Hi [[ session.user.profile.firstName ]]

Identity Management for a Dynamic Workforce: Zero Trust Versus Risk-Based Sec

User working patterns have completely transformed within the last six months. Recently, many businesses have integrated remote working, collaboration tools, cloud storage and applications into their ecosystem.
Let’s address the elephant in the room: how can businesses securely facilitate access to these diverse applications, data stores, devices and tools?
In this webinar, a panel of security experts will discuss Zero Trust versus risk-based security strategies for managing agile and remote workforces, evaluating and assessing the benefits and limitations of both approaches.
Learn how to:
•Leverage identity management principals in new, intelligent, user friendly and innovative ways
•Achieve the right balance between user experience and risk mitigation
Recorded Aug 27 2020 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Moderator: Michael Hill, Speakers: Ian Jennings, Russel Ridgely, Ed Moyle
Presentation preview: Identity Management for a Dynamic Workforce: Zero Trust Versus Risk-Based Sec
  • Channel
  • Channel profile
  • How to Prevent File Upload Threats and Protect Your Portals Dec 10 2020 3:00 pm UTC 75 mins
    Moderator: Dan Raywood
    Digital transformation projects have rapidly increased over the last few years. The COVID-19 pandemic has forced many organizations to increase the speed at which they are offering and delivering services digitally. As part of that, banks need to allow customers to apply for mortgages online, insurance companies need to facilitate applications, and government and health organizations have been forced to rapidly transform their services to allow the public to consume services online.

    Developing public-facing portals involves the transfer of personally identifiable information (PII) and financial information, and can cause headaches and create huge risks for organizations.

    In this webinar, we will look at how you can secure these workflows, ensure sensitive data doesn’t fall into the wrong hands, and keep attackers out of your digital transformation process.

    Key takeaways:
    • The security risks faced with portals and file upload workflows
    • How to prevent and protect hackers compromising them
    • Industry best practices to consider for file upload and portal protection
  • How to Mitigate Insider Security Risks in the Current Landscape Nov 26 2020 3:00 pm UTC 75 mins
    Moderator: Michael Hill, Speaker: Rajesh Ganesan
    Insider security threats and risks remain both pervasive and complex, and never more so than in the current remote working paradigm amid the ongoing COVID-19 pandemic.

    Perhaps the most intriguing aspect of insider threats is their diverse and multi-faceted nature. Likewise, just as intricate are the various approaches that organizations can implement to recognize, detect, and lessen insider threats.

    What’s clear is that insider threats continue to pose huge risks to businesses – so what are the best strategies for addressing them?

    In this webinar, a panel of industry experts will explore and discuss the current insider risk landscape, share insights into the mechanics of the key insider risks threatening modern businesses and outline how security leaders can mitigate them.

    • Understand the evolving scope of insider threats in remote and hybrid work environments
    • Learn how security models like the principle of least privilege and zero trust access help counter new challenges
    • Figure out ways to augment operations and analytics to derive insights on insider threats leveraging AI and ML
  • Enabling Secure Access: Anywhere, Any Device and Any Application Nov 5 2020 3:00 pm UTC 75 mins
    Moderator: Michael Hill,
    From a security perspective, it’s not surprising that the challenges continue to increase as companies look to implement secure work from home for secure access to critical applications, and the Virtual Desktop Infrastructure becomes more prominent.

    In this webinar, we will look at how the move to remote access evolved to encompassing secure access from anywhere.

    Key Takeaways:
    • How to manage employees’ access in and out of the office
    • Ensuring personal devices meet security standards
    • Know what’s on your network and block unauthorized access
    • Automated approaches to reduce complexity
  • Extended Threat Detection and Response: Critical Steps and a Critical System Oct 29 2020 5:00 pm UTC 75 mins
    Moderator: Michael Hill - Speaker: Grant McDonald
    For modern organizations, the ability to implement effective threat detection and response is paramount. Given the extensive cyber-risks that now threaten organizations, it is crucial that threat detection and response approaches are holistically sufficient to combat the numerous risks faced by organizations. This has given rise to the concept of extended threat detection and response (XDR).

    XDR may still be evolving in scope and definition, but its goals are clear – greater context of threats for security analysts and ensuring security gaps are filled.

    This webinar will explore a critical step in building the foundations of a successful XDR strategy, and why you need to include a powerhouse system that you might not have considered – the mainframe.

    Despite long-held beliefs that mainframes are secure by design, new research shows security events do happen and a number of vulnerabilities are unaddressed on the average mainframe.

    Join this webinar to learn:
    • Why XDR is a critical element of your organization’s modern security and risk management strategy
    • The first steps to help ensure a successful XDR strategy for your business
    • How perhaps the most securable system in existence can be included in your XDR strategy, and the steps to take to ensure it remains secure
  • Security in the Cloud - Emerging Threats & the Future Oct 22 2020 2:00 pm UTC 75 mins
    Moderator: Dan Raywood - Speakers: Dave Ashton, Marc Laliberte
    The last six months have seen businesses adapt to new ways of working, new methods to engage customers, employees and communities. IT teams have had to react quickly, implementing systems and facilities for home working and operating remotely, far faster than normal. This has seen a surge in the deployment of cloud and hybrid environments without, in many cases, robust testing.

    With these developments, businesses are beginning to looking at security from a Secure Access Server Edge (SASE) viewpoint. This can enabling companies to protect web, cloud, network and data security from a single source. In this webinar, we will look at the concept of SASE, what it can do for your security posture and secure your cloud and hybrid environments

    Key takeaways:

    Understand how to better secure your cloud and hybrid environments
    How SASE works and what it can add for your business
    How much cloud security impacted and enabled the remote working change
  • The Remote Workplace: Managing the New Threat Landscape with ISO 27001 Oct 15 2020 5:00 pm UTC 75 mins
    Moderator: Dan Raywood - Speakers: Stuart Wright, Paul Raines, Joyce van Lujin-Bonneveld
    Many organizations around the world have had to quickly pivot and introduce online and digital channels for working and delivering services. Adding remote working and new systems and platforms have introduced risks, threats and vulnerabilities to information security frameworks. Regardless of industry, at least some degree of remote-working and digital transformation is here to stay.

    In this webinar, we will discuss the new threat landscape and consider the importance of cyber and information security standards such as ISO 27001, and how this and other certifications can be leveraged to manage risks.

    Key takeaways
    •What organizations need to know about how to safely conduct business remotely
    •What steps they can take to mitigate the risk to their business and information assets
    •How ISO 27001 can help reduce and manage information security risks
    •Maintaining compliance with security certifications during the pandemic
  • Lessons Learned from the Twitter Spear Phishing Attack Oct 8 2020 2:00 pm UTC 75 mins
    Moderator: Dan Raywood - Speakers: Lior Kohavi, Andrew Hay
    The attack on Twitter in mid July enabled attackers to take control of major accounts with millions of followers, and collect over $100,000 through a Bitcoin scam. We subsequently learned that this was achieved by a spear phishing attack sent to Twitter staff, giving the attackers full control over a subset of accounts.

    In this webinar, we will look at the incidents that enabled the attack, what companies can do to ensure that phishing messages do not succeed and if extra solutions are needed to better detect and prevent phishing messages from getting to your employees.

    Key takeaways:

    How the attack was successful
    Why you need to limit employee access to sensitive user details
    How to evaluate a better phishing solution
  • A Better Defense: Does Modern Security Fit With Modern Attacks? Oct 1 2020 5:00 pm UTC 75 mins
    Moderator: Dan Raywood - Speakers: Dave Klein
    The typical security network structure consists of many working parts, but is that enough to protect the modern business from modern cyber-threats? Well, the number of successful attacks would suggest not. So where can things be improved? One way is to consider software-defined segmentation and how it can replace the firewall to give you a competitive advantage for security.

    In this webinar, a panel of experts will discuss the state of the firewall from its origins to its modern use points and ask if it is really still fit for security needs or whether the future of security requires a more dynamic solution.

    Key takeaways:
    •How you can use software-defined segmentation and what benefits it can bring to security strategies
    •Why you don’t need to rip out your old firewalls but also why you should consider how newer technology can be a security enabler
    •Why you need to consider monitoring of outsourced services
  • What an Insider Threat Strategy Should Consist of For Effective Detection Recorded: Sep 24 2020 62 mins
    Moderator: Dan Raywood - Speakers: Lisa Forte, Todd Thorsen, Heath Renfrow
    The issue of insider threat has been a testing one for cybersecurity – we know it goes on, but it is rarely reported, companies struggle to detect and prevent it, and the issues of monitoring employees come with the taboo of privacy and surveillance.

    In this webinar, we will look at both the issue of how the insider threat has risen and been dealt with, and also how you can create a strategy to better detect malicious insiders, and how to deal with the person and the issue.

    Key takeaways:

    How to create an insider threat strategy and what it can look like
    Issues on using monitoring technology in the workplace and on remote users
    How to classify data with a remote workforce
  • #IMOS20 Future-Proofing Authentication: No Time Like the Present Recorded: Sep 23 2020 57 mins
    Moderator: Michael Hill
    Authentication is one of the chief challenges impacting the current information security landscape. With the risk of scams, fraud and data manipulation greater than ever, authenticating the identity of legitimate users is pivotal to keeping organizations’ and people’s data safe.

    However, traditional authentication methods have often omitted two elements key to their successful use – usability and practicality. When users, typically short for time or under work-related pressures, are met with authentication methods that are cumbersome, slow and impractical, they will likely find workarounds and alternatives that lead to significant security risks.

    This session will therefore address the need for better, more user-friendly authentication and outline why, when it comes to future-proofing authentication methods, there is no time like the present.

    Key takeaways:
    • Why authentication is one the top modern infosec challenges
    • How to streamline and strengthen authentication processes
    • A glimpse into authentication methods of the future
  • #IMOS20 How To: Master App Security in the Cloud Recorded: Sep 23 2020 31 mins
    Moderator: Dan Raywood
    The proliferation of the cloud and the growth of cloud-based application usage has created a very modern but potentially risk-laden challenge for security teams: how to protect and secure applications that reside in cloud environments.

    Today, few organizations operate outside of cloud architectures and huge numbers of businesses rely on them to store and share information, and to facilitate both internal and external communications.
    However, with cloud environments becoming ever-more complex, ensuring the various data, applications and processes that exist in them is not only highly-important, but also proving to be a difficult task for organizations of all sizes.

    In this How To session, a security expert will:
    •Explore the risks that threaten the cloud and cloud-based applications
    •Outline the vital steps enterprises must take to secure their cloud environments
  • #IMOS20 On the Rebound: Turning Security Failures into Business Wins Recorded: Sep 23 2020 61 mins
    Moderator: Danny Bradbury
    For any security leader, achieving effective, holistic and ongoing organizational security processes and policies is the end-goal.

    However, successful information security is rarely an exact science, nor is it something that can always be achieved without making some mistakes and miscalls along the way. In fact, being truly deemed as ‘successful’ when it comes to modern security approaches is sometimes the result of security leaders and professionals getting things wrong, learning from mistakes and improving and adapting as a result.

    In this session, a panel of security experts will reflect upon why mistakes made along the security journey do not have to halt overall progression goals and outline how security leaders can turn security failures into significant wins for their business.

    Key takeaways:
    • How to detect, own and learn from security mistakes
    • Why more can be learned from security ‘failures’ than ongoing ‘wins’
  • #IMOS20 North America Keynote - Zero Trust Internet - Moving Beyond ‘Almost Safe Recorded: Sep 23 2020 33 mins
    Moderator: Eleanor Dallaway
    Infosecurity invites its headline sponsor, Menlo Security to present

    Although enterprise spending on cybersecurity continues to increase, enterprises find themselves getting infected again and again and again. In this session, we will consider how digital transformation is accelerating the adoption of cloud based apps and services, rendering legacy security architectures obsolete. Our keynote speaker, Kowsik Guruswamy, will discuss how we need to evolve our thinking from being app/data centric to a cloud-based, user centric approach. Ultimately, this session will question how we can move beyond good vs. bad and ‘almost safe’ to Zero Trust?
  • #IMOS20 Point Counterpoint Live - Security Vs Privacy Recorded: Sep 23 2020 31 mins
    Moderator: Michael Hill
    Two security experts go head-to-head to discuss the topic of security versus privacy and explore whether achieving both in equal measure is ever going to be a reality.
  • #IMOS20 Cyber Insurance: To Buy or Not to Buy? Recorded: Sep 23 2020 60 mins
    Moderator: Dan Raywood
    The potential ramifications of a data breach for an organization are many, but with growing ransomware demands and huge financial penalties under regulatory schemes, such as the California Consumer Privacy Act and GDPR, the monetary fallout of suffering a data breach has taken on greater importance.
    This has given rise to discussions around a newly emerging form of indemnity that seeks to protect the wallet book of businesses should they fall victim to cyber-attack – that of cyber insurance.
    This session will explore the importance and necessity of cyber insurance for modern enterprises, outline what businesses must assess when considering investing in cyber insurance policies and address how organizations can recognize what type of coverage is right for them now and in the future.

    Key takeaways:
    • The growth and evolution of cyber insurance
    • How to determine if a cyber insurance policy is right for your business
    • The future role of cyber insurance in the information security landscape
  • #IMOS20 The Modern CISO: Leading from the Front Recorded: Sep 23 2020 60 mins
    Moderator: Michael Hill
    Much like modern organizations, the role of the CISO has evolved greatly in recent years. In today’s enterprise landscape, CISOs are required to be far more than just technical security professionals – they need to be business-minded, innovative, inspiring and communicative, all the while ensuring the business’ data remains protected in the face of ongoing cyber-threats.
    Put plainly, the role of the modern CISO is one of significant challenge, risk and – with the right approach – reward.
    In this session, a panel of CISOs and security leaders will discuss the mechanics of the modern CISO role and share high-level insight into how CISOs can lead their organizations to more effective information security postures.

    Key takeaways:
    • The key challenges impacting modern CISOs, and how to overcome them
    • How CISOs can lead their organizations to greater and more efficient security
    • What the future has in store for the CISO role
  • #IMOS20 How To: Align Security Concepts with Business Goals Recorded: Sep 22 2020 32 mins
    Moderator: Michael Hill
    In the current digital and data-dependent enterprise landscape, modern information security has to act as a business enabler – understanding and supporting the specific needs and goals of a business whilst also ensuring effective and holistic data security.

    In this How To session, an expert speaker will discuss why it is vital for the security function to be well-aligned with the wider business and outline the key best practices that security leaders and their teams should implement to achieve that aim.
    Key takeaways:
    •Aligning security with the wider business: what, why and how
    •Making your security function an integral business-enabler for the present and future
  • #IMOS20 The Workforce You Want: Upskilling Your Security Team Recorded: Sep 22 2020 62 mins
    Moderator: James Coker
    The Workforce You Want: Upskilling Your Security Team
    The cybersecurity skills gap is much-discussed and greatly maligned. The latest figures from (ISC)2 predict that global IT security skills shortages have now surpassed four million, a figure that continually appears to be increasing. In fact, the same research estimates that the global security workforce needs to increase by a staggering 145% to cope with a surge in hiring demand.

    This suggests that, with shortages and the hiring of new talent remaining ongoing challenges, companies can hugely benefit by focusing on retaining and progressing their current workforces – including implementing effective training, upskilling and encouraging individual growth.

    In this session, a panel of experts and thought-leaders will explore how and why organizations can mitigate the security skills gap crisis by concentrating on developing those already employed within their businesses.

    In this session, learn:
    • The best strategies for upskilling and retaining your security team
    • The power of individual development and how to achieve it
    • How to implement effective training
  • #IMOS20 Keynote Address Recorded: Sep 22 2020 30 mins
    Moderator: Michael Hill
    Infosecurity invites its headline sponsor Google Cloud, Chronicle to present to you:

    Scale Up to Your Security Telemetry

    Big data once meant terabytes; today, your business thinks in petabytes or more. In this keynote presentation, a high-level security expert will explore how to investigate incidents in your own network by correlating your vast amounts of telemetry data (100+ petabytes or more) with threats in the wild at the speed of a Google search. They will also share insight on how organizations can power their incident investigation and threat hunting with relational metadata and retroactive and proactive hunting capabilities in the world’s largest malware library.

    In this session, learn :
    - How to utilize a cloud-native security analytics system built on core Google infrastructure and fed by a vast threat database
    - How to scale your log management in order to achieve maximum visibility.
    - How to get visibility into all your data sources in one place with tools to help you normalize, correlate, and contextualize it in seconds
  • #IMOS20 Startups in the Spotlight: Tales of Investment and Innovation Recorded: Sep 22 2020 65 mins
    Moderator: Eleanor Dallaway
    Startups in the Spotlight: Tales of Investment and Innovation
    Innovation has always been a key driver of evolution and advancement in the information security industry. Startups, often bringing new ideas and services to market, have traditionally played an important role in this regard.

    In fact, even some the largest, well-known and most influential organizations in the security industry today once started their journeys as small startups with just a handful of people at the helm. The path of a successful startup can be far from straightforward with many hurdles that must be overcome, but the potential for success continues to inspire new and emerging companies to achieve their goals.

    This session will highlight the important role that startups play in driving the information security and tech industry forward, explore the challenges and difficulties new companies face and celebrate the infosec sector’s tradition of supporting emerging organizations within the sector.

    Key takeaways:
    • Hear from and learn about some of the most promising startups operating in the infosec industry
    • Why startups are a key element of the evolving security sector
    • How an original concept can mature into an industry-defining offering
Strategy - Insight - Technology
Dedicated to serving the information security community, in person, in print and online.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Identity Management for a Dynamic Workforce: Zero Trust Versus Risk-Based Sec
  • Live at: Aug 27 2020 2:00 pm
  • Presented by: Moderator: Michael Hill, Speakers: Ian Jennings, Russel Ridgely, Ed Moyle
  • From:
Your email has been sent.
or close