Hi [[ session.user.profile.firstName ]]

Network Security Policy Management: Visibility & Automation in Tech Eco-Systems

When it comes to managing network security policy changes in 2020, organizations are still struggling with visibility across their environments and oftentimes, manual processes. Changing security policies also involves different teams that have different objectives (e.g. security vs. networking vs application delivery) and use different terminology. Mistakes are common and can result in compliance violations. How can you process changes to the network security policy without slowing down your business? 

Join this video interview with Yonatan Klein, Director of Product, AlgoSec, to learn what's needed to proactively assess security policy changes to minimize risk to your business, avoid outages and ensure compliance. 

-Today's network security technology eco-system / heterogeneous environments, including hybrid cloud
-Visibility for network security
-Network security change management and automation
-Compliance issues around network securityNetwork security use cases
-Tying all of the above to the business

This exclusive video interview will be broadcast LIVE from San Francisco during the 2020 RSA Conference.
Recorded Feb 27 2020 28 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Yonatan Klein, Director of Product, AlgoSec & Rolf von Roessing, Board Director, ISACA
Presentation preview: Network Security Policy Management: Visibility & Automation in Tech Eco-Systems

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Network Security Policy Management: Visibility & Automation in Tech Eco-Systems Recorded: Feb 27 2020 28 mins
    Yonatan Klein, Director of Product, AlgoSec & Rolf von Roessing, Board Director, ISACA
    When it comes to managing network security policy changes in 2020, organizations are still struggling with visibility across their environments and oftentimes, manual processes. Changing security policies also involves different teams that have different objectives (e.g. security vs. networking vs application delivery) and use different terminology. Mistakes are common and can result in compliance violations. How can you process changes to the network security policy without slowing down your business? 

    Join this video interview with Yonatan Klein, Director of Product, AlgoSec, to learn what's needed to proactively assess security policy changes to minimize risk to your business, avoid outages and ensure compliance. 

    -Today's network security technology eco-system / heterogeneous environments, including hybrid cloud
    -Visibility for network security
    -Network security change management and automation
    -Compliance issues around network securityNetwork security use cases
    -Tying all of the above to the business

    This exclusive video interview will be broadcast LIVE from San Francisco during the 2020 RSA Conference.
  • Identity Management in a Multi-Cloud World Recorded: Feb 27 2020 47 mins
    Rob Clyde (ISACA), Shahrokh Shahidzadeh (Acceptto), James Alvarez ( Perimeter 81)
    Controlling who has access to your organization's resources and data assets and making sure that only the right users can access the right resources at the right time remains a challenge in 2020. With a third of network compromises involving the use of stolen credentials, it's more important now than ever to employ identity, access and authentication management to protect the access to your enterprise environment. 
    Join industry leaders and IAM experts for a Q&A roundtable discussion on how to secure identities and access in today's multi-cloud world.  
    Viewers will learn more about:
    - Why identity is the new perimeter
    - Biggest challenges associated with digital identity, authentication and cloud access
    - How to continue offering your customers and users the agility they have come to expect employing data protection measures
    This panel will be broadcast LIVE during RSA Conference in San Francisco.

    Speakers:
    Rob Clyde, Chair, ISACA & Board Director, Titus (Moderator)
    Shahrokh Shahidzadeh, CEO, Acceptto
    James Alvarez, Director of Strategic Growth, Perimeter 81
  • The Rise of DevSecOps Recorded: Feb 27 2020 42 mins
    Michelle McLean (StackRox), Alex Peay (SaltStack), Matthew Rose (Checkmarx) & Brian Soldato, ReversingLabs
    As CISOs are """"moving left"""" and integrating DevSecOps technologies into the daily routine of developers, testing and securing their own code is becoming the new normal. Educating software developers into better practices is key, especially in the context of securing applications.
    Join this panel of industry experts and leaders to learn more about:
    - The evolution of DevOps and DevSecOps
    - Why security testing should be a part of the DevOps process
    - How DevOps and security teams can get along better
    - Dynamic tools to monitor applications and scan for vulnerabilities
    - The future of DevOps and security
    This panel will be broadcast LIVE during RSA Conference in San Francisco.

    Speakers:
    Michelle McLean, Vice President of Product Marketing, StackRox
    Matthew Rose, Global Director Application Security Strategy, Checkmarx
    Brian Soldato, Director of Sales Engineering, ReversingLabs
    Alex Peay, Senior Vice President of Product, SaltStack
  • Secure Software Development in the Age of Microservices Recorded: Feb 27 2020 30 mins
    Matthew Rose, Global Director Application Security Strategy, Checkmarx & Nathan Wenzler, Chief Security Strategist, Tenable
    In 2020, we’ll see a proliferation of microservices in software architecture. With cybersecurity at the forefront, development teams are expected to place an equal emphasis on security as they currently do on speed. How will a modernized, secure microservices approach impact your organization? Will this become the new normal for software development, and what solutions will your organization need to secure your microservices architecture?

    Join this exclusive video interview with Matthew Rose, Global Director Application Security Strategy, Checkmarx to learn more about the proliferation of microservices and the impact on software development.

    Viewers will have an opportunity to learn more about:
    - The current state of software development and the emergence of DevSecOps
    - How to embed security in your DevOps culture
    - Best practices for speedy AND secure software development lifecycle (SDLC)
    - Why continuous security testing is essential, and how to achieve continuous security testing for microservices
    - How to achieve an effective migration plan that will enable you to reduce risk during initial stages
    - Solutions needed for optimal security coverage for microservices

    This video interview will be broadcast LIVE from San Francisco during the 2020 RSA Conference.
  • Managing CCPA Compliance & Data Security Best Practices Recorded: Feb 26 2020 22 mins
    Dimitri Sirota, CEO, BigID & Ulf Mattsson, Head of Innovation, TokenEx
    The California Consumer Privacy Act (CCPA) has been in effect since the beginning of 2020, but organizations nationwide are still struggling with understanding the law, as well as preparing for it and maintaining compliance.

    For enterprises operating, collecting and processing data across different geos, maintaining a comprehensive picture of what personal information is being collected and how it is used is critical in today's compliance landscape.

    Join Dimitri Sirota, CEO, BigID for an exclusive video interview at RSA Conference 2020 to learn more about CCPA and other US data privacy regulations, and what business can do to address compliance challenges.
    - A look into the compliance landscape in the US
    - Main similarities and differences (CCPA, GDPR, etc.)
    - How are businesses tackling CCPA, especially when it comes to transparency and managing access rights?
    - Who owns the data?
    - How has privacy influenced the way organizations approach data security?
    - Is there a one size fits all approach that's appropriate in today's data protection environment?
    - How can organizations prepare for the next wave of data privacy and data protection regulations?
    - Is the status quo (for data privacy, protection, and governance) good enough? What needs to change?
    - There's a looming change in the way that companies collect and manage sensitive data - what are reasonable first steps they should take to address this?
  • On the Convergence of Data Privacy and Data Security Recorded: Feb 26 2020 28 mins
    Gabriel Gumbs, Chief Innovation Officer, Spirion & Pam Nigro, Board Director, ISACA
    Companies today are facing pressure from consumers and regulatory authorities to protect personal and sensitive data. Rather than solely looking at the downsides of not complying with regulations like CCPA and GDRP, there are business benefits to complying with them and even going beyond them in an age where personal data is the “new oil.”

    Join this exclusive video interview with Gabe Gumbs, Chief Innovative Officer of Spirion to learn more about the convergence of data security and data privacy and what this means for your organization.

    Viewers will have an opportunity to learn more about:
    - NIST privacy framework version 1.0. and its potential impact on the data privacy and security communities
    - How a CISO or Chief Compliance Officer can use the NIST Framework
    - How do data privacy and data security converge in order for companies to best protect themselves and ward off attacks on privacy
    - What business benefits do companies receive by investing in data privacy software
    - In what ways are consumer attitudes changing for how companies treat their customers’ personal data? What implications does this hold for corporate strategy?
    - The top 2-3 risks where business may fall behind in compliance
    - How to operationalize a privacy program

    This video interview will be broadcast LIVE from San Francisco during the 2020 RSA Conference.
  • Data Discovery, Privacy & Compliance in 2020 Recorded: Feb 26 2020 52 mins
    Rob Clyde (ISACA), Gabriel Gumbs (Spirion), Dimitri Sirota (BigID), Robert Cruz, (Smarsh)
    The regulatory landscape around the world has changed rapidly in the last few years. Growing concerns about privacy and how personal data is being collected, used and shared have spurred new regulations, including the General Data Protection Regulation (GDPR), and most recently, the California Consumer Privacy Act (CCPA). 

    How prepared is your organization when it comes to GDPR and CCPA compliance? 

    Join this panel of industry leaders for an interactive Q&A roundtable to learn more about:
    - The current compliance landscape around the world
    - The main differences between GDPR and CCPA and what this means for your organization
    - Why you shouldn't skip data discovery during your compliance program
    - How to leverage data inventories for CCPA and GDPR compliance
    - What to expect in 2020 and beyond
    - Strategies for data loss prevention
    - Best tools and practices for achieving and maintaining compliance

    This panel will be broadcast LIVE during RSA Conference in San Francisco.

    Speakers:
    Rob Clyde, Chair, ISACA & Board Director, Titus (Moderator)
    Gabriel Gumbs, Chief Innovation Officer, Spirion
    Dimitri Sirota, CEO, BigID
    Robert Cruz, Vice President of Information Governance, Smarsh
  • Top CISO Priorities for 2020 Recorded: Feb 26 2020 54 mins
    Chris Roberts, Kunal Anand, Jim Hansen & Hank Thomas
    What are the key areas CISOs are focusing on in 2020 and beyond? From identity management in a multi-cloud world, to protecting assets with encryption and zero trust, to educating DevOps and other teams on security rather than control, to dealing with alert fatigue and an ever-changing threat landscape - how are CISOs coping and what are their key initiatives for 2020? 
    Join this panel of security leaders and experts as they discuss:
    - The NIST model and how it applies to what's currently on the CISO's plate
    - Security strategies for preventing and responding to breaches 
    - Workforce challenges and opportunities
    - CISO to CISO advice
    - Key initiatives to focus on in 2020
    This panel will be broadcast LIVE during RSA Conference in San Francisco.

    Speakers:
    Chris Roberts, Chief Security Strategist, Attivo Networks (Moderator)
    Kunal Anand, CTO, Imperva
    Jim Hansen, President & COO, Swimlane
    Hank Thomas, CEO, Strategic Cyber Ventures
  • The Rising Tide: Regulation and Cybersecurity Recorded: Feb 26 2020 23 mins
    Mark Whitehead, Vice President, SpiderLabs NA, Trustwave & Ulf Mattsson, Head of Innovation, TokenEx
    New regulations are consistently coming to market that will have an impact on how we consume cybersecurity solutions.

    Join Mark Whitehead, Director, SpiderLabs NA, Trustwave for an exclusive and informative video interview to learn more about:

    - The challenges, risks and security gaps of the new regulations
    - The hurdles that each new regulation and framework will present
    - What the U.S. Department of Defense’s Cyber Maturity Model Certification (CMMC) is exactly
    - What steps should companies be taking to prepare for CMMC
    - What companies can do to succeed given the changing landscape

    This video interview will be broadcast LIVE from San Francisco during the 2020 RSA Conference.
  • How SOAR Can Level Up Your Security Team Recorded: Feb 26 2020 27 mins
    Cody Cornell, CEO & Co-Founder, Swimlane & Frank Downs, Director of Cybersecurity Practices, ISACA
    Many organizations are adopting Security Orchestration, Automation and Response (SOAR) to improve their security analytics and threat intelligence visibility, as well as enable intelligent decision-making. SOAR also speeds up the incident response process by replacing repetitive, manual tasks with automated workflows.

    In the age of breaches, learn how to empower your security operations team with machine-speed decision making. Discover how a security orchestration, automation and response platform adapts to fit your people, security processes and technologies.

    Join this video interview with Cody Cornell, CEO & Co-Founder, Swimlane at RSA Conference in San Francisco to learn more about:
    - What is security orchestration, automation and response or SOAR
    - How SOAR is different from infrastructure automation or network orchestration
    - How SOAR will evolve over the next 5 years
    - What technology is needed before implementing SOAR
    - How to most effectively implement SOAR technology

    This video interview will be broadcast Live from San Francisco during RSA Conference 2020.
  • Insider Threats & People-Centric Approach to Security & Compliance Recorded: Feb 25 2020 31 mins
    Tim Choi, VP Product Marketing, Proofpoint & Mayank Choudhary, SVP Product Management, ObserveIT
    Join Tim Choi and Mayank Choudhary for a conversation about the growing concerns on insider threats and data loss. A new people-centric approach is needed and in this interview session, we will share the suggested approach to this security and compliance problem.

    The audience can learn more about:
    - What is people-centric security and how does it help organizations view their security and compliance program
    - What are insider threats and why cross-functional initiatives between cybersecurity, HR, Legal, Ethics are key in 2020
    - How to drive deterrence and change user behavior
    - How to prevent data loss at the endpoint in 2020

    This video interview will be broadcast LIVE during RSA Conference in San Francisco.
  • Improving Email Security: Strategies & Solutions Recorded: Feb 25 2020 41 mins
    Steve Stocks (infosec), Tim Choi (Proofpoint) , Dr. Richard Ford (Cyren) & Rick Holland (Digital Shadows)
    When it comes to data breaches, phishing is a primary cause, according to the 2019 Verizon's Data Breach Investigations Report. Number two is stolen credentials, so it is not surprising that email security is a key concern for CISOs worldwide. 

    Join this interactive panel of industry experts as they discuss the latest trends in email security including business email compromise and email account compromise and how to prevent becoming the next headline. Viewers will be able to ask questions and learn more about: 
    - Emerging trends in email and targeted attacks 
    - How to stay on top of the latest threats 
    - Best solutions to protect your organization and your people

    This panel will be broadcast LIVE during RSA Conference in San Francisco.

    Speakers:
    Steve Stocks, Solutions Engineering Manager, Infosec (Moderator)
    Tim Choi, VP Product Marketing, Proofpoint
    Dr. Richard Ford, Chief Technology Officer, Cyren
    Rick Holland, CISO, Vice President Strategy, Digital Shadows
  • The Changing Face of Compromise Recorded: Feb 25 2020 52 mins
    Terence Jackson (Thycotic), Ziv Mador (Trustwave), Mark Bagley (Verodin) & Chris Morales (Vectra)
    Adversaries are growing in numbers and sophistication is regularly employing automation while AI and machine learning continue to be successful in various different attacks. 

    Join this panel of industry leaders and security experts to learn more about cyber attacks and how to protect your organization in 2020. Viewers will learn about:
    - What the experts are seeing when it comes to successful and profitable breaches
    - How businesses can be successful in stopping attackers in their tracks
    - Expert recommendations for improving security in 2020 and beyond

    This panel will be broadcast LIVE during RSA Conference in San Francisco.

    Speakers:
    Terence Jackson, Chief Information Security Officer, Thycotic
    Ziv Mador, VP, Security Research at Trustwave SpiderLabs
    Mark Bagley, VP Products, Verodin
    Chris Morales, Head of Security Analytics, Vectra
  • The Case for Continuous Security Validation and Why it Matters to You Recorded: Feb 25 2020 29 mins
    Earl Matthews, Chief Strategy Officer, Verodin & Nathan Wenzler, Chief Security Strategist, Tenable
    Organizations make significant investments to ensure protection of critical assets, yet without data-driven evidence demonstrating security performance, companies operate on assumptions. This could put them at high risk of an attack.

    Until now, there was no way to prove and confidently report on which security controls were working and which were not. Yet the market has shifted to one in which Boards of Directors, CEOs, and leaders are demanding verifiable proof that their organizations are protected against the evolving threat landscape.

    Security validation enables organizations to achieve optimal cybersecurity performance by validating the effectiveness of people, processes and technology through ongoing assessment, optimization and rationalization. As a result, companies minimize cyber risk across the entire business while protecting their reputation and economic value.

    Join this exclusive video interview with Earl Matthews, Chief Strategy Officer at Verodin to learn more about:
    - What security validation is and how it is different from breach and attack simulation
    - Why is security validation so important now, in 2020
    - The security risk with cloud migration
    - How does cyber risk translate to real dollars
  • How Security Enables Business Growth Recorded: Feb 25 2020 26 mins
    Kunal Anand, Chief Technology Officer, Imperva & Rick Moy, Head of Marketing, Acalvio Technologies
    As more data is created and collected every day, more users within and outside of your organization are accessing it to create business value. Identifying the security risks without compromising the agility of your business is critical.

    Join this exclusive video interview with Kunal Anand, Chief Technology Officer of Imperva, to learn more about how organizations should use cybersecurity as a business differentiator to enable scale and growth.

    Viewers will have an opportunity to learn more about:
    - Why managing your digital transformation is key to protecting data wherever it lives, on-premise or in the cloud in the age of breaches
    - Understanding your users and the attack vectors to your web application to identify malicious activity that puts your business at risk
    - How security can enable business growth and serve your customers better.

    This video interview will be broadcast LIVE from San Francisco during the 2020 RSA Conference.
BrightTALK @ RSAC 2020 USA
BrightTALK @ brings you insights from RSA Conference 2020 USA

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Network Security Policy Management: Visibility & Automation in Tech Eco-Systems
  • Live at: Feb 27 2020 10:30 pm
  • Presented by: Yonatan Klein, Director of Product, AlgoSec & Rolf von Roessing, Board Director, ISACA
  • From:
Your email has been sent.
or close