Free-To-Attend Cyber Security Online Event!

May 04 - 06, 2021

Agenda Day 2

  • Identifying and mitigating new and unique risks & threats associated with identity as the perimeter
  • Propelling forward to trust-as-the-perimeter
  • Breaking the shackles of Identity as an isolationist issue through value chain collaboration
  • Truly allowing for the Customer Journey and redefining the Customer Experience
  • Realizing that the technology is never the problem- it's always about the the interoperability and governance
img

Martin Ingram

Product Owner, IAM
Royal Bank of Scotland

img

Andrew Beauchamp

Group Head- Director of Identity
FWD

10:00 am - 10:45 am EST GRC: Outpacing Regulatory and Standardization Mandates

Todd Fitzgibbon - GRC Offering Lead, OneTrust

Cyber security is continuing to experience a global wave of legal and regulatory changes. When an enterprise is unprepared for changes in compliance, they open themselves up to not only legal ramifications but also security threats. CISOs have an ever more important role to play in the execution of regulatory compliance frameworks. 

  • Current established regulatory compliance frameworks and CISO’s role in them
  • Partnering with third parties for compliance assessments
  • Why compliance standards are an asset to the cyber security team; not a burden
  • Continuing an unrelenting focus on security while remaining compliant


img

Todd Fitzgibbon

GRC Offering Lead
OneTrust

11:00 am - 11:45 am EST The Past, Present and Future of Privileged Access Management

Joseph Carson - Chief Cybersecurity Scientist, Thycotic

There was a day not so long ago where privileged access management (PAM) involved simply locking down and controlling enterprise devices. Now, with the explosion of BYOD, the cloud, and digital transformations, PAM frameworks look entirely different. Discussed in this session:

  • The evolution of Privileged Access Management
  • The impact of privileged access security on today's climate
  • Immediate steps your organization can take to plan your strategic journey to privileged access security


img

Joseph Carson

Chief Cybersecurity Scientist
Thycotic

Security happens where man meets machine (or fails to happen, as we see all too often!) As organizations have shifted from local-only to hybrid and cloud-hosted resources, the principles of zero-trust security have helped define human-friendly secure access regardless of a user’s location. While building a zero-trust strategy can improve security wherever a system must make an access decision, ignoring the behavior of the user and their experience can ground these initiatives before you’ve even taken off. 

With this in mind, it becomes crucial to ask the right questions: what exactly happens where people and technology meet? At the very moment of human/system interaction, what factors in human psychology and industrial design are at play? And if we could pause time for a moment to catalog and identify those factors, could we design a better experience, a better outcome, and a better path to the future?

Join this session with J. Wolfgang Goerlich, an Advisory CISO at Duo Security, as he explores these questions and details lessons that cyber security practitioners can learn from the principles of industrial design.



img

J. Wolfgang Goerlich

Advisory CISO
Duo Security

Zoe Lindsey

Security Strategist
Duo

  • Introducing the methodology
  • Realizing who is already utilizing it form an open source perspective
  • Examining technical details of the methodology
  • Discovering how it can be used best for risk assessment 
img

Sanjay Nayar

Director, Cyber Risk Analytics and Modeling
Capital One