All Access: Threat Detection and Response 2023

February 21 - 22, 2023 | Free CS Hub Online Event

Agenda Day 2: 22 February 2023

9:00 am - 9:30 am EST What happens after the threat is detected?

Vladimir Krupnov - Threat Intelligence Lead, Revolut Bank

There are a number of processes to follow in an organisation after the threat is detected. The response also depends on the type of a business and industry.

In this fire-side chat our guest speaker at Revolut Bank will share his thoughts on recovery following the cyber security attack, steps in the processes and challenges that many organisations are facing, such as:

  • How to escalate and ensure correct procedures are followed
  • How to coordinate with other industry players
  • Intelligence sharing between the banks and fintech
img

Vladimir Krupnov

Threat Intelligence Lead
Revolut Bank

9:30 am - 10:00 am EST Protect customer data by enabling a comprehensive Response and Detection solution

Working in a multi-cloud environment, many global organisations are facing serious cyber security threats to their customer data being compromised or stolen. That’s why continuous protection from cyber attacks is a number one priority for all customer serving businesses.

In this session, you will learn how to:

·       Enable a solid R&D system designed for the cloud environment

·       Detect vulnerabilities and security threats and ways to eliminate them

·       Protect customer data by integrating your cloud-based applications with security systems

10:00 am - 10:30 am EST Centralise cloud and hybrid environments to achieve a better security outcome and reduce workload

An effective Detection and Response system doesn’t have to be complicated. In fact, a smart security solution can help organisations that work in multi environments centralise their cloud and hybrid presence, making it easier to track and detect attacks across the business.

In their session, learn how to

·       Reduce workload by centralising different environments

·       Track threats easily across the entire environment

·       Save costs by improving incident response times