This one-day forum is free to attend, and places are limited, so register now!
- Discover the latest approaches to cybersecurity from expert speakers.
- Get practical tips on what you can do right now to improve your security posture.
- Learn how other organizations are placing identity-driven security at the heart of their strategy.
- Network with speakers and other delegates.
- OCG Architect’s are available for one-on-one meetings during the forum. Pick an expert’s brain about any identity or security issues your organization faces, and walk away with ideas for solutions.
Who should attend?
If you are an IT Director or Manager, a CSO or CISO, or staff on an IT team there’s something for you.
Where: 200 East Randolph Drive, Suite 200, Chicago, IL 60601
When: October 25, 2017 | 9:00am – 4:00pm
Lunch will be provided
Details will be announced soon – here are is a sampling of the sessions you’ll see at the forum.
Security Transformation Overview
With the breakdown of the traditional perimeter, the ubiquity of machine learning and massive signal collection have enabled an identity-centric approach to security. The use of modern approaches to security, based on these signals and machine learning, enhances existing security approaches, transforming an organization’s ability to respond to the changing attack landscape. This session will explore how this security transformation is affecting businesses.
Putting Rationalized Enterprise Identity at the Heart of Security
This session will discuss the importance of a coordinated, centralized, identity strategy in enterprise security. When users make use of a central identity to access enterprise data, whether it be in on-premises or cloud systems, the enterprise has better visibility of permissions granted, richer information about the usage of these permissions, and cross-platform intelligence about compliance. In addition, investments in identity protection can be applied to these central identities to prevent and detect misuse of the identities by internal and external actors.
Cloud Access Governance – A Key Pillar for Your Cloud Security
With hybrid IT becoming the norm, critical enterprise assets like sensitive data and infrastructure now reside beyond the traditional perimeter. As organizations gain control over shadow IT, they’re also under pressure to deliver sanctioned cloud platforms that meet security and compliance mandates. With cloud providers offering varying degrees of control over security, Identity becomes the common thread binding security and trust fabric together. During this session, gain insight into real-world security challenges around cloud adoption, understand how to leverage risk analytics and security controls to gain visibility, protect “keys to the kingdom” with privileged access governance and establish next generation security framework for applications, data and infrastructure.