Cyber AI: Fighting Back with Autonomous Response

Presented by Darktrace

The digital enterprise is constantly expanding, with new IoT, cloud, and operational technologies all challenging traditional notions of cyber security. Safeguarding these evolving environments against machine-speed attacks has never been more difficult.Yet the digital battleground now features its most formidable defender in Cyber AI — a self-learning technology that distinguishes friend from foe in order to thwart threats autonomously. With the Cyber AI Platform protecting your entire infrastructure in real time, it doesn’t matter whether the attack originates on a connected device, an industrial system, or in the cloud. Wherever it strikes, the AI fights back in seconds.

In this session, you’ll discover:

  • Why only Autonomous Response can counter today’s machine-speed attacks
  • Where advanced threat-actors exploit vulnerabilities in the cloud and IoT
  • What achieving 100% visibility can reveal about your organization’s risk profile
  • How the Cyber AI Analyst reduces the time spent triaging threats by 92%

PCI and Your Organizational Liability

Presented by Structured

Payment card processing is a critical service many companies and organizations offer. But with this service comes the added responsibility to comply with PCI requirements, and the technical, administrative, and physical controls applicable to card processing environments. Failure to comply can result in costly fines. Plus, a breach of card holder information could have disastrous financial and public relations consequences for compromised merchants.

Want to know more? With compelling and engaging content delivered by Rob Wayt, a PCI Qualified Security Assessor (QSA), you will learn the intricacies of these requirements, proper scoping, and how to mitigate risks that merchants have while card processing.

Fighting Cybercrime with Artificial Intelligence

Presented by Fortinet

In this session you will learn how we are using modern A.I. and machine learning to assist in threat research. Additionally we’ll discuss the evolution of threat research/methodology and how global collaboration leads to enhanced protection for everyone.

The Current State of Ransomware and Proactive Ways to Combat It

Presented by Xiologix

In this presentation, we will do a quick review of the current state of ransomware and then jump right into proactive approaches utilizing the latest tools to prevent and combat this growing threat. We will include a discussion of identifying attack vectors, network defenses, storage defenses, asset management, SOC, incident response, and the benefits of each.

Zero Trust with Micro-Segmentation: Doing It the Right Way

  Presented by Guardicore

In the modern, hyper-connected and threat-laden enterprise landscape, organizations face increasing pressure to protect their systems and data.

Originally conceived in 2010, the zero-trust security concept has recently gained new ground and is now seen as a vital element of enterprise information security. It is a model that aids user and device verification, strengthens authentication processes and ensures encryption.

However, zero trust is not without its challenges, and mastering the art of zero trust takes strategic management and forethought.

In this session, we will explore the concept of zero trust, assess why it is needed in the modern enterprise and outline how micro-segmentation can help win the zero trust race for organizations.

Key takeaways:

  • Why there is a need for zero trust
  • The challenges of implementing zero trust
  • The four high-level principles of zero trust
  • How micro-segmentation can help you prepare for, implement and manage zero trust in your organization

Architecting the New SD-WAN Edge for the Cloud-First Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

Mitigating Cybercrime Through Automated Response and Integration

  Presented by Fortinet

Come join our talk on mitigating cybercrime and learn about best practices to help your company maintain a strong security posture through the digital transformation and beyond. The bad guys are using automated tactics to try to find a foothold in your network. Isn’t it time to leverage an integrated security approach to automate your response?

Cyber AI: Fighting Back with Autonomous Response

  Presented by Darktrace

The digital enterprise is constantly expanding, with new IoT, cloud, and operational technologies all challenging traditional notions of cyber security. Safeguarding these evolving environments against machine-speed attacks has never been more difficult.

Yet the digital battleground now features its most formidable defender in Cyber AI—a self-learning technology that distinguishes friend from foe in order to thwart threats autonomously. With the Cyber AI Platform protecting your entire infrastructure in real time, it doesn’t matter whether the attack originates on a connected device, an industrial system, or in the cloud. Wherever it strikes, the AI fights back in seconds.

In this session, you’ll discover:

  • Why only Autonomous Response can counter today’s machine-speed attacks
  • Where advanced threat-actors exploit vulnerabilities in the cloud and IoT
  • What achieving 100% visibility can reveal about your organization’s risk profile
  • How the Cyber AI Analyst reduces the time spent triaging threats by 92%

A Behavioral Approach to Web Application Security

  Presented by CompuNet & F5 Networks

In an ideal world, security controls would be as loose as possible for well-behaved legitimate users and increasingly tightened around bad actors. Join us as we discuss a behavioral approach to identifying and thwarting attacks against your web applications from highly skilled threat actors.

The Current Malware Threat Landscape & Enterprise Grade Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.