From Blueprint to Battle: Implementing Cyber Strategies to Stop Threat Actors in Their Tracks
This session will show you how to apply new approaches to turn your cybersecurity strategy into practical, measurable outcomes that stop threat actors before damage is done
Strategic planning is only half the battle—real protection comes from how well you execute. This session will show you how to apply new approaches to turn your cybersecurity strategy into practical, measurable outcomes that stop threat actors before damage is done
- Adapt your cyber framework to shifting threat landscapes
- Improve coordination between policy, operations, and IT teams
- Increase visibility and control over critical digital assets
- Optimize resource allocation for rapid, resilient response
- Transform plans into frontline-ready protocols with clear accountability
Speakers:
- Holly Drake, State Chief Information Security Officer & Chief Privacy Officer, Department of Administrative Services, State of Ohio
- Kirk Herath, Cybersecurity Strategic Advisor, Office of the Governor, State of Ohio
Moderator: Ryan Sherstobitoff, Field Chief Threat Intelligence Officer, SecurityScorecard
Recommendations
GIW QLD Cyber Security Showcase: Zoe Thompson (Thales) on Cyber Threats, Data Gaps & Resilience
INDUSTRY TRENDS
2 Oct 2025
The Importance of AI Assurance: Ensuring Trustworthy AI Systems
INDUSTRY TRENDS
30 Sep 2025
EntraGoat is a deliberately vulnerable lab that simulates real-world identity misconfigurations in Microsoft Entra ID.
GUIDES
6 Nov 2025
Infostealer Malware and the Cartelisation of Cybercrime
INDUSTRY TRENDS
15 Sep 2025
IBM Launches Microsoft Practice to Deliver Transformative Business Value for Clients
INDUSTRY TRENDS
29 Sep 2025