The IT and security heads are challenged from time to time about keeping the systems up and running, with availability and cyber resilience paramount. Breaking the kill chain is critical to understand in securing the environment. How can a ‘zero trust’ architecture be used in building this network and security...
What do a tinker, a tailor, a soldier, a spy, a cat, George Michael, and William Foster have in common? And more importantly, what on earth do they have to do with tackling insider risk? To find the answer to this somewhat bizarre riddle, we clearly need context, which is also vital component to tackling insider risk....
In this presentation, Krishna Narayanaswamy, Netskope Chief Technology Officer, will analyse the main challenges of this new normal of remote work, how it can evolve to a strategy of information control and threat protection from anywhere, any device, having complete protection of information, regardless of where it...
The traditional paradigm of investing in protection of known threats alone has been declining over recent years, as attackers become more adaptable and capable. Combine this with increased threats and attacker ingenuity it is small wonder that a CISO’s role has become more complex. This leads to the inevitability of...
In 2021, the challenge isn’t just about securing the remote workforce. It’s about securing any workforce, whether it’s in a home office, a traditional branch office, a software-defined branch or a combination of all three.
Join this panel of practitioners and security experts as they explore:
How do you...
As analysts say, after feeling so defenseless in the face of calamity, enterprises are moving to an adaptive era. With the distributed workforce will come the inevitable discomfort of potentially exposing organizations to cyberattacks if the right precautions are not taken to adapt to this new phenomenon. Are...
Covid-19 had a major impact on cryptocurrency activity, both legal and illegal, resulting in record breaking ransomware attacks seen around the world. As the pandemic raged, cybercriminals took advantage of new extortion tactics, with victim payments rising over 500% compared to 2019. Join us as we break down the...
Throughout 2020 organizations widely adopted a zero trust architecture in response to the pandemic and it is now fast replacing traditional VPN approaches. As the zero trust approach continues to evolve, the challenge for organizations in 2021 and beyond lies in how to implement this approach across environments,...
Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations, especially with the move to cloud computing and rise of IoT. Organizations...
Migrating to Zero Trust is a journey not often easily achieved. Zero Trust and legacy workflows can coexist as you tackle one business process at a time as your organization aspires for a higher level of operational maturity and greater cybersecurity resilience. Join Hitachi ID as we discuss how to create a Zero Trust...
In this panel session we talk to three security veterans about how their IAM challenges have been compounded since going remote and what security controls they’ve put in place to assist this change. We also discuss the importance of adopting a holistic identity strategy and how to get the business on side to support...
In both the public and private sectors, Jeremy Grant has long been a leading force in shaping how government and enterprises respond to the evolving needs of identity security.
In this exclusive session, Grant discusses:
The “State of Identity” and what COVID-19 has taught us about the inadequacies of the...
People, applications, devices - they all have digital identities, and in today's transformed environment they all demand new approaches to identity and access management. In this exclusive panel, three CISOs discuss their unique IAM challenges, including:
Protecting connected devices
Managing user (and identity)...
Zero trust has truly come of age in the last 12 months, but there are many misconceptions relating to what it is, where to start on the journey and how to manage user privileges in a zero trust environment. One of the fundamentals for zero trust is strong authentication to ensure that the right assets are connecting...
Join this session to learn from Richard Bird, Chief Customer Information Officer, Ping Identity. And Gray Mitchell, CISO + VP of Advisory and IDMWORKS, how to communicate the value of customer identity and ensure that it is recognized, funded and prioritized like the revenue-generating behemoth that it is. We’ll end...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.