From Blueprint to Battle: Implementing Cyber Strategies to Stop Threat Actors in Their Tracks
This session will show you how to apply new approaches to turn your cybersecurity strategy into practical, measurable outcomes that stop threat actors before damage is done
Strategic planning is only half the battle—real protection comes from how well you execute. This session will show you how to apply new approaches to turn your cybersecurity strategy into practical, measurable outcomes that stop threat actors before damage is done
- Adapt your cyber framework to shifting threat landscapes
- Improve coordination between policy, operations, and IT teams
- Increase visibility and control over critical digital assets
- Optimize resource allocation for rapid, resilient response
- Transform plans into frontline-ready protocols with clear accountability
Speakers:
- Holly Drake, State Chief Information Security Officer & Chief Privacy Officer, Department of Administrative Services, State of Ohio
- Kirk Herath, Cybersecurity Strategic Advisor, Office of the Governor, State of Ohio
Moderator: Ryan Sherstobitoff, Field Chief Threat Intelligence Officer, SecurityScorecard
Recommendations
GIW NZ 2025- Chair Opening by Zoe Thompson
INDUSTRY TRENDS
6 Nov 2025
Digital NSW 2025: National threat briefing: Digital security for maximum impact with Lt. McGuinness
ON DEMAND
11 Dec 2025
EntraGoat is a deliberately vulnerable lab that simulates real-world identity misconfigurations in Microsoft Entra ID.
GUIDES
6 Nov 2025
Let’s Chat: Building Smarter, Safer Data for Ontario’s Future
INTERVIEWS
8 Jan 2026
2025 Ransomware Holiday Risk Report
INDUSTRY TRENDS
25 Nov 2025