Governments Explore Opportunities at National Summit on State Cyber Security

 The National Governors Association Center for Best Practices held their third National Summit on State Cybersecurity from May 14-15, 2019 at the Shreveport Convention Center.

The unique event convened state homeland security advisors, chief information officers, chief information security officers, governors’ policy advisors, National Guard leaders, and others from all 55 states and territories to explore cybersecurity challenges and promising practices. Over the course of two days, participants engaged in a series of interactive sessions and breakouts to discuss countering the newest threats, disruption response planning, workforce development, and much more.

Coverage of the event was widespread. Here are a few of the headline stories that came out of the event (with embedded videos from the summit):

This radio interview after the event highlights many of the regional cybersecurity topics being addressed at the national summit.

Cyber Summit Agenda Items

So what topics were on the agenda? Here’s a sampling from Day 1:

  • Preparing the Grid for a Dark Sky Event
  • Cybersecurity and The Whole-of-State Approach
  • Cybersecurity & Crisis Communications
  • After-Action on the Colorado Department of Transportation Ransomware Attack
  • Keynote-Governor John Bel Edwards
  • Breakout: Supply Chain Management
  • Breakout: Using Cyber Volunteers for Incident Response
  • Breakout: How Does IT Centralization and Unification Improve Security?
  • Breakout: Information Sharing –How Far Have We Come?
  • Breakout: Statewide Disruption Response Planning
  • Breakout: Coordinated Vulnerability Disclosures
  • State Efforts to Assist Locals with Cybersecurity

(Read more…)

*** This is a Security Bloggers Network syndicated blog from Lohrmann on Cybersecurity authored by Lohrmann on Cybersecurity. Read the original post at: https://www.govtech.com/blogs/lohrmann-on-cybersecurity/governments-explore-opportunities-at-national-summit-on-state-cyber-security.html