Information Security Leaders Content Week Agenda

The board’s role in the oversight of organizational risk is increasingly complicated by cybersecurity concerns. Directors need to maintain continual knowledge about evolving cyber issues and management’s plans for allocating resources with respect to the preparedness in responding to cyber risks. Such knowledge helps boards assess the priority-driven and investment decisions put forth by management needed in critical areas. As a security professional, focusing on risk over compliance empowers you to amplify your team’s value and speak the “language of the board.” This is true even if you currently struggle to relate your role to your organization’s bottom line or feel like you’re drowning in data that lacks context.

This session will demonstrate how shifting from tick-box exercises to maturity models grounded in security intelligence can help you achieve compliance with industry standards while strengthening your overall security posture. You’ll also hear real-world perspectives on balancing risk appetite and strategy execution and how to elevate that to the board.

With an increasingly heightened focus on security, but budgets still averaging at less than 5% of total IT spend, navigating the technology assessing the right investments to make is imperative.

Join this roundtable session for a candid discussion on best practices for qualifying security technology to ensure you avoid expensive mistakes.

Make sure you sign up early! This intimate roundtable session will be capped at 50 participants.

Organizations have been moving to the cloud for several years now, but in the last year, our world has forced nearly everyone to leverage the scalability and speed of cloud platforms to support a remote workforce. With so many critical business functions running from these providers, it’s imperative to protect our data, systems and assets. But traditional strategies struggle to keep up with the scope and scale of the modern cloud environment, which is forcing a change in how we approach our security assessments and mitigation techniques. In this presentation, we’ll discuss the benefits and challenges presented to many organizations by the sudden move to cloud-based services and a newly remote workforce focused on business continuity, not security. We’ll also talk about some of the new ways we must evolve how we approach security and our internal programs to better align with the fast-paced and ever-changing nature of cloud services and assets and protect our organizations effectively, efficiently and at the speed required by today’s modern attack surface.

Nathan Wenzler, Technical Security Director, Tenable

As a Virtual Mobility Service (VMS) provider, Hypori delivers an ultra-secure, centrally managed, reduced-cost BYOD solution that employees want to use. With Hypori Virtual Mobility, you maintain 100% separation of personal and enterprise data with zero device footprint. A mobilized workforce is our present and our future state of work. A virtual mobility solution like Hypori allows employees to use personal devices while maintaining privacy. Hypori provides the highest cybersecurity levels and addresses enterprise-wide technology needs. Come explore Hypori with us and understand how VMS can support your organization.

Sponsored by Hypori

The more mobile and remote a workforce is, the more likely that an employee may cause an accidental breach. Workers themselves will also see ways to benefit from the wealth of data that they can now access without the same level of supervision. Even prior to the events of 2020, insider threat cases reportedly accounted for about 30% of breaches and other security incidents.

This session will provide the opportunity to share ideas and strategies on combating internal threats in order to protect against the threats an increasingly growing remote workforce presents.

Make sure you sign up early! This intimate roundtable session will be capped at 50 participants.

Organizations today struggle with manually operating complex and expensive multi-product security stacks. This weakness became increasingly more apparent in following the events of 2020.

Autonomous Breach Protection is a new paradigm that introduces a new age to cybersecurity. This session will help:

  • Understand the core building blocks of autonomous breach protection.
  • Gain insight into the operational and security benefits of security consolidation.
  • Become familiar with how Sensor Fusion-based technology revolutionizes the way cybersecurity is practiced.

Sponsored by Cynet

The job of the security executive is tough. Changes to the professional landscape as a result of the pandemic have presented new challenges as businesses adopt work from home policies. Executives are now being asked to produce more with less during a time of ever-growing threat sophistication–to say these are unprecedented times is an understatement. Successful leaders are having to pivot, and adopting a threat-informed defense strategy is one of the best ways to do so. Threat frameworks like MITRE ATT&CK offer tremendous opportunity for you to reshape your security program and bring constant validation of effectiveness, create meaningful and real metrics to measure and benchmark performance, and model emergent threats to know where you really stand. This talk will walk you through the many use cases that can lead you down a tractable path of security optimization.

In the debate over an all-in-one cybersecurity platform versus best of breed solutions, the overwhelming majority lean towards best of breed in order to leverage the most impactful technology. However, does true best of breed exist? This session will look to explore this debate and how to implement a best of breed strategy when tech doesn’t necessarily integrate with other tech.

Make sure you sign up early! This intimate roundtable session will be capped at 50 participants.

Transforming your organization to be Cyber Resilient is no small feat and requires commitment from your boardroom to your staff. This session will focus on achieving Cyber Resilience with three simple steps: Protect, Detect, and Evolve.

Interested in speaking?
Please submit a request below.