From Blueprint to Battle: Implementing Cyber Strategies to Stop Threat Actors in Their Tracks
This session will show you how to apply new approaches to turn your cybersecurity strategy into practical, measurable outcomes that stop threat actors before damage is done
Strategic planning is only half the battle—real protection comes from how well you execute. This session will show you how to apply new approaches to turn your cybersecurity strategy into practical, measurable outcomes that stop threat actors before damage is done
- Adapt your cyber framework to shifting threat landscapes
- Improve coordination between policy, operations, and IT teams
- Increase visibility and control over critical digital assets
- Optimize resource allocation for rapid, resilient response
- Transform plans into frontline-ready protocols with clear accountability
Speakers:
- Holly Drake, State Chief Information Security Officer & Chief Privacy Officer, Department of Administrative Services, State of Ohio
- Kirk Herath, Cybersecurity Strategic Advisor, Office of the Governor, State of Ohio
Moderator: Ryan Sherstobitoff, Field Chief Threat Intelligence Officer, SecurityScorecard
Recommendations
In Conversation with Sandeep Taileng
INTERVIEWS
4 Jan 2026
Effective Crisis Communication
INTERVIEWS
28 Jan 2026
2025 Ransomware Holiday Risk Report
INDUSTRY TRENDS
25 Nov 2025
GIW Federal 2025: From Audits to Automation: Continuous Compliance for Secure-by-Design Government with Ken Melero
ON DEMAND
26 Nov 2025
Midnight In The War Room
INDUSTRY TRENDS
17 Dec 2025