Cyber Defense Strategies for Earlier Detection and Faster Response
Delve into the flaws of the traditional cybersecurity landscape and how a modern SOC should focus on outcome-based services without relying on logs or the cost and complexity of a SIEM
Presented by: Hamlet Khodaverian, VP, Americas, LMNTRIX
Wrangling Sensitive Data Sprawl: How to Shrink Your Data Protection Footprint
The footprint of sensitive data — such as PII, payment details and health information — is growing rapidly in many enterprises. Security officers contend by spreading their resources thinner, an impractical strategy in an era of scarce security talent and tight budgets. Join this interactive session to discuss the primary driver of sensitive data growth, the drawbacks of the common mitigation strategies, and an architectural paradigm shift that stops the sprawl of sensitive data while accelerating access to data for your most important innovators.
Presented by: Aaron Jensen, Senior Manager Solution Engineering & Devops Advisor, Delphix
Designing and Implementing a 3rd Party Risk Management Program
From vendor selection and due diligence to ongoing monitoring and compliance, this session equips business leaders with practical insights and tools to proactively address and mitigate risks associated with external partnerships, ensuring a secure and resilient operational ecosystem
Presented by: Keith Deininger, VP Enterprise Technology, Truist
Using Realistic Attack Scenarios and Simulations to Validate, Measure, & Optimize Security Controls
Breach and Attack Simulation (BAS) validates cybersecurity controls by safely conducting threat activities, tactics, techniques, and procedures in production environments. BAS provides security teams the ability to test security architecture, people, and processes for continuous assessment of cyber resilience.
This session will demonstrate the core capabilities of a breach and attack simulation platform so you can see a comprehensive and scalable solution for security leaders, regardless of your security posture maturity, to drive your continuous threat exposure management program and support both the technical and business requirements of scoping, discovery, prioritization, validation, and mobilization.
Presented by: Jessica LaBouve, Sales Engineer, Cymulate
The Role of ERP in Security and AI
The ERP is the backbone of most organizations. Software packages from large vendors such as Oracle and SAP are essential for back-end business operations. But how do they fit into emerging technology strategies such as Cloud, AI/ML, Security, and other competitive growth initiatives? Come to this session to learn about the intersection of ERP and emerging technology and ways to find the right allocation of resources between operations and innovation.
Presented by: Eric Helmer, Chief Technology Officer, Rimini Street
Achieving the Benefits of Converged Endpoint Management
Managing endpoint risk and compliance is more challenging today than ever before. Today’s CISOs have to manage risk from many thousands of globally distributed, heterogeneous assets, while also responding to ever increasing audit scrutiny and regulatory compliance requirements.
Join this session, Achieving the Benefits of Converged Endpoint Management, to learn more about how to:
- Identify & remediate risks that create the greatest exposure.
- Assess & measure unknown vulnerabilities.
- Maximize IT budgets and staffing during economic uncertainty.
- Enhance existing investment in strategic technology vendors.
Presented by: Tim Heichel, Director of Technical Account Management, Tanium
Risk Management in the Era of AI
This session provides a comprehensive exploration of the challenges and opportunities that arise with the integration of Artificial Intelligence (AI) in various industries. We’ll examine the intricacies of managing risks associated with AI technologies, highlighting the potential pitfalls and benefits they bring. By examining real-world examples and case studies, we’ll shed light on the complexities and ethical considerations involved in harnessing AI’s power while mitigating potential risks.
Presented by: Ed Moore, AVP of IT Security – IAM, Carnival Corporation
Unlocking Potential: How Increasing Women's Participation in IT Leads to Better Performing Teams
This session explores the importance of women’s participation in the field of Information Technology (IT) and its positive impact on team performance. The session aims to shed light on the challenges faced by women in the IT industry, identify strategies to increase their participation and discuss the resulting benefits for teams and organizations.
Presented by: Helen Knight, Vice President, Information Technology, Legal Aid Alberta