Hi [[ session.user.profile.firstName ]]

#IMOS19 - Sponsored Keynote Presentation

Infosecurity invites its diamond sponsor to deliver a presentation on the latest issues and challenges affecting them and their customers in the information security sector.
Live online Sep 25 6:15 pm UTC
or after on demand 30 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Infosecurity Magazine
  • Channel
  • Channel profile
  • #IMOS19 - The Digital Transformation Journey: Why Security is Key Sep 25 2019 9:00 pm UTC 60 mins
    Infosecurity Magazine
    The Digital Transformation Journey: Why Security is Key
    A key element of modern-day business success is harnessing digital transformation to accelerate a company’s activities, processes and competencies.

    That journey of digitization allows for various, forward-thinking opportunities, but for any business looking to make a success of digital transformation, security is paramount.

    This session will discuss why the security function is crucial in supporting the business through a process of digital transformation, and provide strategies for ensuring it does so effectively.

    Key takeaways:
    •Why the security function must support the business through a process of digital transformation
    •How to ensure business digitization is done securely, from the ground up
    •How relationship between security and the wider business can flourish through digital transformation
  • #IMOS19 - How To: Benchmark Your Security Posture Sep 25 2019 8:15 pm UTC 30 mins
    Infosecurity Magazine
    For organizations seeking to do the ‘security basics’ well, the challenge can be gauging what state of security they are in to begin with.

    Therefore, new concepts are emerging to provide companies with a means to rate their security strategies, and provide a way to determine where they need to focus more effort.

    In this ‘How To’ session, an industry expert will explore how to benchmark your security posture, and assess strategies for improvement to reduce risk levels.

    Key takeaways:
    •Learn what to protect, and how to protect it
    •Get an understanding of how secure you are, and how to improve
    •How to get the best return from your security investment
  • #IMOS19 - California Consumer Privacy Act: Redefining Consumer Rights Sep 25 2019 7:00 pm UTC 60 mins
    Infosecurity Magazine
    In January 2020, the California Consumer Privacy Act (CCPA) will come into effect, bringing with it stricter guidelines around the collection and processing of personal information in the US state.

    Under the new law, residents of California will have new privacy rights regarding their data, which organizations will need to adhere to in order to avoid monetary penalties.

    This session will explore what the CCPA will mean for businesses, assess what the challenges of compliance will be and discuss how organizations can plan ahead to be on the right side of the regulation.

    Key takeaways:
    •What CCPA is and what it will mean for businesses in the US from January 2020
    •The challenges of CCPA compliance
    •How to plan ahead for CCPA
  • #IMOS19 - Sponsored Keynote Presentation Sep 25 2019 6:15 pm UTC 30 mins
    Infosecurity Magazine
    Infosecurity invites its diamond sponsor to deliver a presentation on the latest issues and challenges affecting them and their customers in the information security sector.
  • #IMOS19 - Profile Interview Sep 25 2019 5:15 pm UTC 30 mins
    Infosecurity Magazine
    In a candid and personal interview, Infosecurity will talk to a leading name in the industry about their career and achievements.
  • #IMOS19 - The Benefits of a Diverse Security Workforce Sep 25 2019 4:00 pm UTC 60 mins
    Infosecurity Magazine
    The Benefits of a Diverse Security Workforce
    It’s widely agreed that a diverse workforce is a superior workforce, with varied opinions and different ways of thinking often leading to better decisions that can result in improved business outcomes.

    However, the information security industry is often criticized for lacking the diversity present in other sectors, and it can suffer as a result.

    In this session, a panel of experts will discuss why there is a need for more diversity across the security industry and outline the benefits of a diverse security team.

    Key takeaways:
    •Why a diverse security team is a better security team
    •How to get diversity right, for the right reasons
  • #IMOS19 - AI in Security: Fad, Fiction or Fact? Sep 25 2019 2:45 pm UTC 60 mins
    Infosecurity Magazine
    As cyber-threats continue to push businesses to their defensive limits, more and more enterprises are turning to automation and ‘cognitive computing’ to improve the proficiency of their security efforts hoping for quicker response times, better threat detection, the ability to process and analyze large amounts of data and to free up vital staff time.

    However, how much hype is there around the true effectiveness of AI in security? Is it really the panacea that it is so often referred to, or should more caution be taken when considering how much reliance should be put into AI technologies?

    This session will explore:
    •The true effectiveness of AI technology in information security
    •How to get the most out of automation, and when to look elsewhere
    •The role of AI in the future of cybersecurity
  • #IMOS19 - How To: Recruit and Keep Security Talent Sep 24 2019 3:30 pm UTC 30 mins
    Full speaker line up to be confirmed
    The cybersecurity industry continues to suffer from a significant workforce shortage, with recent figures suggesting there are three million unfilled security jobs globally.

    Despite greater awareness of the cyber-skills gap issue, organizations of all sizes still struggle in their efforts to find and keep the security talent they need.

    In this special ‘How To’ session, an industry expert will share advice on the best strategies for hiring for security roles, and discuss how to make sure you don’t lose your valuable employees once you have them.

    Key takeaways:
    •Learn what mistakes to avoid when looking to fill security job roles
    •How best to interview, hire and retain the right security staff for your organization
  • #IMOS19 Building Brand Infosec: From Engaging with Employees to Driving Secure Sep 24 2019 2:15 pm UTC 60 mins
    Full speaker line up to be confirmed
    For any security leader, the goal of driving a culture of security awareness that reaches and impacts every facet of an organization is a key goal. However, modern businesses are complex and diverse, and engaging with all employees in a way that not only raises security awareness but results in better, more secure behavior is no easy task.

    In this session, a panel of experts will share actionable insights into how to market information security across an organization and impact the behavior of employees, execs and the board.

    Key takeaways:
    •How to increase engagement in information security
    •Tips for marketing security to the board & execs
    •How to implement an engaging behavioral change program
  • #IMOS19 - EMEA Fall Keynote Address Sep 24 2019 1:30 pm UTC 30 mins
    Full speaker line up to be confirmed
    Infosecurity invites its diamond sponsor to deliver a presentation on the latest issues and challenges affecting them and their customers in the information security sector.
  • #IMOS19 Tech Troubles: Why it’s Time for Better Product Management Sep 24 2019 11:30 am UTC 60 mins
    Full speaker line up to be confirmed
    It’s time for better security product management within the enterprise. From mistakes made in the purchasing of security products, failures to properly manage tools across organizations, to issues surrounding the use of legacy systems, security leaders have their work cut out when it comes to effectively managing the security technology they have within the business.

    This session will outline the challenges organizations face in buying, running and maintaining security technologies and explore what security leaders need to do to turn the tide.

    Key takeaways:
    •Why it’s time for better security technology management
    •How to gauge what security tools are right for your business
    •How to better understand and use the security tools at your disposal
  • #IMOS19 EMEA Profile Interview Sep 24 2019 10:45 am UTC 30 mins
    Speaker To Be Confirmed
    In a candid and personal interview, Infosecurity will talk to a leading name in the industry about their career and achievements.
  • #IMOS19 Compliance Complexities: The Ongoing Challenge Sep 24 2019 9:30 am UTC 60 mins
    Full Speaker Line Up To Be Confirmed
    Compliance Complexities: The Ongoing Challenge
    On May 25 2018, the GDPR came into force after what seemed like an eternity of build-up and preparation. Since then, complexities surrounding regulatory compliance have continued to challenge companies of all sizes.

    With the stakes so high, organizations simply cannot afford to fail to take compliance seriously and must manage it effectively, but knowing how best to do that can prove to be a big challenge.

    This session will reflect on the current regulatory landscape, assessing how organizations are faring in their compliance efforts, provide workable steps for being on the right side of the regulations and discuss what the next year might have in store.

    Key takeaways:
    •An accurate understanding of the current regulatory landscape
    •Practical steps for tackling regulatory compliance within your organization
    •The role compliance will play in the future of cybersecurity
  • #IMOS19 Winning the Security Race with Faith in Zero Trust Sep 24 2019 8:15 am UTC 60 mins
    Full speaker line up to be confirmed
    In the modern, hyper-connected and threat-laden enterprise landscape, organizations face increasing pressure to protect their systems and data.

    Traditional enterprise security models were built on an assumption that everything inside the network – whether its devices or people – is trustworthy. However, the evolution of attack sophistication and the proliferation of BYOD has brought greater risk, which means that newer, more holistic measures must be taken to ensure security across the business.

    This session will explore how and why Zero Trust can be used to effectively secure modern organizations from a variety of threats, along with outlining the strategic management required to get the most out of a Zero Trust architecture.

    Key takeaways:
    •Why Zero Trust can be the key to securing modern enterprises
    •How to effectively manage a successful Zero Trust strategy
    •The role that Zero Trust might play in the future of enterprise security
  • Data Driven Identity Programs: Past, Present and Future Aug 8 2019 2:00 pm UTC 75 mins
    Moderator: Dan Raywood
    A comprehensive and fully-functioning identity program is an ever-evolving mission. From creating security awareness that sticks with employees, getting executive buy-in and assembling the right team, there’s a lot to do.

    Then, deciding the correct mix of services and solutions that are required for the identity program can be quite a challenging task. One thing is certain – security should not compromise user experience. If there is too much friction in the mix, users will avoid best practice.

    In this webinar, we will explore:

    •The key identity program challenges that exist today
    •The solutions that will help into the future
    •What group of solutions can help you deliver an effective identity program that is both robust and flexible
  • Reducing Cyber Risks and Complexity Through Increased Visibility Jul 18 2019 2:00 pm UTC 75 mins
    Moderator: Dan Raywood Speaker: Rich Agar
    It’s a basic truth: You can’t secure what you can’t see.™ The more you know about your network, assets and risk posture, the less likely you are to be attacked. Each unknown device extends the attack surface and can leave your converged network vulnerable. Are you ready to mitigate this risk with 100% device visibility?

    Join us on this webinar to learn how to achieve visibility of assets and devices, mitigate common risks in increasingly complex environments and operate efficiently and securely in the “security 4.0” era.

    Key takeaways:
    •Reduce business risk and disruption from security incidents and breaches
    •Improve the accuracy of your risk assessments through accurate device intelligence
    •Increase IT and OT security operations productivity
  • Build Trust through Visibility & Early Detection of Insider Threats Recorded: Jul 2 2019 60 mins
    Michael Hill, Chris Bush
    In today’s competitive business landscape and knowledge-based economy, we all rely on technology to be more productive and make our lives easier.
    Organisations thrive when they trust their workforce to collaborate on valuable IP & work with critical systems. Perhaps, in their eagerness, some overlook the importance of verifying user trust with technology. This can leave an organisation open to the risk of losing data that is sensitive to the employees, customers and the business.
    In a recent study of senior IT decision makers, 54% felt their organisations’ customers were more likely to care about cybersecurity compared to general employees, contractors/freelancers & third party vendors (35% – 36%).
    As a result, it’s important for the security team to have the tools and policies in place to automatically monitor and quickly triage any risks that come with high levels of trust, to ensure the early detection of insider threats and ability to respond before an incident occurs.
    In this webinar you will learn:
    •Why increasing trust within the workplace is key for business success
    •Why trust without verification can be a significant risk
    •How to build trust through visibility and early detection of insider threats
  • How to Strike the Balance of Collaboration, Security and Productivity Recorded: Jun 27 2019 70 mins
    Moderator: Dan Raywood Speakers: Nick Scholz, Nathan Wenzler, Christina Ayotis
    Digital transformation has revolutionized business and today's workforce, creating a significant cultural shift. Millennials and younger professionals now expect the hottest new tools that allow them to work how they want - from agile project management and ‘everywhere file access,’ to cloud-based collaboration and complete mobile availability.

    These features bring about many benefits, but ask a modern security team and they’ll tell you about the struggle to provide solutions that offer the quick access, seamless collaboration and outstanding ease-of-use workers want whilst also maintaining high levels of compliance and a steady security risk profile.

    The challenge is real, and you need real-world experience to face it successfully. In this webinar, we will look at how to enable a strategy that permits such levels of agility whilst remaining secure.

    Key takeaways:
    •How a world-class security strategy can enable collaboration
    •The types of collaboration tools being requested now, and how to secure them
    •How to deal with Shadow IT
    •Maintaining the balance of creativity and security
  • Which Frameworks can Aid Career Development and Cyber Defence Recorded: Jun 27 2019 61 mins
    Michael Hill, Max Vetter
    For any organization, making sure that the security team have the required skills to face down threats is critical. But how do you know for sure which skills are present, and which are missing?

    While there are indicators to help you answer these questions, solid metrics have been missing for a long time. How do you measure what skills have been learned? In this webinar we will look at how frameworks can aid an organization in overcoming these challenges.

    Key takeaways:

    • What the ideal frameworks are that you should follow
    • Why organizations are adopting them to help their cyber teams identify weaknesses within their cyber ecosystem, and discover blind spots which may not originally have been apparent.
    • How to use frameworks to bolster workforce development, using it as a tool to map out career progression
    • How frameworks can underpin a robust cyber strategy and assist implementation of new tool, techniques and technology.
  • How to Manage Attacks, Vulnerabilities & Complexities in APIs Recorded: Jun 25 2019 61 mins
    Moderator: Dan Raywood Speakers: Roey Eliyahu, James Jardine
    SaaS, web and mobile applications are increasingly being built on application programming interfaces (APIs). Attacks targeting these APIs have become more prevalent and vulnerabilities in APIs continue to be disclosed, both leading to high profile breaches and negative headlines. The problem is compounded by many organizations continuing to rely on traditional security approaches designed to protect applications that were fundamentally different from those being developed today, as APIs have proliferated across environments to enable modern applications.

    In this webinar, we will explore how enterprises need to adopt a proactive ‘monitor and respond’ approach rather than focusing solely on secure perimeters and access controls, and discuss how to prevent an attacker from exploiting unique API vulnerabilities.

    Key takeaways:

    Understanding the complexity of modern APIs, and how attackers can exploit them.

    How to maintain a current catalog of APIs including where sensitive data is exposed and transmitted.

    The importance of learning the unique logic and behavior of each API at a granular level to identify and stop malicious activity.

    How security and development teams can improve workflows to improve API security

    Steps in building an effective security strategy for modern web applications
Strategy - Insight - Technology
Dedicated to serving the information security community, in person, in print and online.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: #IMOS19 - Sponsored Keynote Presentation
  • Live at: Sep 25 2019 6:15 pm
  • Presented by: Infosecurity Magazine
  • From:
Your email has been sent.
or close