Sessions in Detail

Session 1: GDPR: Are your data privacy processes regulation-ready?

Presenter
Nicholas Merker, Partner and co-chair of Ice Miller’s Data Security and Privacy Practice

As the May 25th deadline for compliance with the EU's General Data Protection Regulation (GDPR) looms, companies are busy putting the finishing touches in place to comply with the new rules. By now, your GDPR house should be in order, but now it's time to put GDPR compliance planning into practice. Are you ready? The GDPR rules are already revolutionizing global companies' approach to data privacy and how they handle customer data. Even the best plans will have growing pains as they are put into practice, so we'll explore how to adapt and shift your compliance processes over time as the GDPR rules mature. In this session, you'll learn how to put the finishing touches on your information governance plans to make sure it's GDPR ready.



Click here to see all sessions

Session 2: Security operations center: The new threat hunting.

Presenter
Mike Chaple, Senior Director of IT Service Delivery - University of Notre Dame Research

With data threats proliferating, more large organizations are turning to a security operations center to centralize ops that protect information systems. As SOCs continue to mature, it’s also revolutionizing companies approach to threat hunting. Increasingly, threat analysts and other security professionals are using machine assisted and fully automated techniques to detect security incidents. While the human factor is still prevalent in this type of threat hunting, there has definitely been a shift toward these tech-driven security assessment tools that use analytics, continuous monitoring and behavior analysis to detect nefarious activity. In this webcast, you'll learn how security operations centers are changing how companies and their cybersecurity professionals approach data protection strategy.



Click here to see all sessions

Session 3: Modern Day Endpoint Protection

Presenter
Kevin Beaver, Founder and Principal Information Security Consultant of Principle Logic, LLC.

Today's endpoints are where things happen – both good and bad. Endpoints are not just where business gets done but they're also where attackers gain their foothold and carry out their attacks. Do you need the latest artificial intelligence and machine learning to keep your endpoints protected? Or, is it simply a matter of locking things down, training your users, and hoping for the best? Given the high-profile attacks we all hear about combined with the daily security struggles in businesses both large and small, it has become clear that traditional endpoint security strategies aren't working. In this session, independent security expert and writer of 12 books including the highly-successful Hacking For Dummies, Kevin Beaver, will share with you some common endpoint security oversights he sees in his work along with the varying levels of next-gen security and control you need in order to keep these critical systems in check.



Click here to see all sessions

Session 4: AI, Automation and Analytics for Operational Security Success

Presenter
Johna Till Johnson, President and Senior Founding Partner, Nemertes Research

Is your organization ready to protect itself against next-generation threats? It may not be. If you haven't deployed "the three A's" - AI, Automation, and Analytics—you're likely behind the curve when it comes to detecting and remediating potential threats. This session covers best practices for implementing and operating a "triple-A" security program, including:

  • Tools and technologies that deploy AI
  • Analytics and how to customize them
  • Effective incident response policies
  • Managing and securing cloud-based resources
  • Organizational and operational best practices for a triple-A-enabled SOC

We'll cover operational success metrics and provide a roadmap for moving your security practice further along the maturity model, for both on-premise and cloud-based resources. Finally, we'll cover how and we'll review how triple-A tools integrate with other operational dashboards, including risk management and infrastructure operations.

Click here to see all sessions