Day Two | November 11, 2020, Wednesday

9:00 am - 10:00 am Business Enablement By Way Of The BISO

Don Schmidt - Director, BISO, Fannie Mae

Business enablement happens through a true understanding of the front-line employee experience, mid-level management remit, top-level management strategy and the ultimate enterprise vision. Once achieved, that understanding informs and influences the cyber security budget presented to the Board. The final mile is then translating that business-inspired budget into a cogent business case for the enterprise. Join this session to know more on:

  • Braiding The Business, InfoSec & Technology together  
  • Working as a translator between the three groups 
  • Reducing and ultimately eliminating Shadow IT 
  • Evangelizing the importance of security throughout the entire enterprise  
  • Driving business enablement every minute of every day 
img

Don Schmidt

Director, BISO
Fannie Mae

10:00 am - 11:00 am Fireside Chat: How to Scale Web Application Security

Kevin Gallagher - CRO- Chief Revenue Officer, Netsparker

Many organizations have thousands of web applications and almost none of them has a scalable program to be in control of their web security posture. This presentation will explain what key components a good web application security program needs and how you can build or improve your application security program. Attend this session and gain a better understanding of what is involved in creating a more secure organization. 

Key Takeaways: 

  • Understand the basic needs of a secure organization
  • Learn how to build or improve a scalable application security program
  • Insight into discovery and prioritization
  • Hear how to integrate an automated solution as part of the SDLC
img

Kevin Gallagher

CRO- Chief Revenue Officer
Netsparker

11:00 am - 12:00 pm Optimized Remote Access With Zero Trust: Security without the security experience

Jay Klauser - VP of Security Alliances, NetMotion

Optimizing security, productivity and employee experience is imperative in today’s world of remote workers. For now, most companies have VPNs in place to address these requirements. Yet newer, more intelligent solutions, such as ZTNA, have emerged that promise greater network efficiency, higher reliability and enhanced security. However, the journey to ZT doesn’t happen overnight and companies must have the right tools to make a successful transition.

Attend this session and walk away understanding:

  • Compare/Contrast traditional VPN and SDP security posture
  • The security benefits of a zero trust solution
  • Lessons learned with regard to remote access in the wake of COVID 19 (i.e. employee experience, flexibility, adaptability) 
  • Market suggestions on navigating the remote access journey (e.g. having a single platform to ease the transition)
img

Jay Klauser

VP of Security Alliances
NetMotion

12:00 pm - 1:00 pm Does Phishing Prevention Require Better Technology, Detection, or Strategy?

Lior Kohavi - Chief Strategy Officer, Cyren

Phishing has proved to be a consistent problem in 2020 as the traditional form of fraud and financial extortion has evolved to include Business Email Compromise and spear phishing attacks. Combined, these threats prove successful for attackers, and a problem for the SOC as they struggle to stop them efficiently. Therefore, is a better or extra solution needed for phishing prevention? In this webinar we will look at whether there is a need for better inbox protection, for better security for Office 365 or if the issue can be resolved with what we have already. 

By attending this session, you will takeaway:

  • New tools to better fight against phishing threats
  • If Office 365 can keep up with inbound threats
  • How to arm your SOC with the ability to spot and detect phishing emails
img

Lior Kohavi

Chief Strategy Officer
Cyren

1:00 pm - 2:00 pm Fortifying the Three Legged Stool Of Information Security, Risk & Business Continuity

Santosh Kamane - Vice President Information Security, DBS Bank
  • Realizing that risk is the foundation of Cyber Security
  • Zeroing in on the information Security focus of controls and mitigation
  • Establishing business continuity with cyber security matching tenants: confidentially, availability and integrity
  • Blending requirements to ensure business needs are met, compliance is accomplished and safety is secured
img

Santosh Kamane

Vice President Information Security
DBS Bank