We continue to note the fact that cyber security has gone from the Department of No to the Department of Know. Morphing from a department focused on keeping an organization safe through the limitation of tools to understanding the stakeholders goals and subsequently enabling safe business to occur. That is not the finish line. There is no finish line in business enablement. Processes and procedures must continue to evolve.
Watch the on demand session here
With organizations all but irrevocably embracing some level of remote work, business leaders these days are thinking a lot more about security, digital transformation and growth. Yet, there is one element that underpins every one of these priorities − digital trust. Without it, every area of the business would cease to function.
Maintaining trust is crucial to business success. As digital transformation creates new avenues for engaging with consumers and supporting staff, the associated cyber-attack surface expands in parallel. Organizations benefit from digital trust because it not only helps avoid harm, but it also drives loyalty, income and value.
Watch the on demand session here
Our collective goal is to reverse the advantage in cyber conflict enjoyed by attackers and to give defenders an asymmetric edge. To date, that hasn’t been working as most of our tools and technologies are geared to yesterday’s cyberwar. The key here is to of course align with the business and deploy people, process, and technology correctly; but we need to lean into behavioral telemetry, new data structures, and focus on the results we want. This will help us get ahead of emerging Supply Chain threats now visible beneath the waterline and to counter the scourge of ransomware. It’s time to put the older technologies and processes of security in their right place and to embrace new and emerging technologies that work, to experiment, and to innovate in ways that the industry has lacked for at least a decade. We are headed to a future-proof security stack, and it’s attainable now!
1. What is a future-proof technology stack
2. How to embrace new and emerging security technologies
3. Countering supply chain and ransomware attacks
4. aligning security requirements with business needs
Watch the on demand session here
Just like remote working, it seems that we are bound to get used to ransomware attacks as part of our lives. Every week there is a new organisation facing a ransomware attack. According to reports, the incidents we see in the news are just a small slice of the true number of victims. It’s believed that in the first months of 2021 over six ransomware groups compromised almost 300 organisations, stealing an estimated $45 million from their victims.
It’s time for us to fight back.
One enterprise in our own region was hit by a ransomware attack but they fought back and came out as the winner. How did they do it?
Join this session to hear the full story and learn all about AI-driven innovations that are helping enterprises win the war against ransomware.
Kelvin Wee, SentinelOne’s director for Security Engineering and resident white hat hacker will show you:
· Why there’s been a rise of ransomware attacks,
· Why legacy, signature-based endpoint platforms are failing to protect enterprises in Asia against zero-day and fileless attacks,
· The pitfalls of the “1-10-60” model and how to gain 100% visibility with real time, on-device prevention, detection, and response,
· Live Hack: Step-by-step on how a well-known bank in Asia managed to win the war against their ransomware attackers.
Watch the on demand session here
Today's anywhere workforce needs everywhere protection. And when 80% of CISO's say they've experienced a breach, we've reached a turning point. Enabling and protecting productivity in this future of Work requires a new approach. But it means thinking differently.
Many security organizations have adopted a Zero Trust approach to security. While this has traditionally been aligned with trusting identities, it extends into overall threat protection, meaning security departments assume that all content–regardless of whether it originates from a trusted source–is untrustworthy. Treating all content as if it is malicious eliminates the need to make an allow-or-block decision at the point of a click–resulting in a truly preventative approach to securing the anywhere, anytime workforce.
By now, you've also heard the acronym SASE (Secure Access Service Edge), a secure networking architecture that many security leaders are looking to deploy within their organizations. But what is the tie between Zero Trust and SASE? Does SASE come in a box? Do you need to choose between one or the other?
During this session, Mark Guntrip, Senior Director of Cybersecurity Strategy at Menlo Security, will tackle these questions and dive deep on:
The world has reached a security inflexion point and a unique opportunity to reconsider how networks, IP assets, and end-users are protected from an expanding array of cyber threats. Those who choose the right path could emerge more secure than ever before with the capabilities to deliver security without compromise to the new workforce.
Watch the on demand session here
“It depends on your risk tolerance.” That’s a familiar refrain from cyber security executives when asked about best practice. This session features a Chief Risk Officer discussing risk tolerance from an overall organizational point of view.
Watch the on demand session here