This one-day business-focused forum is free to attend, and places are limited, so register now!
- Hear about the latest business approaches to cybersecurity from expert speakers.
- Get practical tips on what you can do right now to improve your security posture.
- Learn how other organizations are placing identity-driven security at the heart of their strategy.
- Network with speakers and other delegates.
- After you’ve registered, sign up for a one-on-one meeting with an OCG Architect during the forum. Pick an expert’s brain about any identity or security issues your organization faces, and walk away with ideas for solutions.
Who should attend?
This Forum is designed for CISOs and CSOs, and those responsible for the digital security of their organization.
(Are you looking for technical-focused sessions on identity and security solutions? If so, consider our sister event, the Digital Identity & Cybersecurity Technical Forum on Thursday 11th May.)
PROGRAM AT A GLANCE
Where: 11 Times Square (Microsoft), New York, New York
When: May 10, 2017 | 10:30am – 3:00pm
Lunch will be provided
10:30-11:30: Security Transformation Overview (James Cowling, CTO, OCG)
With the breakdown of the traditional perimeter, the ubiquity of machine learning and massive signal collection have enabled an identity-centric approach to security. The use of modern approaches to security, based on these signals and machine learning, enhances existing security approaches, transforming an organization’s ability to respond to the changing attack landscape. In this session, James Cowling will discuss how this security transformation is affecting businesses.
11:30-12:00: Putting Rationalized Enterprise Identity at the Heart of Security (Frank Urena, OCG Architect)
In this session, Frank will discuss the importance of a coordinated, centralized, identity strategy in enterprise security. When users make use of a central identity to access enterprise data, whether it be in on-premises or cloud systems, the enterprise has better visibility of permissions granted, richer information about the usage of these permissions, and cross-platform intelligence about compliance. In addition, investments in identity protection can be applied to these central identities to prevent and detect misuse of the identities by internal and external actors.
1:00-1:45: Cloud Access Governance – A Key Pillar for Your Cloud Security (Nabeel Nizar, VP of Sales of Saviynt)
With hybrid IT becoming the norm, critical enterprise assets like sensitive data and infrastructure now reside beyond the traditional perimeter. As organizations gain control over shadow IT, they’re also under pressure to deliver sanctioned cloud platforms that meet security and compliance mandates. With cloud providers offering varying degrees of control over security, Identity becomes the common thread binding security and trust fabric together. During this session, gain insight into real-world security challenges around cloud adoption, understand how to leverage risk analytics and security controls to gain visibility, protect “keys to the kingdom” with privileged access governance and establish next generation security framework for applications, data and infrastructure.
1:45-2:15: Managing Mobile Risk: Data-Driven Conditional Access (Aaron Cockerill, Chief Strategy Officer, Lookout)
In today’s mobile-first, cloud-first world a holistic approach to mobile security – one that includes comprehensive mobile threat detection and risk-based conditional access, and yet is still easy to use – is an imperative. In this discussion, we’ll explore the mobile risk landscape, as well as how to build data-driven conditional access policies for mobile devices.
2:15-3:00: How to Improve your Organization’s Security Posture, Now (James Cowling, CTO, Oxford Computer Group)
Increasingly cheap computing power enables attackers to attack a target using both brute force attacks to steal identities and highly-scripted, variable approaches to escalate permissions and exfiltrate data. A security strategy which relies on static defenses is vulnerable to these approaches – hence the need to review static policies and embrace modern capabilities which use behavioral analysis (of both user and software) as well as dynamic, contextual policy to detect and prevent attacks. In this session, James Cowling will describe both organizational and technical approaches which you can begin to implement immediately, which will improve your chances of resisting and detecting attacks.
Register for our CISO BUSINESS forum Today!