Overcoming Data Overload: Data Discovery and Risk Formulas That Standardize Risk at Scale
Nick Pavlichek, GRC Product Manager, OneTrust
Every organization is working to reduce the delay between issuing a risk assessment, receiving a response, gaining risk insight, and making a risk-based decision. Risk insights quickly lose value as time elapses from the initial assessment request, so businesses should leverage automated data discovery tools to find, document, and classify in real-time. Join us as we review how to quickly connect enterprise data through automated data discovery and translate the data into meaningful risk insights.
Navigating Enterprise Security in a Post-Compromise Reality
Dan Greer, Director of Sales Engineering, ExtraHop
Every organization gets compromised, and it’s how fast you detect and respond to an incident that matters. This takes on increasing urgency with the overnight move to remote work, rise in encrypted traffic, acceleration of cloud adoption, and proliferation of IoT that’s expanded and complicated the attack surface. Join us as we explore these trends and the post-compromise opportunities for security teams to prevent an event leading to an outage, or an incident becoming a full-scale data breach.
New IT, But Same Old Threat: A Modern Look at Identity Security
Barak Feldman, Senior Vice President, Identity Security GTM, CyberArk
The world has changed to remote/hybrid work, more cloud workloads and infrastructure, and DevOps tools driving digital transformation – all so businesses can modernize and enhance productivity. The result is an explosion of identities and an increased attack surface. A new approach to security is required, where identity is the new battleground, every user’s identity is verified, and privileged access is limited to just what they need and removed when they don’t need it. Join us as we discuss a modern approach to identity security, where securing privilege is still #1.