Day 1 - Tuesday 12 November 2019 EST
09:30 - 10:10 The CISO Challenge: How to Effectively Speak Cyber Security to Your Executive Board
New research highlights key management and communication issues facing those responsible for cyber security, including entrenched perceptions by senior leadership and employees. Nearly 50% of cyber security professionals, for example, believe executive boards see them in just a maintenance role, rather than a source of innovation that contributes to the business. Given the enormous impact of security breaches and the increase in compliance requirements, CISOs need to communicate the value of cyber security across all levels of their organizations.
Join Chief Security Scientist, Joseph Carson as he discusses the changes cyber security professionals must make in order to expand their influence and align cyber security with business priorities so executive boards can see the business case for security investments.
- Learn how to communicate to your Executive board and change perceptions that restrict cyber security effectiveness
- Find out the key metrics to a CISO’s success
- Learn how to make cyber security a more positive experience for all employees and departments
Joseph Carson, Chief Cybersecurity Scientist, Thycotic
11:00 - 11:40 Stay Ahead of Cyber Crime with Third Party Risk Management
Third-party vendor risk management is not a new concept, yet the risks posed to enterprises are evolving and as the risk of your supply chain grows, so does the importance of measuring and managing it. In this session, discover the current and emerging third-party cyber risk management approaches and challenges and how to mitigate those risks.
- Learn how to adapt and solve both security and privacy challenges
- Build consistent third-party risk measurement and reporting strategies
- Discover how third-party cyber risk can drive key business decisions
Session reserved for One Trust
12:30 - 13:10 Calculate the True Cost of a Breach
While some breaches will seem harmless at first, with the evolving threat landscape moving at such an unparalleled speed, the task facing modern IT Security leaders now is vast. When it comes to data breaches, the question isn't if it will happen to your company, but when? What is the true cost of a breach? In this session, discover how to avoid the ripple effects of a breach which could affect your organization in years to come.
- Understand how a breach could affect multiple aspects of a company’s operations
- Learn how to detect an intrusion, abnormality or violation before it escalates
- Protect sensitive information and data to avoid the cost of a data breach
Session reserved for Axonius
14:00 - 14:40 Panel Discussion: Who is responsible for Cyber Security in the enterprise?
Cyber Security is still primarily seen as an ‘IT issue’ and this often means that security often gets “bolted on” rather than embedded in a company’s ecosystem. In this panel discussion, discover why everyone within the business is responsible for Cyber Security and how to educate the enterprise on safeguarding customer data.
- Improve security by creating a culture of healthy suspicion
- Encourage the executive board to communicate policies
- Ensure best practice is maintained throughout your business
Kim Parham, Information Governance Compliance Analyst, Yum! Brands
Kayne McGladrey, Director of Security & IT, CIO, CISO, Pensar Development
Day 2 - Wednesday, 13 November 2019 EST
09:30 - 10:10 Assess the Human Element in Cyber Risk
Insider threat via a company’s own employees (and contractors and vendors) is one of the largest unsolved issues in cybersecurity. On the surface, defining insider threat seems self-explanatory–a source of potential danger or harm to an organization stemming from someone that is within or part of an organization. There are, however, varied sources and motivations of insider threat.
- Illustrate the ways insiders create risk
- Introduce ways to reduce insider risks and create a culture of security
- Assessing the Human Element in Cyber Risk Analysis
Session reserved for Code 42
11:00 - 11:40 Stop Hackers Turning AI against Us with tighter security
AI and deep ML are changing the world as we know it in some incredible ways, but it can also lead to attacks on a scale the world has never seen before. AI and ML are gradually finding their way out of the labs, to use as weapons to overcome these defenses by subverting the same logic and underlying functionality. In this session, discover how to stop hackers turning our AI security systems against us.
- Intelligent evasion techniques to fight back against AI hackers
- An understanding of the good vs evil AI cybersecurity battle
- Fraud detection and security for AI crimes
14:00 - 14:40 Fight against New Threat Paradigms with Cyber Threat Intelligence
The history of network security efforts had primarily been focused on protecting connections to and from the network. After several years, threats began to shift and new threats required traditionally separate security tools to work together, to inspect and secure data. Today, as society continues to shifts towards a digital economy, security tools that can effectively defend against new threat paradigms are only as effective as the threat intelligence behind them thus, the race between IT professionals and cyber criminals continue.
- Learn what threat intelligence is, how it works and how it can be utilised
- Discover new interconnected threat intelligence skills and strategies
- Prepare, prevent, and identify cyber threats looking to take advantage of your resources
Day 3 - Thursday, 14 November 2019 EST
09:30 - 10:10 Protect your Online Assets with Cyber & Cloud
The cloud revolution is upon us. We are witnessing more and more businesses moving their critical IT infrastructure and data to the cloud however the internet is not always a safe environment and living in the digital age means that we are exposed to an increasing number of new risks. In this session, discover new ways to protect and guard networks and computers connected to the internet.
- Develop a continuity plan for protecting your sensitive data and systems
- Centralizes the protection of your applications and data
- Reduce costs and administrative overheads
11:00 - 11:40 Zero Trust Architecture: The Modern Approach To Cybersecurity
Businesses who want to reliably prevent the exfiltration of sensitive data and improve their ability to defend against modern cyberthreats can consider a Zero Trust architecture. Zero trust architecture ensures that data and access across the network are secure and based on parameters like user identity and location. It inspects and logs all traffic, learns and monitors network patterns, and adds authentication methods into the security mix, all with the goal of seeing every user and device connected to the network at any moment.
- Understand your data better and know how it flows through your network
- Discover how to implement strong authentication
- Ditch the legacy architecture and enforce the Zero Trust mentality