Sessions in Detail

Session 1: The new IG: The Identity Governance and Compliance Balance

Presenter
Jeffrey Ritter, Founder, Ritter Academy

As the number of users, systems and applications in the typical enterprise IT environment has grown, it has become increasingly difficult to maintain accurate and reliable data about very user on every system. Identity governance products not only enable organizations to define, enforce, review and audit identity/access management (IAM) policy, but also map IAM functions tothe organization's unique compliancerequirements and audit user access to support compliance reporting.

In this session, learn about identity governance strategies to maintain data security and regulatory compliance. Topics covered will include:

  • Implementing the key components of identity governance, including access requests, access certification, auditing, reporting and analytics, workflow management, entitlement management, and identity lifecycle management.
  • Authentication processes, including how they can fail and what organizations can do to prevent compliance risk
  • Authorization techniques to ensure that user profile data is accurate and reliable.
  • Auditing best practicesto audit identity management processes and strategies, including how to test the limitations of identity governance compliance



Click here to see all sessions

Session 2: Cybersecurity Analytics Meets AI: Network, IT Threat Detection Strategies

Presenter
Dave Shackleford, Owner and Principal Consultant of Voodoo Security

With company data spread across multiple on-premises and cloud-based endpoints, conducting cybersecurity analytics is a challenge. Artificial intelligence technologies are helping identify anomalies in IT systems, analyze the network for potential threats and provide notifications when threats are detected. However, AI-based cybersecurity analytic capabilities are still in their infancy, and require human maintenance as well as high quality data to be effective.

In this session, learn how to tap into AI to improve cybersecurity analytics capabilities. Topics covered will include:

  • Steps to ensure data quality –AI analytics relies on valid, up to the minute network operations data to avoid false positives and incorrect threat detection.
  • Strategies to identify vulnerabilities in IT operations where AI and machine learning capabilities will prove most useful for threat detection
  • Best practices to use AI tech to augment the security team's data protection techniques and operations
  • Cybersecurity data analysis strategies that can be used to improve AI algorithms and their threat detection capabilities



Click here to see all sessions

Session 3: Putting an End to Endpoint Security Risks with Modern Tools

Presenter
Kevin Beaver, Founder and Principal Information Security Consultant of Principle Logic, LLC.

Late last year, Gartner redefined endpoint protection to incorporate new approaches and tools, such endpoint detection and response (EDR), to refine this critical aspect of enterprise security. With new vendor solutions coming to market, EDR is front and center in the battle to keep desktops secure in areas where traditional anti-virus tools have fallen short. In this webcast, independent information security consultant, Kevin Beaver of Atlanta, Georgia-based Principle Logic, LLC will talk about endpoint security risks, what he sees in his work, and what you need to be thinking about in this final, yet elusive, frontier of security. You'll learn about how EDR vendors are responding to the rise in attack complexity while reducing the management requirements that come with more and more endpoint security controls. You'll also hear about how you can tweak your systems and processes to fine-tune the oscillation of threats and vulnerabilities at the endpoint to bring your security program full circle.



Click here to see all sessions

Session 4: When Worlds Collide: Cybersecurity, Virtualized Infrastructure, and Next-Generation Software Development

Presenter
Johna Till Johnson, President and Senior Founding Partner, Nemertes Research

Software developers are moving from traditional waterfall to agile and DevOps development based on microservices, microsegmentation, and containers. Infrastructure teams are increasingly virtualizing, deploying software-defined networks (SDN) and software-defined WANs (SD-WANs). But what are the cybersecurity implications of these shifts in software development and infrastructure architecture?

This session takes a cybersecurity lens to the followingtechnology areas:

  • Microservices
  • Microsegmentation
  • Containers
  • SDN
  • SD-WAN

We'll review these concepts and assess them from two angles. First, we'll discuss the cybersecurity implications of these technologies, and what steps cybersecurity teams should take to secure them. Then we'll discuss how next-generation cybersecurity initiatives can take advantage of the inherent capabilities of these technologies.

Click here to see all sessions