From Blueprint to Battle: Implementing Cyber Strategies to Stop Threat Actors in Their Tracks
This session will show you how to apply new approaches to turn your cybersecurity strategy into practical, measurable outcomes that stop threat actors before damage is done
Strategic planning is only half the battle—real protection comes from how well you execute. This session will show you how to apply new approaches to turn your cybersecurity strategy into practical, measurable outcomes that stop threat actors before damage is done
- Adapt your cyber framework to shifting threat landscapes
- Improve coordination between policy, operations, and IT teams
- Increase visibility and control over critical digital assets
- Optimize resource allocation for rapid, resilient response
- Transform plans into frontline-ready protocols with clear accountability
Speakers:
- Holly Drake, State Chief Information Security Officer & Chief Privacy Officer, Department of Administrative Services, State of Ohio
- Kirk Herath, Cybersecurity Strategic Advisor, Office of the Governor, State of Ohio
Moderator: Ryan Sherstobitoff, Field Chief Threat Intelligence Officer, SecurityScorecard
Recommendations
The Public Sector Podcast: Building the Shield - AI & Automation in Public Sector Transformation
INDUSTRY TRENDS
7 Oct 2025
GIW WA: New, Now, Next: WA's Digital Vision with Lisa O'Malley
INDUSTRY TRENDS
2 Oct 2025
EntraGoat is a deliberately vulnerable lab that simulates real-world identity misconfigurations in Microsoft Entra ID.
GUIDES
6 Nov 2025
GIW Federal 2025: AI Risks — Safeguarding Services and National Security with James Kay
INDUSTRY TRENDS
28 Nov 2025
2025 Ransomware Holiday Risk Report
INDUSTRY TRENDS
25 Nov 2025