Join this interactive webinar as we discuss using advanced PII/PI discovery to find & inventory all personal data at an enterprise scale.
Learn about new machine learning & identity intelligence technology, including:
- Identify all PII across structured, unstructured, cloud & Big Data.
- Inventory PII by data subject & residency for GDPR.
- Measure data re-identifiability for pseudonymization.
- Uncover dark or uncatalogued data.
- Fix data quality, visualize PII data relationships
- Automatically apply data protection to discovered sensitive data.
This expert panel include RICARDO G. DIAZ, Julie Goggin, Ulf Mattsson and other experts
Trust in Math, Not Humans : Privacy Technology In Crypto
The blockchain revolution of the past 10 years has seen the biggest surge in open source projects with 90K+ Github repositories dedicated to blockchain (DLT) projects. This massive paradigm shift to decentralized computing has also advanced the field of cryptography with exciting new math that will deliver on the promise of privacy like never before.
With over 20 years enterprise software and cyber security expertise, Ricardo Diaz, today is the founder of Blockchain CLT, a blockchain consultancy. He will discuss the future and evolution of trust with innovative privacy technologies powering blockchain projects today and in the future.
This session will delve into what to look for in selecting a Pen Test vendor. With a poliferation of vendors all claiming to posses the best talent, expertise, and certifications, how do you separate the marketing hype from reality?
Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data.
The good news is that these data privacy regulations compel businesses to get a handle on personal data — how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers.
Join this interactive webinar to learn more about:
- The latest trends and strategies for securing sensitive data in cloud and the enterprise
- How to discover and capture your data inventory
- What’s needed to prevent a data breach by securing your critical data and protect your reputation
As more and more organizations are getting breached, executives are finally paying attention to cybersecurity and data protection. What are the biggest challenges for businesses when it comes to securing the enterprise?
Join this panel of experts to learn more about the current state of breaches, how organizations of all sizes are coping, and what CISOs are prioritizing this year.
Attendees will learn more about:
- Who is most at risk of being breached
- How to prevent a breach or minimize its impact
- How long it takes to detect a breach
- Best practices for investigation and remediation
- Words of wisdom from the experts
This session will examine the new Presidential Executive Order that addresses the critical shortage in cybersecurity skills and staffing. What does the new Presidential Executive Order on America's Cybersecurity Workforce entail? Who will be impacted? What can you do now?
With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical. Learn about the Identity and Data Protection solutions for enterprise security organizations can take a data-centric approach to their security posture.
This session will discuss how to control access to the infrastructure and applications — both on-premises, and in public and private clouds.
What does Privacy and Security mean under GDPR and CCPA? What are the differences between GDPR and CCPA with regard to privacy and security? What controls and mechanisms can be utilized in order to become compliant with this specific aspect of these regulations.
Tune into this session to learn how to determine if you have the right people with the sharpest skills defending your organization through the use of a Cyber Training Range.
Learn what are Persistent Cyber Training Range Environments, the benefits and value of a Cyber Training Range and how they help you answer the question ARE WE READY TO DEFEND AGAINST THE NEXT ATTACK?".
This session will define the role and responsibility of the Threat Intelligence function and what tools, tactics and procedures are used as well as the various stakeholders that benefit from their efforts.
Cloud application development is accelerating and diversifying where many organizations have virtual machines, containers, and now serverless applications running in the cloud, transforming code into infrastructure. Microservices make a lot of sense for scale and development agility, but if everything is talking to everything else via APIs, it’s likely that there are many (and I mean many) application vulnerabilities. Additionally, API security is new, so processes are likely immature, and API security sits somewhere between application developers, DevOps, and cybersecurity, leading to organizational and skills challenges. We will organize this chaos from RSAC 2019 and discuss Security in the new API Ecosystem.
Join this interactive webinar to learn more about:
- What security people should talk about instead
- The Human Factor
- Advancements in Machine Learning and AI
- Security in app development and the API economy
- News in quantum computing and multiparty computing
- Trends in innovation and cloud security
- New standards and regulations
We will also discuss:
- How IT Audit can be automated to meet new requirements from for Agile Development and cloud
- How IT Audit can learn more about new controls and technologies
- How IT Audit can be involved early in the DevOps planning phase
- How Artificial Intelligence can be used in IT audits to expand beyond sampling
Bob Liscouski, Juanita Koilpillai and David Morris
How a Digital Risk Framework (an understanding of the differences between cyber security, cyber risk and digital risk) can help identify and mitigate risks to your Cloud Infrastructures.
In this session you will learn what a Digital Risk Framework is, how a Digital Risk Framework can help you comply with the onslaught of privacy regulations (CCPA, GDPR, HIPPA, etc) and its impact on your Cloud Infrastructures, which are most commonly used.
This session will feature a live demonstration of Threat Hunting by a former Federal law enforcement cyber threat hunter. In this session, you will see what a Threat Hunter actually does and how it is done.
Will 2019 bring any real transformative cybersecurity technology advancements that will have an impact? Tune into this controversial eye opening session on what's in store for 2019 in the cybersecurity space.
Comprehensive Information Security Management and Compliance
The Cybersecurity- No Spin Zone is dedicated first and foremost to educating viewers about Cybersecurity Technologies, Problems, Compliance and Legal FACTS. We are not a Vendor Sponsored Channel, this gives us the unique ability to bring you factual unbiased information and advice from subject matter experts.