Chief Information Security Officer (CISO) Program
HOT TOPICS: Establish and maintain governance, Manage bimodal risks, Effective communication, Demonstrate value, Improve soft skills, Prepare for the future, Identity and access management
The acceleration toward digital business has presented CISOs with new challenges. They must understand the goals of the business, quickly identify and assess the associated risks, and communicate the relevant risks to the business in business terms. The CISO Program helps you become a recognized business leader, superstar communicator and facilitator, and problem-solver.
The Risk Management and Compliance Program
HOT TOPICS: Risk management and the cloud, The risk manager of tomorrow, Technologies and digital risk, Aligning with business goals, Developing an integrated risk management program, Threat landscape
Digital risks are increasing as newer data sources and technologies are woven into the fabric of the business. As organizations adopt more cloud technology and explore more digital business opportunities, existing risk management strategies and practices become quickly outdated. This program highlights risks and complexities that you should expect in transitioning to digital business, as well as methods for mitigating these new risk management challenges.
The IT Security Program
HOT TOPICS: Cybersecurity, Enabling a safer cloud, Mobile security for digital business, Protecting critical data, Emerging security technologies, IoT, Network and endpoint security challenges, Building a resilient infrastructure
Get practical methods and long-term strategies to build a more trusted and resilient environment for digital business and to support an IT organization that’s more agile than ever. Sessions cover emerging trends and state-of-the-art practices and technologies for cloud, mobile, data, application endpoint and network security.
NEW! TechInsights: Security Architecture
HOT TOPICS: Addressing cloud serviced adoption risk, Safety and security in IoT, Application security, Improving the measurement and management of risk, Optimizing SIEM and threat intelligence tools, Privileged account management
The demands on information security and IT risk practitioners are ever increasing. Not only does the attack and threat landscape change constantly, but organizations’ digital business objectives accelerate the adoption of current and emerging technology. Learn technical and tactical insights that enable risk-aware, business-outcome-focused architectures and solutions.
Use of public cloud computing is no longer an "if," but a "when" and "where." Maximizing the benefits of cloud computing and emerging technologies requires the application of traditional security and risk management skills in new contexts, using new technologies, new processes and even new IT mindsets. This virtual track addresses some of these issues to help you establish a robust cloud security strategy.
Application and Data Security
As attackers exploit the application layer, applications that process the to-be-protected data should be securely developed, tested for security vulnerabilities and protected in production. Encryption, CASBs, DCAP and DLP are just some of the resources available to professionals. This track covers the strategies and challenges that direct the selection of solutions to manage risks across the digital business.
Endpoint and Mobile Security
IT leaders face a chaos of multiplatform, mobile and personal ownership challenges amid increasingly chaotic work styles. A balanced endpoint security plan must account for applications, data, OS and platform-specific capabilities. Heterogeneity is a fact of life, and one-size-fits-all solutions are unrealistic. This track addresses some of these challenges and provides opportunities to assess your options from multiple points of view.
Identity and Access Management
With identity a sustaining element of digital business, IAM is a critical obligation for business leaders, security and risk professionals, and IT staff. IAM leaders must align IAM initiatives with the organization's security, applications, data and digital business strategies. They are obligated to ensure their efforts are complementary to the organization's broader IT issues. This virtual track addresses the approaches for managing users' identities, privileges, access and centers on the technologies and best practices that support security, risk and business outcomes.