Session 1: The new IG: The Identity Governance and Compliance BalancePresenter As the number of users, systems and applications in the typical enterprise IT environment has grown, it has become increasingly difficult to maintain accurate and reliable data about very user on every system. Identity governance products not only enable organizations to define, enforce, review and audit identity/access management (IAM) policy, but also map IAM functions tothe organization's unique compliancerequirements and audit user access to support compliance reporting. In this session, learn about identity governance strategies to maintain data security and regulatory compliance. Topics covered will include:
|
Session 2: Cybersecurity Analytics Meets AI: Network, IT Threat Detection StrategiesPresenter With company data spread across multiple on-premises and cloud-based endpoints, conducting cybersecurity analytics is a challenge. Artificial intelligence technologies are helping identify anomalies in IT systems, analyze the network for potential threats and provide notifications when threats are detected. However, AI-based cybersecurity analytic capabilities are still in their infancy, and require human maintenance as well as high quality data to be effective. In this session, learn how to tap into AI to improve cybersecurity analytics capabilities. Topics covered will include:
|
Session 3: Putting an End to Endpoint Security Risks with Modern ToolsPresenter Late last year, Gartner redefined endpoint protection to incorporate new approaches and tools, such endpoint detection and response (EDR), to refine this critical aspect of enterprise security. With new vendor solutions coming to market, EDR is front and center in the battle to keep desktops secure in areas where traditional anti-virus tools have fallen short. In this webcast, independent information security consultant, Kevin Beaver of Atlanta, Georgia-based Principle Logic, LLC will talk about endpoint security risks, what he sees in his work, and what you need to be thinking about in this final, yet elusive, frontier of security. You'll learn about how EDR vendors are responding to the rise in attack complexity while reducing the management requirements that come with more and more endpoint security controls. You'll also hear about how you can tweak your systems and processes to fine-tune the oscillation of threats and vulnerabilities at the endpoint to bring your security program full circle. |
Session 4: When Worlds Collide: Cybersecurity, Virtualized Infrastructure, and Next-Generation Software DevelopmentPresenter Software developers are moving from traditional waterfall to agile and DevOps development based on microservices, microsegmentation, and containers. Infrastructure teams are increasingly virtualizing, deploying software-defined networks (SDN) and software-defined WANs (SD-WANs). But what are the cybersecurity implications of these shifts in software development and infrastructure architecture? This session takes a cybersecurity lens to the followingtechnology areas:
We'll review these concepts and assess them from two angles. First, we'll discuss the cybersecurity implications of these technologies, and what steps cybersecurity teams should take to secure them. Then we'll discuss how next-generation cybersecurity initiatives can take advantage of the inherent capabilities of these technologies. |