-
Closing the Skills Gap with Smarter Cybersecurity Hiring and Team Development
Clar Rosso, CEO, (ISC)2
Stephen Khan, Chair, ClubCISO
Kunjal Tanna, Director, LT Harper
With more than 3 million cybersecurity roles estimated to be unfilled across the globe, organizations and security leaders must evolve hiring and team development strategies to incorporate smarter, more forward-thinking approaches. Organizations have the power to not only more efficiently secure the cybersecurity talent they need but also better train and successfully keep skilled team members for the long term. In this session, a panel of global experts will define what smarter recruitment and team retainment means for organizations.
Interviewed by: Michael Hill, UK Editor, CSO, IDG Communications, Inc.
Click here to watch session!
-
How to Achieve Least Privilege at Cloud Scale with Cloud Infrastructure Entitlement Management (CIEM)
Maya Neelakandhan, Head of Customer Success and Support, CloudKnox Security
Achieving security in the cloud is an always-moving target. With more than 95 percent of human and machine identities using less than five percent of the permissions granted, this “cloud permissions gap” has become the biggest roadblock to organizations protecting their critical cloud infrastructure. Join us to learn about Cloud Infrastructure Entitlement Management (CIEM), a new approach to closing the gap by managing permissions with continuous and automated enforcement of least privilege in the cloud.
Click here to watch session!
-
How to Stop Attackers from Owning Your Active Directory
Carolyn Crandall, Chief Security Advocate, Attivo Networks
Tony Cole, Chief Technology Officer, Attivo Networks
Active Directory is a high value target based on its ability to grant elevated permission and escalate attacks. It’s inherently vulnerable, constantly changing, and organizations trying to protect it in traditional ways are find themselves highly exposed to ransomware attacks. Join us for an overview of top attack tactics — and how new tools can: automate the finding of exposures; data cloak Active Directory objects’ and detect and derail live attacks.
Click here to watch session!
-
How to Create Cyber Resilience for Digital Operations
Christopher Morales, CISO and Head of Security Strategy, Netenrich
In a world of advanced, targeted attacks, security operations needs context awareness to ensure the success of business initiatives. For security, IT and cloud operations to thrive during adversity, organizations need adaptive incident resolution using real time, data driven risk and trust-based decision-making. Join us to learn how to streamline the process of managing, analyzing, and fixing the root cause of incidents in order to prevent future disruption.
Click here to watch session!
-
How DevSecOps is Critical to a Successful Cloud Strategy
Sathish Muthukrishnan, Chief Information, Data and Digital Officer, Ally Financial
Ally is one of the largest full-service automotive-finance operations in the country offering a range of financial services and insurance products to automotive dealerships and consumers — and its Ally bank offers mortgage lending and banking products. To deliver nimble, flexible and always-available digital services to customers, the organization leverages a cloud strategy for speed, agility and customer focus. Join us to hear about the many facets of their cloud journey, including a cloud center of excellence and DevSecOps.
Interviewed by: Derek Hulitzky, VP, Content Development & Strategy, IDG Communications, Inc.
Click here to watch session!
-
How to Use Cyber Asset Management to Build a Strong Security Program
Akash Ganapathi, Principal Solutions Architect/Team Lead, JupiterOne
Cyber asset management is about understanding all of your assets and the context of how they interoperate to strengthen your company’s cyber risk posture and security program. At the same time, cloud native security is more complex than ever, and the growing challenge of asset management requires a different approach to support a strong security program. Join us as we discuss ways to address these challenges, and how to support multiple facets of your security program beyond asset inventory.
Click here to watch session!
-
Top Strategies for Securing Your Transformation to the Cloud
Jason Mitchell, SVP Engineering, Centrify
With 80% of organizations predicted to migrate toward cloud, hosting and colocation services by 2025, new attack surfaces will arise and create greater security vulnerabilities. Yet just in the last year, recent studies report that 70% of organizations experienced a public cloud security incident. What can you do to safeguard your infrastructure and services both during and after cloud migration? Join us to discuss what IT and security leaders are finding most effective for managing a secure transformation to the cloud.
Click here to watch session!
-
Ransomware in Focus: How AI Surgically Contains the Threat
Brianna Leddy, Director of Analysis, Darktrace
In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom, or shut down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad-ranging and destructive, with organizations taking days, weeks, or even months to recover. But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? Join this presentation to learn how Self-Learning AI is helping thousands of organizations fight back against ransomware.
Click here to watch session!
-
How can you be ready for the cyber-attack that’s heading your way?
Don Foster, Global Vice President, Sales Engineering, Commvault
Never has your data been more valuable or more vulnerable. Bad actors have multiplied and become more sophisticated. Increased workload complexity and geo distribution mean that a solid ransomware recovery readiness strategy is no longer optional — it’s mission-critical. We’ll show how automated anomaly detection can secure foundational data stores, while validation and oversight can eliminate unpleasant surprises. Planning for recovery allows you to prepare for the worst while remaining in full control.
Click here to watch session!
-
Measuring Security & Building Trust: Digital Transformation Insights from Leaders
Ritesh Patel, Security Principal, bp
Ronald Ulko, Director of Security Enablement, Synack
Aisling MacRunnels, Chief Business and Growth Officer, Synack
Organizations and security professionals across industries are taking proactive measures to strengthen their defenses and protect their most important asset – trust. Join us for this session where industry leaders discuss how they measure security risk and discuss digital transformation trends and the testing needed to navigate these transitions securely.
Click here to watch session!
-
How to Gain Holistic Visibility with Security
Presented by Elastic
Modern security challenges require full visibility across the entire organization. At its core, security is a data and scale problem, and being able to search, analyze, and process data at scale and with speed is critical to success for security teams. With a solid data foundation, teams can operationalize security use cases at scale and evolve quickly. Join this fast-moving session to see Elastic’s approach to security visibility in action.
Click here to watch session!
-
How to Operationalize GRC
Rob Ellis, Senior Vice President of Sales, Reciprocity Labs
By definition, to operationalize something means to set something up so that it can be measured. Today’s organizations have an opportunity to operationalize GRC and move beyond the outdated “check the box” model of compliance. Join us as we demonstrate how CISOs and their peers can measure their GRC program against metrics, and use continuous monitoring to mature beyond reactive compliance to take a proactive risk-based approach.
Click here to watch session!
-
Experian Customer Story
Palo Alto Customer Story: Experian
See how Experian gains a unified view of security and compliance across multi-cloud environments.
Click here to watch session!
-
Three Strategies to Ensure Cybersecurity and Resilience for Hybrid Microsoft Identities
Robert Bobel, Founder and Chief Executive Officer, Cayosoft
Whether by malware or insider threats, attackers seek to exploit weaknesses, especially if they can gain access to your Active Directory. With cybersecurity threats continuing to rise, it’s crucial to protect this sensitive data. Join us as we share strategies to secure and protect hybrid Microsoft identities, and how to use them to sustain your security, compliance, and IT efficiency goals.
Click here to watch session!
-
Trusting the Un-trustable: How to Remotely Verify the Integrity and Identity of Edge-to-Cloud Software
Andrew Jessup, Director of Product Management, Security Engineering, Hewlett Packard Enterprise
As both users and software systems have become widely dispersed, “zero trust” has become a rallying cry to make sure those software systems operate securely. But when software is distributed to a remote data center, cloud environment, or edge appliance out in the field, how can its integrity — and therefore trustworthiness — be determined? Join us as we explore Project Aurora, a framework developed by security researchers at HPE to protect and ensure “trustworthiness” of critical assets in distributed customer environments.
Click here to watch session!
-
Preparing for the Next Generation of Ransomware Attacks
JJ Cranford, Product Marketing Manager, Cybereason
The sophistication of ransomware has increased, while the bar is lowering for bad actors to deploy and operate successful attacks. Join us to understand: the anatomy of a modern ransomware attack from initial foothold to encryption of sensitive data; the connection between the HAFNIUM attack on Microsoft Exchange servers and modern ransomware tactics; and how Cybereason technology can fully prevent, detect and remediate sophisticated ransomware operations.
Click here to watch session!
-
How to Integrate Security as a Front End Feed to Your GRC
Nick Pavlichek, Product Manager, OneTrust
Security applications and monitoring systems hold key GRC program insights, but how can security teams tap into them to inform better business decisions? Join us understand the state of security and GRC alignment as well as integration considerations, identify key security systems and focused KRI’s for real-time insights, how to safeguard your business against data overload and keep your data clean, and how to power program synergies across security, risk, and compliance through automation.
Click here to watch session!