<img src="https://ws.zoominfo.com/pixel/4CagHYMZMRWAjWFEK36G" width="1" height="1" style="display: none;">
Request Demo

STRONGER Call For Speakers is Open!

down-arrow

CyberSaint Security is excited to present our inaugural STRONGER conference, September 28-30, 2021. We are seeking speaker submissions for our three-day virtual conference that will be hosted on BrightTalk. Each day will be focused on principal business and security challenges, including Frameworks and Standards, Security and Risk, and CISOs in the Boardroom and Beyond.

Each day will feature a keynote presentation on different areas of the digital landscape from CyberSaint experts and industry thought leaders along with 3-5 breakout sessions. We are seeking submissions from our infosec community members who are looking to increase awareness and further position themselves as subject matter experts in their field to a new audience. The selected breakout sessions will either be hosted live on the designated date or can be submitted as a pre-recording.

Breakout Session Overview 

Your hosted breakout session should: 

  1. Last from 15 to 30 minutes and include an interactive experience for the audience (i.e. Q&A session).
  2. Be focused on value-driven thought leadership and strategy. The session cannot be a pitch for your product or service. 
  3. Can include one slide or an up to a 5-minute overview of your company, product, and/or service if the hosted session is over 15 minutes.

If you’re interested in participating as a speaker, please click here.

STRONGER 2021 Tracks 

Frameworks and Standards - Tuesday, September 28, 2021 

  • With the rapid shift of regulatory requirements, gold-standard frameworks that guide the ongoing development of a security program have never been more important. In the Frameworks & Standards track, we dive into how organizations can take a holistic approach to risk and compliance management using frameworks to bridge the gap between technical and business leadership.

Security and Risk - Wednesday, September 29, 2021 

  • To succeed in the digital age, risk must shift from a reactive to a proactive function within the organization. Enabled by real-time risk solutions and a wave of demand at the Board level for cyber and IT risk insights, security and risk teams are shifting their relationship from siloed to integrated. In this track, we explore the new age of cyber and IT risk management and how security teams can leverage new data coming from risk teams.

CISOs in the Boardroom and Beyond - Thursday, September 30, 2021 

  • In this track, we dive into the soft skills that technical leaders haven’t historically focused on, but are absolute necessities in the digital age. From cultivating business relationships to presenting their security posture in a business context, security leaders have to straddle business and technology in ways we’ve never seen before. These sessions will empower you with the skills necessary to build essential relationships and enhance communication across the enterprise while leading a technical business function.

 

If you or a member of your organization is interested in participating, submit your ideas here and complete the form. Please feel free to reach out with any questions regarding this opportunity. We look forward to seeing your proposal!

To register for the STRONGER conference and receive updates on sessions as they’re announced, register here.

You may also like

Why You Need CIS Controls for ...
on June 17, 2022

The Center for Internet Security (CIS) is a non-profit organization that helps public sectors and private sectors improve their cybersecurity. The organization aims to help small, ...

Small Business Cybersecurity ...
on June 15, 2022

To achieve peace of mind in the modern threat landscape, small business owners must have a solid security strategy and budget in place. VIPRE’s SMB Security Trends report state ...

Do Small Businesses and Startups ...
on June 10, 2022

Did you know that about 60% of small businesses shut down within 6 months by falling victim to a data breach or cyber-attack, where the average global breach cost hovers at $3.62 ...

A Pocket Guide to ISO 27001
on June 9, 2022

Let’s begin with the complete title of what’s referred to as ISO 27001. It is officially known as “ISO/IEC 27001." If you're looking to have your company certified, you'll need to ...

Benefits Of An Automated Security ...
on June 6, 2022

Proactive recognition, remediation, and mitigation of security threats are rising challenges for global businesses today. Security risk assessment is an integral part of this ...

Kyndall Elliott
The Top 5 Automated Risk ...
on June 1, 2022

Automated risk assessment tools help you assess information security risks and related metrics in real-time based on the available data internally and externally. Connecting the ...