We kickoff the APAC Summit with an industry veteran looking back, commenting on the present and forecasting the future of global corporate enterprise cyber security.
Watch the on demand session here
Thycotic’s Chief Security Scientist Joseph Carson will take the audience on a journey through the eyes of an employee under pressure to get a task finished—and the risks or workarounds he or she takes that sacrifice security to meet business goals. The audience will learn how, by listening to their concerns, helping educate them to break bad habits, and giving them tools to improve their cyber security hygiene, cyber security leaders can encourage employees to balance both productivity and security.
Time permitting, we would include 2 customers to join Joe for the latter part of the session to discuss the issue further. Walk away with an understanding of:
Watch the on demand session here
During this session learn from an experience-based approach to Multi-Factor Authentication. Key points for the session include:
Watch the on demand session here
What is the value of trust for a company, and what role does a security leader play in order to enable it? Join Advisory CISO Helen Patton on July 13, where she will discuss the factors that make a company trustworthy, how a security team builds trust within an organization, and actionable suggestions for improving security and trust in your organization.
In this webinar you will learn:
· How to define and develop trust, at the individual and organizational level
· Why trust in the security team is fundamental to a functioning security culture
· The pillars of trust to consider when evaluating your organization
· The benefits of reputational trust, and costs when damaged
Watch the session on demand here
In a world where digital transformation is accelerating, with our data no longer in an environment we control, this session will explore how security programs need to transform in order to address the challenges posed. This session helps you realize:
Watch the on demand session here
DLP is not an effective effort if there is too much emphasis on the ‘prevent’ portion of your framework. A keen understanding of the data, fused with a realization of the user’s relationship to data and the forecasting of paths of data in transit is the way forward on managing data leakage.
Watch the on demand session here