Session 1: GDPR: The Data Security Processes to Remain CompliantPresenter This session will explore how companies should assess their current data security systems to identify what processes are GDPR-ready and what must be updated to remain compliant. |
Session 2: 5 Opportunities for Security Improvements in a Cloud Microservices Architecture (will also discuss microsegmentation)Presenter Microservices are increasingly an enterprise software architecture strategy, particularly in organizations that are using containers in the cloud. For all the ways that they facilitate agile development and continuous improvement, microservices create new attack surface and, to date, this hasn’t been widely discussed. But there are good ways to approach both securing microservices and providing security capabilities as microservices themselves. What emerges is that tying security to microservices gives security departments to supply continuous improvement in security that matches the fast deployment cycles of agile software teams. |
Session 3: Ransomware: More Than Just Your Next Incident, It’s the FuturePresenter At the end of the day, ransomware is just malware with "payment due" stamped on it. Stop malware in general and you’ll stop ransomware in particular, or at least that's the theory. But of course you won't stop everything and your incident response plan now has to cope with those ransom notes. There's a whole economy of malware development, customer support and underground transaction settlement that points more toward where cybercrime is headed than it does at where traditional malware has been. |
Session 4: Tapping into Incident Management Data to Prevent Future RiskPresenter This session will explore how companies can use incident management-related data collection, classification, and analytics to inform future risk management strategy. |