Mitigating Cybercrime Through Automated Response and Integration

  Presented by Fortinet

Come join our talk on mitigating cybercrime and learn about best practices to help your company maintain a strong security posture through the digital transformation and beyond. The bad guys are using automated tactics to try to find a foothold in your network. Isn’t it time to leverage an integrated security approach to automate your response?

Cyber AI: Fighting Back with Autonomous Response

  Presented by Darktrace

The digital enterprise is constantly expanding, with new IoT, cloud, and operational technologies all challenging traditional notions of cyber security. Safeguarding these evolving environments against machine-speed attacks has never been more difficult.

Yet the digital battleground now features its most formidable defender in Cyber AI—a self-learning technology that distinguishes friend from foe in order to thwart threats autonomously. With the Cyber AI Platform protecting your entire infrastructure in real time, it doesn’t matter whether the attack originates on a connected device, an industrial system, or in the cloud. Wherever it strikes, the AI fights back in seconds.

In this session, you’ll discover:

  • Why only Autonomous Response can counter today’s machine-speed attacks
  • Where advanced threat-actors exploit vulnerabilities in the cloud and IoT
  • What achieving 100% visibility can reveal about your organization’s risk profile
  • How the Cyber AI Analyst reduces the time spent triaging threats by 92%

A Behavioral Approach to Web Application Security

  Presented by CompuNet & F5 Networks

In an ideal world, security controls would be as loose as possible for well-behaved legitimate users and increasingly tightened around bad actors. Join us as we discuss a behavioral approach to identifying and thwarting attacks against your web applications from highly skilled threat actors.

The Current Malware Threat Landscape & Enterprise Grade Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Turning Alerts Into Answers: Solving the Cloud Security Conundrum

  Presented by Expel

Our businesses are moving to the cloud with or without us. Perceived cost savings and convenience are key drivers for the business. While there are clearly opportunities for improvement in overall security when it comes to the cloud, we see CISOs being concerned about the lack of visibility into where our data resides and the controls that are said to be in place. And the concern isn’t just with cloud providers, it’s with all third parties with whom we share data, systems, and connections.

In this session, Justin Bajko of Expel will talk about what CISOs and security operations leads need to care about when it comes to cloud and security, and how to determine the different attack surfaces that exist in the cloud and with third parties. We’ll also talk about the processes and technologies that exist to help manage third party risk and the technical controls available to help secure the cloud.

Emerging Trends in Cybersecurity

  Presented by Trace3

As the threat landscape rapidly expands, enterprises across all industries are seeking approaches and technologies to safeguard their interest from advanced and persistent threats. Mounting regulatory and financial penalties against a talent shortage, the need for better cybersecurity only becomes more apparent.

Startups are emerging to offer solutions that address vulnerabilities arising from the growing threat vectors introduced by the expansion of the enterprise domain. Understanding trends and technologies that are driving the future of cybersecurity is critical to both individual contributors and leaders.

Achieving Successful Security Segmentation

  Presented by Illumio

You rely on the network to deliver applications. But as IT scales in size, connectivity, and environments outside the network to public cloud, we cannot rely solely on the network to secure applications. The answer is to decouple security segmentation from the network. This allows us to protect applications wherever they run – because they do not live exclusively on our networks anymore, and enforcement must go wherever they do.

During this informative session, we’ll discuss:

  • What is security segmentation?
  • Challenges of traditional network segmentation
  • Decoupling segmentation from network architecture
  • Principles of successful security segmentation
  • 5 steps to implement a strategy

MFA is not a Four Letter Word

  Presented by JourneyTEAM

Securing identities is at the core of an intelligent cloud deployment. Learn how to plan and implement one of the most important security measures in Office 365, MFA! We will teach you tips and tricks on how to successfully deploy MFA without your users hating it and you will get the latest updates around usability for an MFA deployment.

Architecting the New SD-WAN Edge for the Cloud-First Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.