Webinars

Webinars

  • Track A, Session 2

    A short paragraph on what will be covered & key takeaways, as well as who should attend. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aliquam eu tortor ut odio mollis pellentesque sed vitae metus. Pellentesque fermentum magna id posuere tristique. Vivamus finibus diam non varius interdum. Fusce elementum est ut ligula blandit pulvinar. Etiam elementum sed urna bibendum venenatis. In quis tellus eget nulla porta blandit ut vel dolor. Vivamus id iaculis lorem. Read More

  • Track A, Session 1

    A short paragraph on what will be covered & key takeaways, as well as who should attend. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aliquam eu tortor ut odio mollis pellentesque sed vitae metus. Pellentesque fermentum magna id posuere tristique. Vivamus finibus diam non varius interdum. Fusce elementum est ut ligula blandit pulvinar. Etiam elementum sed urna bibendum venenatis. In quis tellus eget nulla porta blandit ut vel dolor. Vivamus id iaculis lorem. Read More

  • Is your IR ready for cloud? Lessons from the front lines of nation-state attacks

    The need for structured IR readiness process that addresses both on-premises and cloud environments is clearer than ever before. In this session, an incident responder and cloud security architect will share their personal experiences in defending against nation-state attacks. Through real-life case studies, they will cover best practices for Incident Response methodology and tools that stand the test of nation-state attacks. They will then present how this battle-tested but traditional approach to IR is challenged with the introduction of cloud computing. Finally, they are introducing a a battle-proven framework to enhance your IR capabilities in the cloud. About the speakers: Karl Ots is a cloud and cybersecurity expert, as well as international speaker and trainer, with a broad range of deep Azure expertise. He believes that secure cloud technologies are the key to successful digital transformation. He applies his passion as Head of Cloud Security at EPAM Systems. Karl has been working with Microsoft Azure since 2011 in a variety of forums ranging from large projects to speaking at largest tech conferences, such as Microsoft Ignite. Karl is a Microsoft Certified Trainer (MCT) and a Certified Information Systems Security Professional (CISSP). He is the author of Azure Security Handbook. Aviv Srour has more than a decade of Cyber Security experience. He specializes in defensive security, Incident Response (IR) and organizational information security. Currently he holds the position of Head of Cyber Innovation at EPAM. Aviv has handled hundreds of security incidents, starting back at his days at Israeli Air Force where he led the CIRT team. His hands-on experience with complex security incidents helps him develop an unique view on what is needed from IR readiness processes and how to significantly reduce detection and remediation time. Read More

  • KEYNOTE SESSION : Comprendre le parcours des attaquants

    Les cybercriminels peuvent s'infiltrer dans les systèmes d'information des entreprises et lancer une attaque, mais le processus peut prendre des heures ou même plusieurs mois. Comprendre le parcours des attaquants permet de mesurer à quel point la compromission peut être étendue et quelles mesures s’imposent dans la gestion de la crise. Read More

  • KEYNOTE SESSION Cybersécurité : Une menace qui ne faiblit pas…

    Le nombre de cyberattaques en France et à travers le monde ne baisse pas depuis 2020 et apparaît même en progression au premier semestre, par rapport à 2022. Entre phishing, systèmes affectés par des vulnérabilités, ou encore infostealers, les vecteurs à disposition des cybercriminels ne manquent pas. Panorama. Read More

  • The nuances of physical security and supply chain management

    When you think about it, supply chain security surfaced as an important focus in the wake of several significant events that highlighted vulnerabilities in global supply chains. These events began with the 9/11 attacks in 2001 resulting in a heightened focus on national security - including the security of supply chains. Subsequently, we had high-profile product recalls and quality issues - such as contaminated foods and counterfeit drugs - again raising concerns about supply chain security. Additionally, we also had an increasing reliance on digital systems and technology in supply chains that were made more vulnerable due to cyber threats. These events in conjunction with the rapid growth of globalization and outsourcing of manufacturing and sourcing activities to different areas of the globe increased the complexity and extended the geographic reach of supply chains. Hence, supply chain security -- including cyber and physical -- surfaced and required important focus. Join Ernie Hayden (Founder & Principal, 443 Consulting) to gain a better perspective of the physical security issues involved with the current global supply chain and get insights on how to overcome them. Key challenges discussed in the session include: - Unauthorized access to the supply chain and materials. - Inadequate surveillance of physical security of supply chain operations; and, - Transportation security weaknesses arising from inadequate packaging, lack of tracking and tracing mechanisms, or insufficient verification of drivers and personnel involved in the transportation process. Read More

  • Innovating SCRM and Resilience: Harnessing the potential of digital technologies

    Supply chain managers are being asked to better manage supply chain risk and create more resilient supply chains while maintaining efficiency. Unfortunately, traditional approaches to risk management and resilience are insufficient to address this complex issue. Many companies lack the data, tools, and insights needed to manage risk and improve resilience effectively and efficiently. Fear not - there is a game-changing solution on the horizon: the intelligent use of digital technologies! In this session, Digital Supply Chain Advisor, Fabio Tiozzo shares his expert insights on the transformative power of digital technologies in supply chain risk management and resilience. Get an overview of the digital technology stack, including both mature and emerging technologies, and discover how to leverage them to revolutionize supply chain resilience and risk management. Topics for discussion include: - What supply chain managers can do to better manage supply chain risk and improve resiliency, while maintaining supply chain efficiency. - Why embracing digital supply chain risk management and resilience is not only a necessity for survival, but an opportunity to create new value and gain a competitive advantage. - How to map out your digital adoption roadmap to ensure you are integrating the right technologies into your processes. - And more... Read More

  • Risk management for AI systems

    AI Systems are rapidly emerging in a broad range of industries and applications. Businesses find themselves compelled to accelerate and deploy these systems at “warp speed,” far more rapidly than previous new or emerging technologies. But AI introduces many new risks. In the rush to deploy and monetize AI, there has been little time to understand these risks, nor how to manage and mitigate them. Reports of failures, financial loss, litigation, and reputational damage appear in the news regularly. Even the most experienced and sophisticated AI players have been exposed to these risks. This session will review the key risks of AI systems and their impacts. Many of these are new and unique. Additionally, unlike conventional systems, these associated risks extend into operational deployment and ongoing production use of AI systems. Industry thought leader Allan Cytryn will present examples and consequences along with insights and guidance on measuring, managing, and mitigating them. Attendees will develop a meaningful understanding of what AI is and isn’t, its risks, and how to effectively lead risk management efforts in their organizations. This session is foundational, and hence will also provide attendees a basis for further exploration of AI risks and risk management on their own. Read More

  • Cloud Governance: What is its business value?

    Cloud governance has now become necessary with the increase of businesses choosing to migrate their operations into the cloud environment. Cloud services has become the key driver for digitalization and resilience, from its acceleration and reliance because of the pandemic. How did cloud services increase in value to become the core of digital disruptions? According to studies from Oxford Economics, the outlook of cloud adoption was considered an inflated expectation for future business use. This evolved and paved the way to the realization of cloud implementation. The challenge to be taken is to undergo a “healthy process” to refine and tune its application for business utilization. Cloud services took on a mindset towards a more realistic approach from a strategic perspective in order to execute ways of implementation. This is why cloud governance plays a significant role in achieving the full potential of cloud technology aligned with business objectives. Tune into this in-depth webinar to discuss: - What actually is cloud governance and why do businesses need it? - What is its application to cloud management? - How did cloud services evolve strategically to necessitate the need for governance and what role does it play in businesses and its value? - The definition of cloud compliance from a business, cloud services market and various regional government perspectives. Read More

  • Get a Head Start in the Race Against Ransomware

    Limited cybersecurity talent and budgets are making it increasingly difficult for organisations to recover from attacks. As a result, organisations face longer recovery times and extended downtime, which in turn has a huge financial impact on businesses. Hear from your peers and industry experts on some of the new data security trends and strategies that are helping them shorten recovery time and minimise the financial impact of ransomware and other cyber attacks. During this session you will learn: -> Key benefit drivers for the Microsoft 365 platform and overall movement to Azure in the era of mobile workforces -> Perspective on the trend of global institutions migrating to Microsoft 365, and the importance of protecting mission-critical Microsoft 365 data -> Current threat landscape and cyber security challenges with Microsoft 365 -> Solutions to protect Microsoft 365 data that provides organisations with additional resiliency and recoverability of data Read More