Archived Virtual Conference: Change Agents in the Cybersecurity Era 

 
Register Now

Archived until 9 June 2018
Earn up to 5 Free CPEs

There are potent agents of change shaping enterprise security operations. AI and machine learning have pushed analytics to a new level, while “post-signature” endpoint security approaches are allowing better preemptive detection of unfamiliar attacks. The discipline of "Threat Hunting" has been increasingly incorporated into standard practice. But how should you integrate these technologies as the general climate of public impatience with corporate data breaches surges and new European privacy and data protections ratchet up the standards for success? This virtual conference keeps your finger on the pulse of these key security change agents.

View the archive to:

  • Connect with thousands of your peers from across the globe
  • Earn Up to 5 CPE hours without the cost of travel
  • Ask questions directly to industry experts and speakers
  • Enhance your professional knowledge

Register today to reserve your seat at this free online event!

Register Now


GDPR SESSION 1: Are Your Data Privacy Processes Regulation Ready?

As the May 25th deadline for compliance with the EU's General Data Protection Regulation (GDPR) looms, companies are busy putting the finishing touches in place to comply with the new rules. By now, your GDPR house should be in order, but now it's time to put GDPR compliance planning into practice. Are you ready?

The GDPR rules are already revolutionizing global companies' approach to data privacy and how they handle customer data. Even the best plans will have growing pains as they are put into practice, so we'll explore how to adapt and shift your compliance processes over time as the GDPR rules mature. In this webcast, you'll learn how to put the finishing touches on your information governance plans to make sure it's GDPR ready. Topics of discussion will include:

  • Best practices to implement "privacy by design" across data governance processes
  • Advice on meeting the GDPR's data breach notification process to avoid costly fines
  • How to assure consent among new and existing customers when it comes to how the company uses and distributes their data
  • Developing GDPR-specific information mapping and audit techniques to ease compliance with data management regulations
  • Choosing the right data protection officer for the enterprise, and what responsibilities this officer is in charge of

Join us for this webcast, where Ice Miller attorney Nick Merker will provide advice on making sure your GDPR rules are regulation ready.


SESSION 2: Securities Operations Center: The New Threat Hunting

With data threats proliferating, more large organizations are turning to a security operations center to centralize ops that protect information systems. As SOCs continue to mature, it’s also revolutionizing companies approach to threat hunting. Increasingly, threat analysts and other security professionals are using machine assisted and fully automated techniques to detect security incidents. While the human factor is still prevalent in this type of threat hunting, there has definitely been a shift toward these tech-driven security assessment tools that use analytics, continuous monitoring and behavior analysis to detect nefarious activity.

In this webcast, you'll learn how security operations centers are changing how companies and their cybersecurity professionals approach data protection strategy. Topics of discussion will include:

  • How AI and machine learning processes create cutting edge opportunities to protect data – and creating unforeseen risk
  • The latest best practices to hunt potential threats and detect risks before they cause a significant, and costly, data breach
  • How to best balance security tech with employee input to solidify data protection and threat hunting efforts
  • The required infrastructure that goes into a successful security operations center, and the potential costs that accompany this infrastructure.

Join us for this webcast to learn if your security operations center is ready to detect the latest threats to your business.


SESSION 3: Modern Day Endpoint Protection

Today’s endpoints are where things happen – both good and bad. Endpoints are not just where business gets done but they’re also where attackers gain their foothold and carry out their attacks. Do you need the latest artificial intelligence and machine learning to keep your endpoints protected? Or, is it simply a matter of locking things down, training your users, and hoping for the best? Given the high-profile attacks we all hear about combined with the daily security struggles in businesses both large and small, it has become clear that traditional endpoint security strategies aren’t working. In this session, independent security expert and writer of 12 books including the highly-successful Hacking for Dummies, Kevin Beaver, will share with you some common endpoint security oversights he sees in his work along with the varying levels of next-gen security and control you need in order to keep these critical systems in check.


SESSION 4: AI, Automation and Analytics for Operational Security Success

Is your organization ready to protect itself against next-generation threats? It may not be. If you haven’t deployed “the three A’s”—AI, Automation, and Analytics—you’re likely behind the curve when it comes to detecting and remediating potential threats. This session covers best practices for implementing and operating a “triple-A” security program, including:

  • Tools and technologies that deploy AI
  • Analytics and how to customize them
  • Effective incident response policies
  • Managing and securing cloud-based resources
  • Organizational and operational best practices for a triple-A-enabled SOC

We’ll cover operational success metrics and provide a roadmap for moving your security practice further along the maturity model, for both on-premise and cloud-based resources. Finally, we’ll cover how and we’ll review how triple-A tools integrate with other operational dashboards, including risk management and infrastructure operations.