8:00 am Chair’s Opening Remarks
Building a Resilient Cybersecurity Program
8:10 am Leveraging Cyber Threat Intelligence to Influence Insurance Premiums & Strengthen Client Readiness
Synopsis
- Exploring current trends in cyber threats and how they impact premium calculations
- Understanding how insurance providers are staying ahead of evolving threat landscapes
- Identifying practical steps contractors can take to reduce premiums and demonstrate cyber maturity
8:50 am Building a Secure Environment: A Practical Roadmap to Balanced, Risk- Aligned Cybersecurity Program
Synopsis
- Quickly identifying and fixing critical vulnerabilities to reduce immediate risk and strengthen baseline security
- Building a long-term security strategy that aligns with the organization’s risk profile, avoiding both overbuilding and underbuilding
- Using real-world incidents and near-misses to communicate risk, justify investments, and gain executive support
9:30 am Audience Discussion: Building a Top-to-Bottom Security Culture to Embed Cybersecurity into the Organization’s DNA
Synopsis
- Involving leaders across the business in reinforcing the importance of cybersecurity initiatives to drive adoption across all departments
- Promoting organizational change by ensuring that data stewardship, governance, and risk management programs are integrated into departmental SOPs
- Simplifying the implementation of cybersecurity measures by providing clear, actionable guidelines and tools that empower all employees
10:40 am Morning Refreshments & Speed Networking
Accelerating Companywide Buy-In & Adoption
11:20am Panel: Evolving Your Security Program to Maximize the ROI of Your Technology Stack & Stay Ahead of Emerging Risks
Synopsis
- Embedding feedback loops, threat monitoring, and regular gap assessments to drive continuous improvement
- Exploring the benefits and potential trade-offs of all-encompassing security platforms, and strategies to mitigate risks associated with reliance on a single provider
- Navigating information overload when deciding which security tools and strategies to employ next: How do you make sure that you are addressing the most urgent gaps in your existing program?
12:00 pm Driving Leadership Support & Accountability for Stronger, Top-Down Compliance
Synopsis
- Linking cyber risks to profit protection, brand reputation, client requirements, and strategic growth to help educate leadership on program importance
- Presenting this business case to encourage leadership to champion compliance and governance across the organization
- Aligning cybersecurity initiatives with overarching business objectives and KPIs, and establishing regular reporting cadences to maintain leadership visibility over progress
12:40 pm Networking Lunch
Minimizing Risk Profile
1:40 pm Educating End-Users to Better Detect & Prevent Cybersecurity Threats
Synopsis
- Discussing the impact of technology breaches, phishing, and fraud, and how data loss or compromise can affect the business in a way that resonates with the individual
- Promoting cyber-awareness training as an employee benefit, ensuring staff can apply knowledge to avoid personal and work-related scams
- Evaluating the effectiveness of training to ensure accessibility and utility of tools for all employees
- Defining consequences for users who fail to follow cybersecurity best practices
2:20 pm Building & Managing Cybersecurity Teams to Address Skill Gaps & Staffing Challenges
Synopsis
- Understanding who the cybersecurity team should report to and how that impacts budget, priority, and scale
- Creating pathways from entry-level to senior roles to help attract technology talent to the construction industry
- Leveraging offshoring, remote work flexibility, and workforce development approaches to meet staffing need
3:00 pm Afternoon Refreshments
Mastering Your Data Defenses
4:00 pm Case Study: Leveraging Automation for End-to-End Security Coverage
Synopsis
- Ensuring security policies are not only defined but consistently deployed and enforced across all systems, minimizing gaps that create vulnerability points
- Leveraging automation to audit and validate policy application across the environment, holding systems and teams accountable while shifting human effort from bulk tasks to resolving targeted exceptions
- Selecting and implementing automation tools that streamline enforcement and auditing processes, ensuring they solve core security challenges without introducing new complexity
4:40 pm Audience Discussion: Creating a Data Loss Prevention (DLP) Program to Improve Information Security & Risk Management
Synopsis
Establishing the meaning of DLP for the business and individuals, and identifying where the greatest risks reside
Ensuring mobile devices are securely managed and that data on those devices remain protected, including tracking assets and preventing unauthorized access
Approaching protection for specific construction documents (e.g. Blueprints, RFIs), and using additional security measures for more sensitive data