"Enterprises today are leveraging multiple clouds and thousands of applications. What are the security and compliance risks associated with a multi-cloud strategy?
Join cloud and security leaders in an interactive discussion to learn about:
- The current state of cloud
- Security risks and recommendations
- Managing and automating security across multiple clouds and applications
- What to expect in 2019
- Recommendations for improving enterprise cloud security"
RecordedMar 6 201946 mins
Your place is confirmed, we'll send you email reminders
Chris Roberts (Attivio Networks), Nathan Wenzler (Moss Adams), Jessica Gulick (Katzcy), Joseph Carson (Thycotic)
What were the highlights of this year's RSA Conference in San Francisco? Discover the major security developments that happened in the past year and the biggest topics discussed during RSAC.
Join this exclusive panel of security experts as they share their experiences, insights and recommendations in an interactive Q&A discussion on:
- Top security challenges and how are we solving them
- Biggest buzzwords: Hype vs. reality
- Exciting new tech
- Top conference highlights
- Cybersecurity as a boardroom issue
- CISO's toolbox
- Words of wisdom for people interested in security
This is an interactive session and the audience is encouraged to ask questions during this live webcast.
Thomas French, Industry Consultant, SAS & Vince Tocce, Host, Vince in the Bay Podcast
Join Thomas French, Industry Consultant, SAS for a live Q&A interview at RSA Conference 2019 to learn more about the key trends in digital identity and authentication, specifically in the Financial Services industry.
Discussion topics will include:
Tends in payments fraud
Ways this data is being monetized today
Emerging cybersecurity and fraud trends that have resulted from the adoption of faster payments
How financial institutions manage their risk postures with increasing security and fraud challenges
How the concept of digital identity is changing in financial institutions
Sushila Nair (NTT Data Services), Liz Goldberg (SAS), Ken Bagnall (FireEye), Joseph Carson (Thycotic)
"As cyber threats continue to grow, cyber vigilance is more critical than ever. How are CISOs and their security teams addressing the threat of cyber attacks like phishing, IoT-powered DDoS attacks, crippling ransomware or other attacks? How prepared are today's businesses to detect an attacker or launch the appropriate response?
Join top security leader and experts as they discuss:
- Top 5 cyber threats businesses face today
- Notable cyber attack methods and strategies and how to protect against them
- Solutions for network visibility, breach detection and response
- Recommendations for improving security and steps to take today"
Rishi Bhargava (Demisto), Sharon Besser (Guardicore), Bogdan Botezatu (Bitdefender), Vince Tocce (Vince in the Bay Podcast)
"The world of privacy and data protection can be a minefield. With the recent regulations, how are enterprises instituting changes to achieve and maintain compliance? Join this panel of experts to get the answer to all of your privacy, security and compliance questions.
Viewers can learn more about:
- Current state of data regulation and the impact to businesses
- What to expect at GDPR's first anniversary
- Should you prepare for California's Consumer Privacy Act (CCPA)
- Challenges to achieving compliance in an IoT world
- How to bake privacy and security into your processes
- Best practices for data protection and privacy from the ground up"
Security is often seen as the barrier to business agility in an effort to balance risk with speed. You want to stay out of the hackees-hall-of-fame headlines. At the same time, the business is pressuring IT to reduce costs and increase flexibility, necessitating a full tilt charge toward containers, open source, and cloud (whether public or private). DevOps tools enable faster velocity while orchestrating the increasingly complex moving parts. Security wants a lasso for that bull in the china shop.
How can you be the hero in this seemingly lose-lose situation? Join Cindy Blake, Senior Security Evangelist, GitLab as she talks about how to help reduce risk by repositioning app sec program to be more ubiquitous.
Andrew Plato, CEO, Anitian & Rob Clyde, CISM, Board Chair, ISACA and Board Director, Titus
Join us as Andrew Plato discusses how the latest advances in cloud-deployed security automation and orchestration are making security and compliance faster and easier than ever before possible.
Discussion topics will include:
- Challenging points of security and compliance in today’s environment
- New developments in cybersecurity to meet the challenges
- What would happen to the security team if security were to be automated
- How data-privacy can actually be better with cloud vendors
Joe Partlow, Chief Technology Officer, ReliaQuest & Chris Roberts, Chief Security Strategist, Attivio Networks
How are security teams keeping up with the evolving security landscape? What are some of the solutions security teams are using to gain better visibility and proactivity? Discover how security teams are leveraging automation to prioritize proactive analysis and hunt activities.
Join this video interview from RSA Conference 2019 as we discuss how best to streamline operations and improve visibility. Viewers will be able to learn more about:
- How organizations are expanding visibility into their environments at enterprise scale
- The importance of automation for security teams
- How companies are approaching SOAR rollouts
- How security teams keep up with the latest attack tools and techniques
- Key methods for effective threat hunting
- Essential components in building out a mature corporate Security Model
- Key trends in security that we'll continue to see for the next year or two
Rudolph Araujo, VP Marketing, Awake Security & Rob Clyde, CISM, Board Chair, ISACA and Board Director, Titus
Much has been made about the promise of artificial intelligence to solve ALL of our security problems. One way to cut through the marketing hype is to think about how “natural intelligence” or the human brain works in similar situations.
Join Rudolph Araujo, VP Marketing at Awake Security as we discuss:
-How the brain operate and why is that relevant to information security
-The importance of cognition
-The role attention filters play
-The meaning of AI and humans
Rudolph is 20-year security veteran that has responded to incidents, advised customers on risk posture and helped them ship secure software. He currently works at Awake Security, the world’s leading advanced network traffic analysis company, where he strives to make prospects and customers successful with Awake.
Dave Klein (Guardicore), Tim Woods (FireMon), Tom McAndrew (Coalfire), Praveen Jain (Cavirin)
"Enterprises today are leveraging multiple clouds and thousands of applications. What are the security and compliance risks associated with a multi-cloud strategy?
Join cloud and security leaders in an interactive discussion to learn about:
- The current state of cloud
- Security risks and recommendations
- Managing and automating security across multiple clouds and applications
- What to expect in 2019
- Recommendations for improving enterprise cloud security"
Robert Fly (Elevate Security), Jason Pfeiffer (ReliaQuest), Chris Hatter (Nielsen), Christopher Pierson (BLACKCLOAK)
What are the biggest cyber threats CISOs are worried about in 2019? In today's age of breaches, staying ahead of cyber threats is becoming more critical than ever. Dive into how organizations are addressing the threat of cyber attacks, how they are measuring risk, and what they are doing about improving security from some of the top experts in the field.
Join this interactive Q&A panel of cyber security experts to learn more about:
- What's new on the threatscape
- Lessons from cyber attacks: methods, strategies and recommendations on how to protect against them
- Why network visibility is key
- What's needed for faster breach detection and response
- How to move from ""reactive"" to ""proactive"" approach to security
- Managing your cyber risk
- Recommendations for improving security and steps to take today
Shahrokh Shahidzadeh (Acceptto), George McGregor (Imperva), Avishai Wool (Algosec), Chris Morales (Vectra)
What is the future of cyber warfare and how does it impact enterprise security? While the world has yet to see a cyber battle between AI systems, experts predict this might be on the horizon in the next three to five years.
Join this interactive Q&A panel with security experts to learn more about:
- The current state of cybersecurity and AI
- How to deploy AI to detect malware
- What is adversarial AI (or offensive AI) and how to protect against cyber attacks
- Preparing for battle
- What's needed to build an AI system and how to build one that can be used to bypass other AI systems
- How to fight adversaries that have better resources
- Protecting against nation state attacks
- Lessons and recommendations for a more resilient enterprise
The cyber security landscape is constantly evolving, with attackers becoming more and more aggressive. Companies need to know what they’re up against to ensure they are fully prepared for when a breach occurs. Over the last decade, consultants from FireEye Mandiant have shared the latest cyber security investigations and trends from the front lines with the release of the annual M-Trends Report.
Learn more about the latest developments from the newly launched M-Trends 2019 report. Get direct insight from Jurgen Kutscher, Executive Vice President, Service Delivery, FireEye as he highlights some of the report’s most interesting and impactful findings.
Discussion topics will include:
- Which trends in the cybersecurity landscape should we be more mindful of than in previous years
- New/emerging security technologies and solutions becoming more important
- Innovative ways the industry is addressing the skills gap
- Examples of attackers taking advantage of cloud-related weaknesses
Rami Sass, CEO, WhiteSource & Vince Tocce, Host, Vince in the Bay Podcast
It is no secret - open source has become the main building block in modern applications, and it is almost impossible to develop software at today's pace without it. However, as the open source community grows, and the number of reported vulnerabilities keeps climbing, manually verifying the security and compliance of open source components can no longer provide the necessary control over the security of these components.
Join Rami Sass for a video interview at RSA Conference 2019 to learn more about:
Why open source is being so widely embraced by enterprises for their development nowadays?
Why should organizations take steps toward open source vulnerability management?
What are the risks when it comes to using open source components? Are open source libraries riskier than proprietary code?
For those businesses that are ready to implement open source management and security, where should they start?
Where does WhiteSource see open source usage moving in the next 5 years? What are going to be the challenges that companies are going to require solutions for managing better?
Jeffrey Carpenter (Crossmatch, Part of HID Global) & Vince Tocce (Vince in the Bay Podcast)
Managing your user logons can be a daunting affair. New platforms, technologies, and regulations form the perfect storm of confusion. Join industry veteran Jeff Carpenter, cloud authentication director for Crossmatch, part of HID Global, as he walks through and makes clarion sense of the topics and trends that are top-of-mind of cybersecurity professionals.
Join this interview where we will cover:
- What’s driving identity assurance and authentication in 2019
- What is risk-based authentication and why its relevant
- Are passwords really going away?
- Trends in Biometrics
- Can biometrics be spoofed, and if so, what should organizations be asking their vendors?
What are the key challenges CISOs are facing in 2019? Security leaders and practitioners are struggling to secure their organizations on a limited budget, a lack of trained cyber talent, ever-changing threatscape, and a disappearing security perimeter.
Join security leaders, researchers and experts for an interactive discussion on:
- CISO priorities for 2019
- How to get the board on your side
- What keeps CISOs up at night
- Coping with analyst fatigue: Challenges and solutions
- Recommendations for breach prevention, detection and response
Panelists: Terence Jackson (Thycotic), Rudolph Araujo (Awake Security), Jeffrey Carpenter (Crossmatch, Part of HID Global), Masha Sedova (Elevate Security)
Chris Roberts (Attivo Networks), Matthew Rose (Checkmarx), Chris Eng (Veracode), Nathan Wenzler (Moss Adams)
"Data breaches continuing to make the headlines and enterprises are no longer questioning ""if"" a breach will occur, but ""when."" With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important.
Join security thought leaders and experts for an interactive Q&A to learn more about:
- Today’s cybersecurity threat landscape
- The true costs of a breach
- Preventing breaches: Key factors to consider
- Why early breach detection is critical
- How to develop an effective incident response plan and get C-Suite buy-in
- How to keep your company secure in 2019"
The average enterprise today leveraging hundreds of applications across multiple clouds. With the risk of cyber attacks and breaches looming large, application security is becoming a key area of focus for organizations.
Join this interactive Q&A panel of industry experts to learn more about:
- How to integrate application security testing into the DevOps process early on
- Why automation, speed and coverage are critical to the success of DevSecOps programs
- Speed vs Security: Where do you draw the line?
- Recommendations for improving security in 2019
Britta Glade, Wendy Nather, Rich Mogull, Diana Kelley, Ryan Berg
Join RSA Conference Director of Content Curation and four Program Committee Members for a panel discussion about the topics they’re most excited about at RSA Conference 2019. Plus, some hints at the big discussions to take place in areas like Blockchain, security strategy and more:
* Is Blockchain bulletproof?
* Are there technical risks related to cryptocurrencies?
* How to assess the coverage and gaps in your security portfolio
* The theme of “acceptance” in security strategy
* Exciting sessions in our Hackers & Threats track from chipset to containers, as well as smart contracts
* Closing the enterprise gaps when it comes to moving to the cloud
You’ll have a chance to ask questions during this live webcast. Join us for this exclusive preview of what you’ll hear about at RSA Conference 2019, March 4-8 in San Francisco.
Britta Glade, Director Content & Curation, RSA Conference
Wendy Nather, Director, Advisory CISOs, Duo Security
Rich Mogull, Analyst & CEO, Securosis
Diana Kelley, Cybersecurity Field CTO, Microsoft
Ryan Berg, Fellow, Alert Logic
Managing Security for the Multi-CloudDave Klein (Guardicore), Tim Woods (FireMon), Tom McAndrew (Coalfire), Praveen Jain (Cavirin)[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]45 mins