Session 1: GDPR: Are your data privacy processes regulation-ready?Presenter As the May 25th deadline for compliance with the EU's General Data Protection Regulation (GDPR) looms, companies are busy putting the finishing touches in place to comply with the new rules. By now, your GDPR house should be in order, but now it's time to put GDPR compliance planning into practice. Are you ready? The GDPR rules are already revolutionizing global companies' approach to data privacy and how they handle customer data. Even the best plans will have growing pains as they are put into practice, so we'll explore how to adapt and shift your compliance processes over time as the GDPR rules mature. In this session, you'll learn how to put the finishing touches on your information governance plans to make sure it's GDPR ready. |
Session 2: Security operations center: The new threat hunting.Presenter With data threats proliferating, more large organizations are turning to a security operations center to centralize ops that protect information systems. As SOCs continue to mature, it’s also revolutionizing companies approach to threat hunting. Increasingly, threat analysts and other security professionals are using machine assisted and fully automated techniques to detect security incidents. While the human factor is still prevalent in this type of threat hunting, there has definitely been a shift toward these tech-driven security assessment tools that use analytics, continuous monitoring and behavior analysis to detect nefarious activity. In this webcast, you'll learn how security operations centers are changing how companies and their cybersecurity professionals approach data protection strategy. |
Session 3: Modern Day Endpoint ProtectionPresenter Today's endpoints are where things happen – both good and bad. Endpoints are not just where business gets done but they're also where attackers gain their foothold and carry out their attacks. Do you need the latest artificial intelligence and machine learning to keep your endpoints protected? Or, is it simply a matter of locking things down, training your users, and hoping for the best? Given the high-profile attacks we all hear about combined with the daily security struggles in businesses both large and small, it has become clear that traditional endpoint security strategies aren't working. In this session, independent security expert and writer of 12 books including the highly-successful Hacking For Dummies, Kevin Beaver, will share with you some common endpoint security oversights he sees in his work along with the varying levels of next-gen security and control you need in order to keep these critical systems in check. |
Session 4: AI, Automation and Analytics for Operational Security SuccessPresenter Is your organization ready to protect itself against next-generation threats? It may not be. If you haven't deployed "the three A's" - AI, Automation, and Analytics—you're likely behind the curve when it comes to detecting and remediating potential threats. This session covers best practices for implementing and operating a "triple-A" security program, including:
We'll cover operational success metrics and provide a roadmap for moving your security practice further along the maturity model, for both on-premise and cloud-based resources. Finally, we'll cover how and we'll review how triple-A tools integrate with other operational dashboards, including risk management and infrastructure operations. |