recently joined OPSWAT and has over 15 years of experience in cyber security, advised that:

1. Vendors such as OPSWAT can be trusted advisors for how to meet regulatory compliance. He highlighted that 90% of North American nuclear operators use OPSWAT technology, and how through our coverage we can advise on the many ways similar organizations are meeting regulatory compliance hurdles for secure file transfer into high-security networks.

2. Organizations must consider the impact of trends such as mobile, cloud, and containers on existing policy. Having experienced the BYOD onslaught in corporate America firsthand as Cisco's initial BYOD strategist and evangelist, Horacio highlighted how both mobile and cloud have broken the traditional device compliance model that existed in a traditional perimeter model via NAC and VPN. OPSWAT is particularly attuned to these changes as it readies the introduction of a disruptive NAC for SaaS offering to help with compliance.

3. Compliance strategy should include certification of trusted third parties and consultants, given the large number of high-profile breaches that have occurred due to weak controls in the supply chain. He cited several examples where the offending security vulnerability came through a partner that acted as a launching point into a protected organization.

We're eagerly anticipating the next Cyber Security Summit on September 15 in New York City! Be sure to meet us there if you'd like to discuss industry trends, new cyber security developments, or our dynamic data sanitization (CDR), vulnerability detection, and multi-scanning technologies.

For more information, please contact one of our cybersecurity experts.

Sign up for Blog updates!
Get information and insight from the leader in advanced threat prevention.