6 - 8 Dec • America • Online
Building a Positive Security Culture Across the Business
Security Digital Summit
With an increase in online activity due to the pandemic, CISOs are facing a barrage of new challenges.
Join 70+ senior Security leaders on business-critical challenges and disruptive technology and drive your industry forward collaboratively.
70
Attendees100%
Senior Executives9 Hrs
Industry InsightsWhy Attend
Connect with 70+ senior Security leaders for a curated agenda focused on tackling your current business critical challenges and driving industry forward. Our summits are designed to help you:
Build new connections with likeminded senior leaders
Stay current with emerging business trends
Understand the impact new technology can make
De-risk new projects by gaining a broad range of insights
Accelerate key projects through meaningful new partnerships
Downloadable and actionable takeaways
Event Agenda
09:00 - 09:20
Opening Remarks
Intro & Challenger Panel
3 Roundtable moderators
09:20 - 09:50
Keynote
09:55 - 10:35
Workshop
Five steps to unlock the SOC
Unlocking business growth means opening up newer business models, enabling omni-channel experiences, connecting more “things”, and better engaging employees, partners and customers. In the Information Age, that can mean more risk
10:35 - 10:45
Insight Break
10:45 - 11:45
Roundtables
Track 1: Zero to Hero - When, Where and How to Place Trust
With increased digital transformation programs, Zero Trust approach in achieving security goals is becoming a requirement from the start of the journey. What metrics, measures, methods, and messages resonate in today’s trust environment?
Track 2: What You Need to Know about Modern Application Development (MAD)
Today’s software-driven organizations must continue to innovate, and due to the pressures of digital transformation, they agree that their current software development models, and release frequencies can no longer keep pace with demand
Track 3: Underground or in the Cloud: The Reality of Risk Being Omnipresent
Internal digital transformations, changing buyer mentality or anything in-between - the CISO is responsible for the protection of the company, including the most valuable asset of the 21st century: data
11:50 - 12:20
Closing Keynote
Keeping Pace with Process: Best Practices for Managing Security at Scale
In this deep dive session, Synack Solutions Architect and Red Team Expert, Jeremiah Roe takes a practical approach to the attacker lifecycle
09:00 - 09:10
Opening Remarks
09:10 - 09:40
Workshop
Security Operations and The Convergence of Pretty Much Everything
As each organization implements a layered security program, across a distributed infrastructure and shared responsibility with their service providers, how can they efficiently gain visibility into malicious activity and orchestrate effective, business wide responses to attacks?
09:45 - 10:25
Panel Discussion
10:25 - 10:35
Insight Break
10:35 - 11:35
Roundtables
Track 1: Zero to Hero - When, Where and How to Place Trust
With increased digital transformation programs, Zero Trust approach in achieving security goals is becoming a requirement from the start of the journey. What metrics, measures, methods, and messages resonate in today’s trust environment?
Track 2: What You Need to Know about Modern Application Development (MAD)
Today’s software-driven organizations must continue to innovate, and due to the pressures of digital transformation, they agree that their current software development models, and release frequencies can no longer keep pace with demand
Track 3: Underground or in the Cloud: The Reality of Risk Being Omnipresent
Internal digital transformations, changing buyer mentality or anything in-between - the CISO is responsible for the protection of the company, including the most valuable asset of the 21st century: data
11:40 - 12:10
Closing Keynote
Building a positive security culture across the business
With an increase in online activity due to the pandemic, CISOs are facing a barrage of new challenges
09:00 - 09:10
Opening Remarks
09:10 - 09:40
Keynote
How security leaders are using cyber ranges to accelerate learning & development and improve overall security posture
Would you board a plane if you knew the pilot got all A’s in flight school? Probably yes, but what if you learned that the pilot got all A’s, but this was their first time actually flying a plane, and that they never went through any flight simulation training? You’d likely turn around and walk back to the terminal. Just as surgeons must complete a residency, and pilots must undergo flight simulation, cyber defenders should be held to the same standard. Debbie Gordon, Founder & CEO of Cloud Range, will discuss how simulation has quickly become the new standard in cybersecurity for: -Continuous upskilling -Hiring -Measuring risk and preparedness -Establishing learning path for cyber talent Security leaders now understand that advanced technologies aren’t enough to ensure an organization is truly prepared to face any threat, but that the last line of defense (the PEOPLE) must be prepared to detect and remediate a threat before it becomes an incident. This can be done using cyber ranges and other advanced simulation technologies, paired with a system that measures the learning and progress of cyber defenders
09:45 - 10:25
Workshop
Digital Transformation & Response Plan
10:25 - 10:35
Insight Break
10:35 - 11:35
Roundtable Review
11:40 - 12:10
Keynote
The Future of Cyber
The future of Cyber - where will we be headed in 2022?