Rhode Island Corporate Cybersecurity Initiative

Part of the Pell Center's Cyber Leadership project, the Rhode Island Corporate Cybersecurity Initiative supports senior business leaders and decision makers who can affect change and make Rhode Island's corporate community more secure and resilient to cyber incidents.

By bringing together senior leaders from the defense industry, financial services, technology, health care, energy and telecommunication, the initiative:

  • Addresses the most critical cybersecurity challenges facing the private sector
  • Encourages cybersecurity awareness and training
  • Promotes best practices, business continuity and resiliency planning
  • Develops approaches to share cyber threat information and assure legal and regulatory compliance

The Rhode Island Corporate Cybersecurity Initiative takes advantage of New England's outstanding academic, industrial and research resources to develop the next generation of cyber-strategic leaders, who understand the technical, ethical, legal and compliance issues regarding cybersecurity and take responsibility for the development of effective security policies, procedure and protocols to protect their organizations and the nation's private infrastructure.

For more information, or to register for an upcoming event, contact Francesca Spidalieri, Pell Center senior fellow for cyber leadership.

Upcoming events

Lecture: "Cyber Risk Management: U.S. Government and Private Sector Efforts"

Tuesday, May 19
8:30-9 a.m. - Networking breakfast
9-11 a.m. - Lecture
Young Building

The U.S. government has made cyber risk management a key part of its cybersecurity efforts. The NIST Voluntary Cybersecurity Framework, a centerpiece of the Obama administration's executive order on cybersecurity, was released in February 2014 as a tool to help companies manage their cyber risk more effectively. How has the framework been received by industry, and has it helped companies manage cyber risk in today's threat environment? What is the status of the administration's other cyber initiatives? How are corporate boards responding to the need to manage cyber risk? What is their responsibility to do so?

Roger Cressey, partner with Liberty Group Ventures and internationally known cybersecurity and counterterrorism expert, and Kiersten Todt, president and managing partner of Liberty Group Ventures, will explore these and other important and timely issues surrounding cyber risk management in an interconnected workplace.

Registration: This is an invitation-only event and participants must be confirmed in advanced. Please RSVP on our Eventbrite page by Monday, May 18.

Workshop: "Top 10 Cyber Threats: How do they work? What are some of the most overlooked vulnerabilities? And how can you protect, prevent and mitigate some of these cyber risks?"

Tuesday, June 9
8:30-9 a.m. - Networking breakfast
9-11 a.m. - Workshop
Young Building

You have spent many hours trying to configure and protect your network and digital assets, purchased several tools, and now you are wondering: what is next? Am I actually protected and am I looking for the right indicators of a potential cyber intrusion?

Joe Provost, CEO of Syncstate, will walk participants through the use of several open source tools as part of a SOC/threat/monitoring program that you can implement. He will discuss what the tools can and cannot do and how best to deploy them. The goal is to provide participants with several tools, tactics and procedures that they can use within their own organization to build confidence in their cybersecurity strategy and mitigate some of the most common risks. No technical background is needed to participate to this workshop.

Past Events

Roundtable Discussion: "Ensuring Security When Working with Third Party Vendors"

The speakers explored some of the cybersecurity risks of working with third party vendors and discussed how to evaluate and manage them to enable business objectives. National Grid's Michael Andreozzi, IS compliance manager, and Scott Baron, director, governance risk and compliance, examined important steps companies can take to identify risks of potentially insecure service providers, and options to mitigate those risks as part of their decision making process. They also engaged the audience in an open and frank discussion about third party management policies and strategies already in place in some of the other organizations represented in the room, from both the private and public sectors.

Learn more

Panel Discussion: "Enterprise Cybersecurity Workforce Management

The speakers discussed ways to optimize enterprise resources, prioritize essential security tasks, and develop a comprehensive cybersecurity strategy to increase the security posture of organizations. Panelists included Francesca Spidalieri, senior fellow for cyber leadership at the Pell Center; Maurice Uenuma, senior vice president at the Center for Internet Security; Geoff Hancock, CEO for the Advanced Cybersecurity Group; and Jack Nicholas, director and general counsel at Creative Services Inc.

Learn more

Panel Discussion: "Cyber Information Sharing"

The speakers discussed how to establish and maintain effective information sharing partnerships to enhance an organization's situational awareness, acquire the right threat feed from trusted sources and manage an organization's exposure to intrusions and breaches through comprehensive cybersecurity programs. Panelists included Ellen Giblin, counsel at Locke Lord and Pell Center adjunct fellow; Don Ulsch, PwC managing director and cybercrime expert; and Ken Mortensen, PwC senior managing director and privacy expert.

Learn more

Seminar: “Keep Your Organization on the Winning Side of Cybercrime in 2015”

The first workshop for 2015 featured Andy Bonillo, director of cybersecurity and public safety for Verizon, who offered a unique opportunity for participants to hear about the latest cyber threats, vulnerabilities and trends, and what to expect in 2015. He shared with the group of senior executives gathered for the seminar an overview of major cyber-attack patterns and findings from the 2014 Verizon Data Breach Investigation Report - one of the most anticipated annual computer security reports in the field.

Learn more

Follow-up Discussion: "Strengthening Rhode Island’s Data Security and Breach Notification Law"

During this follow-up meeting to the September workshop, key stakeholders around the state provided advice and guidance on the changes needed to strengthen the current Rhode Island Data Security and Breach Notification Law. Sen. Lou DiPalma chaired the meeting with representatives of the financial sector, the R.I. Attorney General's Office, the R.I. Deptartment of Business Regulation, and the R.I. State Police.

Seminar: "Cybersecurity and Your Business: Security Strategies for SMBs"

Frank Motta, executive vice president of CAI Managed IT, discussed cybersecurity issues and business continuity solutions for small and medium-size businesses (SMBs), and in particular, the need for businesses to develop a holistic, company-wide methodology to minimizing their exposure to hackers and cyber criminals. He provided a list of best practices and low or no-cost solutions for SMBs to protect their systems and digital assets, from prevention and mitigation strategies to disaster recovery planning and cyber risk management.

Learn more

Seminar: "Cybersecurity and Corporate Leadership: Connecting the Server Room and the Board Room"

Steve Katz, the world’s first chief information officer and renowned cybersecurity expert, discussed the need for corporate leaders to be fully informed about how cyber-risk issues are being addressed within their companies, and outlined the skills and knowledge that chief information security officer should have, especially the ability to communicate cybersecurity issues effectively and to build relationships with the C-suite.

Learn more

"Cybersecurity and Cyber Counter Strikes: Concept and Laws"

The event brought together internationally renowned experts and cybersecurity practitioners to discuss numerous key cyber-operation concepts, including the legal implications of active defense, cyber-countermeasures vis-a-vis the Tallinn Manual, and how "privatized cyber counter strikes" may influence the future of cyber deterrence.

The panel included:

  • Joe Provost, CEO of SYNCSTATE, a cyber threat security and intelligence analysis company
  • Robert Clark, distinguished professor of law at the U.S. Naval Academy's Center for Cyber Security Studies
  • Col. James Bitzes, staff judge advocate for the U.S. Cyber Command
  • Michael Schmitt, director of the Stockton Center for the Study of International Law at the U.S. Naval War College and main author of the "Tallinn Manual on the International Law Applicable to Cyber Warfare"
  • Karl Wadensten, president of VIBCO, a prominent R.I. manufacturer

The five distinguished panelists explored the timely and controversial issues of commercial hacking and the lack of clearly-defined laws - whether domestic or international - to deter, punish, and/or pursue foreign hackers.

"Strengthening Rhode Island’s Data Security and Breach Notification Law"

The invitation-only roundtable discussion brought together key players in the state to review current gaps in Rhode Island's Data Security and Breach Notification Law, compare the R.I. law with those of other states, and propose methods to strengthen the existing law. The distinguished group of policy makers, state representatives, business leaders and law enforcement officials present at the workshop agreed that an update to the current R.I. notification of breach law is both necessary and urgent in order to raise the cost of data breaches, to better protect customers' personal information, and to provide companies with incentive to implement better security practices. A list of their recommendations to strengthen the existing law will be published in an upcoming policy memo.

Rhode Island Corporate Cybersecurity Tabletop Exercise

The first R.I. Corporate Cybersecurity Tabletop Exercise was a cross-industry, discussion-based exercise that provided private sector leaders the opportunity to raise their awareness and develop an understanding of the most pressing cyber threats to their organizations' networks and sensitive information.

More than 30 industry leaders participated in the exercise demonstrating their commitment to cybersecurity and desire to build upon existing informal relationships to improve the overall security posture of the RI private sector.

Public Lecture: Melissa Hathaway

Melissa Hathaway, president of Hathaway Global Strategies and a senior adviser at Harvard University's Belfer Center for Science and International Affairs, gave a public lecture titled "Strategic Advantage: Why You Should Care About Cybersecurity."

Watch the video.

After-Action Report Workshop

The After-Action Report Workshop discussed lessons learned from the Corporate Cybersecurity Tabletop Exercise and further steps companies may take to better protect their organizations from cyber threats and vulnerabilities. The workshop built upon the exercise by outlining major strengths and areas of improvement, discussing how organizations currently handle situations similar to the ones simulated in the exercise, and identifying any related best practices.

The comprehensive After Action Report includes the findings and observations of this exercise and offers actionable recommendations to help organizations prioritize their cybersecurity improvement plans and cultivate information-sharing and cooperation activities.

Seminar: Cybersecurity Emerging Trends and Threats for 2014

The seminar introduced participants to the current tactics, techniques, and procedures that malicious actors are deploying against network infrastructure worldwide. Ken Bell, senior cyber intelligence analyst at Raytheon and adjunct fellow at the Pell Center, examined the emerging trends and threats related to cybersecurity for 2014 and discussed proactive measures to help organizations, regardless of their size/industry, better protect their proprietary information and assets from those emerging threats.

"But They Said It Was Secure!" A Workshop on Improving Communication Between Senior Leaders and IT

The workshop focused on the often missing link in cybersecurity - plain English communication between IT people and executives, whose responsibility is to protect company assets and reputation. Subject matter experts April Lorenzen and Nat Kopcyk from Dissect Cyber led the workshop and various group exercises and activities on some of the most pressing cybersecurity topics. Participants came away with a better idea of how to infuse a stronger culture of security, proof and transparency into the protection of their organizations' sensitive information and digital assets.

"Improving Critical Infrastructure Cybersecurity: The National Cybersecurity Framework and Beyond"

The panel discussion explored how Rhode Island organizations charged with providing the state and nation’s financial, energy, health care and other critical systems could use the National Cybersecurity Framework to better protect their information and physical assets from cyber attacks. The panel included Adam Sedgewick, National Institute of Standards and Technology senior information technology policy adviser; Michael Leking, the Department of Homeland Security’s cybersecurity adviser for the Northeast region; and Jamia McDonald, executive director of the state’s Emergency Management Agency. The three distinguished panelists discussed the specifics of the framework and other national and state initiatives to support its implementation. In addition, Sen. Sheldon Whitehouse (D-RI) and Rep. James Langevin (D-RI) delivered keynote speeches and acknowledged the commitment of R.I. leaders to strengthen the state’s cybersecurity posture and of institutions, like the Pell Center, that provide an excellent forum for regional efforts in this field.

Public Lecture: Peter Singer

Seminar: "End User Security Awareness Doesn't Stop With Awareness - Foster Safe Security Behavior, Evaluate and Measure Progress"