How are emerging threats impacting infrastructure security? This seminar hosts a variety of experts and practitioners who share strategies and best practices to help mitigate risks and fortify the resilience of essential systems. Topics include managing complexities, leveraging Infrastructure-as-Code, assessing third party risk, challenges with regulations, team building, and more. Participants will gain insights into enhancing digital forensics, configuring for zero trust, and managing infrastructure risk.
June 6, 2024 | 11:00 AM ET in Virtual Seminars
PART 1: Leadership Panel: The Journey of a CISO
Traditional network infrastructure has grown more complex as so much of what is IT "native" now bleeds into cybersecurity. What is the impact of digital transformation on legacy systems? Join this panel to hear from IT decision makers who have been at the front of answering that question. We will explore the benefits and challenges of working in collaboration with cloud and security teams and share approaches to overcoming challenges with limited resources, getting tools to work in harmony, visibility into the network, who reports to whom, and more.
Moderator: Devon Rollins, Vice President and Divisional Information Security Officer for Enterprise Data Machine Learning, Capital One
Panelists: Rob De Gracia, CTO, Bregal Investments, Thomas Marsland, Board Chairman/CEO, VetSec, and Patrick Miller, CEO, Ampere Industrial Security
PART 2: Choose your track, Interactive Discussion or Traditional Session
These sessions are coinciding and attendees are free to move within sessions as they wish.
The Interactive Discussion will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion and remind attendees that no comment attribution or recording of any sort should take place. Media are not permitted to attend.
Interactive Discussion | Traditional Session | |
---|---|---|
Session 1 |
Defending the Core: Can Regulation Protect Critical Infrastructure? Together, attendees will share their perspectives into the evolving landscape of threats targeting critical infrastructure, the efficacy and challenges of current regulatory and standards frameworks, and the gaps that need to be addressed to fortify defenses against sophisticated cyber adversaries. Speaker: |
Enhancing Security Investigations Using Digital Forensics from the Bottom Up This discussion looks at the reality of enterprise growth, infrastructure security needs, and how to close the gap with digital forensics using a four-step methodology and help organizations assess their current security posture and evolve into a more mature organization that has security and proper response baked in from the start. Speaker: |
Session 2 |
How to Leverage Infrastructure-as-Code to Secure Cloud Resources With the migration from on-prem to cloud, the landscape for security has widened to include a plethora of resource-as-service offerings which changes the way we secure resources. Speaker: |
Assessing Vendors and Partners and Influencing Secure Practices A solution is only as secure as the sum of its parts. Modern architectures involve integration of software and technology provided by or controlled by external entities. Beyond auditing internal infrastructure, applications and security practices, it’s vital to assess vendors, partners, etc. Assessment results will provide confidence or an opportunity to influence preferred security improvements. Speaker: |
Session 3 |
Managing Infrastructure Risk through Automatic Vulnerability Triage and Risk Prioritization In this discussion, we’ll discuss our collaboration between our data science, machine learning, and security teams to develop a machine learning model that classifies and prioritizes cybersecurity vulnerabilities. Speaker: |
The Hidden Risks of SASE/SSE: Why Configuration Matters for Zero Trust Security In this talk, we explore the hidden risks of SASE/SSE, such as not leveraging the power of SASE, configuration complexity, and compliance issues, and how they can undermine the zero-trust security model. We also propose some best practices and recommendations for configuring and managing SASE/SSE solutions to achieve optimal security and performance. Speaker: |
Session 4 |
Q&A Speakers: Dominique Calder, Taharka Beamon, Srinivasa Addepalli |
This virtual seminar is sponsored by Wiz. Wiz is a cloud security company, founded in 2020. Organizations of all sizes and industries use Wiz to rapidly identify and remove the most critical risks in AWS, Azure, GCP, OCI, Alibaba Cloud and Kubernetes so they can build faster and more securely. Gain unmatched visibility, accurate prioritization and business agility.
Interactive Discussion Speakers
Traditional Session Speakers
Technology Infrastructure & Operations
infrastructure security