MISI DreamPort Speaker Series with author Sounil Yu

Events

MISI DreamPort Speaker Series with author Sounil Yu

Date: July 13, 2022 | 1300-1500 | Location: DreamPort Facility


Overview

The MISI DreamPort Speaker Series is hosting Sounil Yu, security innovation and author of the Cyber Defense Matrix. Sounil will present his new book that focuses on understanding the complex cybersecurity landscape. The Cyber Defense Matrix discusses the range of capabilities necessary for building, managing ad operating an effective security program. Sounil will be available to sign copies of the book after his speaking session. All sttendees will be provided a copy of the Cyber Defense Matrix. Come enjoy a good book, coffee and do some networking while your at it!

Agenda

  • 1300 – 1400, Presentation by Sounil Yu Author of the Cyber Defense Matrix
  • 1400 – 1415, Q&A with Sounil Yu
  • 1415 – 1445, Book Signing
  • 1445 – 1500, Coffee & Networking

About Sounil Yu

Sounil Yu

Sounil Yu is a security innovator with a deep knowledge of computer systems and a career spanning more than three decades as an executive leader of information technology and security tackling cybersecurity challenges in the federal government, military, and private sector. Currently, he is the CISO and Head of Research at JupiterOne, a cloud-native asset management and security platform.

His new book, Cyber Defense Matrix, helps practitioners, vendors, and investors understand the range of capabilities needed to build, manage, and operate a security program. The simple, logical construct of the Matrix organizes technologies, skillsets, and processes to help readers quickly discern what capabilities solve what problems, what gaps exist in one's security program, and where there are opportunities for new capabilities to be created. Although the Cyber Defense Matrix was initially designed to help organize security technologies, many other use cases have been discovered to help build, manage, and operate a security program. This book captures these use cases and their implementations to help readers navigate the complex landscape of cybersecurity.

Register Now

Register

Register Now Cyber Defense Matrix arctonyx Logo MISI Logo DreamPort Logo