Cybersecurity is a priority for businesses in every sector, but budget constraints and the shortage of talent make it challenging for organizations to maintain a consistent and proactive security posture. Vendor security patching, which requires regression testing and system downtime, is both labor and time-intensive, sometimes forcing companies to delay patching. This can leave them exposed or behind schedule in implementing their own best practices or software security guidelines.
Learn how companies have solved for these budget and resource constraints and deployed a holistic, layered security model across the enterprise, providing actionable security intelligence designed to reduce potential exposure.
Anne Plese, Sr. Director Product Marketing, Rimini Street
Gabe Dimeglio, VP Global Security Services, Rimini Street
As ransomware continues to spiral out of control and other threats abound, there is a need for a better way to optimize our security controls, incident response plans, and people to prevent them. In this session we will look at how to easily adopt an offensive cybersecurity strategy by incorporating Breach Attack Simulation and Purple/Automated Red Teaming to better prepare, defend ourselves; and if breached recover in a more graceful way.
Attend this session to learn:
Dave Klein, Director, Cyber Evangelist, Cymulate
The past year has brought into stark relief the need for organizations to have strong, cloud-based security and compliance policies. As companies engage in swift digital transformation, cybersecurity now plays a much larger role and requires us to change how we have operated in the past. Stitched-together security stacks that collect data in fragments, cannot scale, and do not interoperate are no longer viable options. Instead, security teams need an end-to-end cloud platform that gives them visibility across all their IT assets no matter where they are along with automated threat prioritization, patching and response capabilities. Given the severity of today’s threats, a full cloud platform will also need to do these things continuously, even across third-party cloud platforms, so your team can always assess the organization’s global IT, security, and compliance posture. Join our conversation as we discuss the challenges our security platforms face as well as best practices for building a next-generation cloud platform that collects and analyzes telemetry data in real time for continuous threat response.
Jeremy Briglia, Director, Pre-Sales Field Operations West, Qualys
There has been tremendous attention given to recent large-scale attacks and why they have been so challenging to avoid, detect, and remediate. When attackers evade the first line of network defense, having secondary controls to fill in the gaps is crucial in detecting adversaries who can break free to infiltrate the network. This session will focus on the Achilles heel of businesses related to closing the gap between endpoint and identity protection.
Join to learn how security teams can:
We will also share how innovations in Active Directory vulnerability assessment and live attack detection are doing what security information and event management (SIEM) and log management have never been able to do. Join this session to learn how.
Tony Cole, CTO, Attivo
For a long time, we had been expecting changes in our working environments – but nobody expected 2020. What started as a steady shift to remote/flex working suddenly had to change overnight. This change was in progress and unavoidable, pandemic or not. The exorbitant price increase of metropolitan cities, worldwide rivalry for talent, progress in cloud innovation, and Millenial/Gen Z workforces are just a few of the factors that move us towards a workforce with more freedom and flexibility, a new framework being called Dynamic Work.
Join us as we discuss:
Organizations have been moving to the cloud for several years now, but in the last year, our world has forced nearly everyone to leverage the scalability and speed of cloud platforms to support a remote workforce. With so many critical business functions running from these providers, it’s imperative to protect our data, systems and assets. But traditional strategies struggle to keep up with the scope and scale of the modern cloud environment, which is forcing a change in how we approach our security assessments and mitigation techniques. In this presentation, we’ll discuss the benefits and challenges presented to many organizations by the sudden move to cloud-based services and a newly remote workforce focused on business continuity, not security. We’ll also talk about some of the new ways we must evolve how we approach security and our internal programs to better align with the fast-paced and ever-changing nature of cloud services and assets and protect our organizations effectively, efficiently and at the speed required by today’s modern attack surface.
Nathan Wenzler, Technical Security Director, Tenable