Agenda Day 1

9:00 am - 9:45 am Cyber Security Evolution

Elad Hod - BISO, Bloomberg LP
  • Realizing the dynamic change to the cyber security landscape in the past year
  • Understanding third party products are now the gateways into our networks
  • Knowing that Defense in Depth is vital but you still can and will be compromised
  • Gaining a breach-first mentality and focusing resources on limiting the damage
  • Keeping up with compliance and internal audit
  • Conceptualizing the threat actors, you need to worry about it including Dave from accounting and nation states
  • Ascertaining that lucrative businesses are our adversaries
  • Understanding your risk tolerance and continually evolving your program accordingly
  • The happy news is to prepare for the worst


img

Elad Hod

BISO
Bloomberg LP

10:00 am - 10:45 am Effective Detection & Response By Connecting People, Process & Technology

Louis Evans - Product Marketing Manager, Arctic Wolf
Matt Trushinski - Director, Product Marketing, Arctic Wolf

According to the IBM Cost of Data Breach Report, the average 2020 breach took 207 days to identify and 73 days to contain. Breaches caused by malicious attacks took the longest to identify and contain, an average of 315 days. What if you could detect the undetectable in minutes rather than months?

When it comes to mitigating the impact of any security incident, it’s a race against time to ensure the safety of your team’s most valuable assets.

Join us for a conversation and demonstration on what effective security operations looks like in the real world. We will cover what organizations of all sizes should be doing to identify, investigate, and escalate incidents, before they impact business operations.

During this session we’ll discuss:

·        The security-relevant log sources your organization should be monitoring and how to turn all that data into meaningful insights

·        The appropriate internal hand-offs and ideal steps to elevate, investigate, and verify alerts

·        The importance of developing ongoing and effective security best practices to avoid future attacks

·        A real-life example of a ransomware attack and how effective security operations helped identify and remediate the threat in minutes getting the organization back on track with minimal disruption



img

Louis Evans

Product Marketing Manager
Arctic Wolf

img

Matt Trushinski

Director, Product Marketing
Arctic Wolf

11:00 am - 11:45 am Outpacing the Next Wave of Top Talent Movement

Jay Klauser - VP, Worldwide Sales Engineering and Alliances, NetMotion by Absolute

The next phase of our collective reality is upon us. The distributed workforce is now collectively showcasing that the anticipated wave of movement is here. Procuring top cyber security talent has always been tough. Doing so while the organization’s best talent is walking is impossible. Working with leadership and human resources to be a landing spot as opposed to a jumping-off point is a must for today’s CISO.

  1. Filling the cyber security talent gap by proving a landing spot
  2. Scouring the globe and hiring the best talent available no matter the geography
  3. Making other organization’s distributed workforce policies (reworking of base pay due to cost of living adjustments; the elimination of certain geographical habitats due to resiliency vulnerabilities; and demands for in-office work when out-of-office work might suffice) work for you, literally
  4. Taking advantage of market realities and enabling the business by managing employment flexibility


Link to Incident Response Template: https://bit.ly/3Agajpt



img

Jay Klauser

VP, Worldwide Sales Engineering and Alliances
NetMotion by Absolute

12:00 pm - 12:45 pm Enabling The Enterprise: A CISO Session

Tom Kartanowicz - CISO Americas, Commerzbank AG

WFH happened in a two week period in March 2020. For the next year, cyber security leaders enabled the distributed workforce. Over a year-on, cyber security executives are now securing the new distributed enterprise to ensure organizational growth which outpaces disruption, finds new markets and redefines the future of the enterprise.

  • Working with the business to engage WFH insights & investments 
  • Providing security around the adoption of new business practices through pandemic lessons learned 
  • Shifting user provisioning to continue to enable business while reducing enterprise risk
  • Leveraging distributed workforce investments to propel the organization forward
img

Tom Kartanowicz

CISO Americas
Commerzbank AG