-
Challenge Security’s Rules: Transform the Threat Surface to Proactive Control
Robert DeVito, Global Director, Customer & Partner Sales Engineering, Chrome
With the increase in distributed workforces and the growing adoption of cloud applications, companies face unprecedented levels of IP, data, and identity sprawl beyond the enterprise firewall. Every endpoint is an entry into your business, cybercriminals have more access than ever, and human error is a constant risk. Join us to see how Chrome OS and Chrome Browser embed security into workflow to give proactive protection for users, devices, applications, and data.
Click here to watch session!
-
Identity Detection and Response (IDR): Are You Ready?
Carolyn Crandall, Chief Security Advocate, Attivo Networks
Joseph Salazar, Technical Marketing Engineer, Attivo Networks
81 percent of breaches use stolen credentials, 40 percent of security professionals say protecting Active Directory is core, and 87 percent of organization are increasing investment in identity protection. Whether motivated by risk avoidance or compliance, identity security is a top concern for CISOs of all industries and company sizes. Gartner has even presented it as a Top 3 priority for 2021. Join us to learn about visibility and detection tools that have emerged to protect credentials, entitlements, and the systems that manage them.
Click here to watch session!
-
Managed Detection and Response: Trends and Insights for the Threat Landscape
Eric Payne, Sr. Enterprise Pre-sales Engineer, Kaspersky
As cyberattacks become more sophisticated, many organizations feel the need for advanced security services that can address growing complexity in real-time, and 24/7. Join us as we share insights and trends discovered during real-life investigations by the Kaspersky Managed Detection and Response team, observations from analyzing incident statistics, and key recommendations.
Click here to watch session!
-
Insider Risk Management: Trust, Prioritization, and Right-Sized Controls
Joe Payne, CEO, Code42 Software
The evolution of work demands more trust, not less. A security analyst’s well-being comes down to one thing: priorities. And today’ collaboration culture requires a tiered response – both technical and educational. Join us as we explore how these concepts deliver short-term dividends and long-term value for the security team and the business.
-
A Proactive Approach to Risk Mitigation
Dor Dali, Director of Information Security, Vulcan Cyber
Vulnerabilities are piling up, attack surfaces are growing, and security teams are struggling to maintain SLAs. If security teams are going to get ahead of a flood of security alerts, they can’t take the typical passive approach, where security teams respond when external actors act. Join us to learn how to take a more proactive and intentional approach to risk mitigation.
Click here to watch session!
-
Demystifying and Implementing Zero Trust
Jason Ellis, Director of Advisory Services, Integral Partners
Wondering how to define and implement Zero Trust? This Zero Trust and IAM Essentials Workshop Overview will help you understand how to determine what Zero Trust really means and the best practical approaches to develop an IAM + ZT strategy. From its history and evolution to building blocks and architecture. The insightful workshop also covers the essentials of Identity and Access Management – the terms, technologies, tools, challenges, exercises, roadmapping, and vendor solutions.
Click here to watch session!
-
Six Steps To Better Data Control
Yacov Salomon, Founder, Chief Innovation Officer, Ketch
Is your organization’s data an asset, or a liability? The interplay between the promise of data and the imperative of privacy can often devolve into a zero-sum tradeoff: either your organization captures and uses data and AI to grow, or it complies and suffers the competitive consequences. Join us to learn about six steps you can take to gain better control of your data, and put your most valuable asset to work.
Click here to watch session!
-
Securing the Hybrid Workforce: How to Establish Trust in a Zero Trust World
Ryan Terry, Sr. Solutions Product Marketing Manager, Okta
As companies look for long-term solutions for their hybrid and fully remote workforces, one thing is clear: identity is the new perimeter for today’s businesses. An identity-first approach to security reduces today’s cybersecurity risks and provides the foundation for a zero trust security strategy. Join us to learn how to enable and secure a hybrid workforce, how identity can lay the foundation for any zero trust security initiative, and the kinds of zero trust projects your peers are thinking about now and into the future.
Click here to watch session!
-
The Great Data Exfiltration: Protecting Business in a Raging Job Market
Joe Payne, President and CEO, Code42 Software
The Great Resignation is upon us, threatening intellectual property in its wake. Nearly 60 percent of employees are now moving to a new company in a similar field, and they’re taking data at alarming rates. Join us to learn how a data security approach rooted in trust, prioritization, and right-sized response to insider risk can create better efficiencies, and pay short-term dividends and long-term value.
Click here to watch session!
-
XDR and CTI: How they Converge to Improve Security Risk Mitigation
Alon Arvatz, Chief Product Officer, IntSights
Security and risk leaders need more context about the threats across their company’s internal and external attack surfaces — and they need the ability to ensure a rapid and complete response. Join us as we explore the intersection of extended detection and response (XDR) and cyber threat intelligence (CTI). We’ll reveal how CTI extends your company’s monitored environment, ways to improve signal-to-noise ratio to better understand your real risk, and the latest technologies for driving a proactive and automated response.
Click here to watch session!
-
Compliance as a Catalyst for Reducing Risk
Rob Ellis, Senior Vice President of Strategy, Reciprocity Labs
Compliance is a required part of risk management, but is your compliance tool helping you bridge compliance and risk? Effective compliance is a catalyst for developing a proactive, risk management program by providing effective controls and tools that assess, manage and monitor risk. Join us as we discuss how compliance isn’t just about checking a box, and is instead about proactively protecting your company — and providing assurance so that others trust doing business with you.
Click here to watch session!
-
Time Off for the Holidays? Cyber Defenses Can’t Afford It
Tony Lee, Vice President, Global Services Technical Operations, BlackBerry
Threat actors are launching major attacks during U.S. holidays. This tactic compelled the FBI and CISA to issue a joint warning stating, “Cyber actors have conducted increasingly impactful attacks against U.S. entities on or around holiday weekends over the last several months.” Notable examples include the Colonial Pipeline on Mother’s Day, JBS Foods on Memorial Day weekend, and Kaseya on Independence Day. What went wrong? Join us to find out, and for tips on protecting your organization from holiday hacks.
Click here to watch session!