When it comes to enterprise security, Zero Trust is a concept that is becoming popular. More of a philosophy than a set of procedures, Zero Trust requires a deeper discussion and look at security. Is it practical for every one? Should Zero Trust be a priority? Why does it matter? What are the challenges? What is...
Zero trust is a great security model; however, it is useless without the ability to enforce it. If implemented fully, zero trust helps to dramatically decrease an organization's cybersecurity risk. We will explore two uses cases that include the remote workforce and serverless along with how threat intelligence and...
Think you know Zero Trust? You might have just half the story. In the new normal, Zero Trust is a part of your enterprise strategy. It's about secure remote access for your employees and partners. It's the model built on BeyondCorp. But, you've perhaps got just half the story.
Beyond remote access, beyond people,...
Even without the current forces of change, the world would be adopting zero-trust principles, but cyber security professionals still want to know why is the adoption of ZT happening? In this session Dr. Chase Cunningham details what the real issues are and how an organization should deal with the truths that are so...
Zero trust, supply chain security and DevSecOps. These are the three 2021 priorities for Katie Arrington, CISO for Acquisition and Sustainment within the U.S. Department of Defense. In this exclusive keynote, she details the Cybersecurity Maturity Model Certification that will forever change the relationship between...
Enterprise cybersecurity changed over a weekend last March - and so did the conversation about zero trust security. No longer a marketing buzz phrase, zero trust now represents the practical approach to validating credentials of employees, partners and trusted third parties. We've shifted from "trust, but verify" to...
Legacy software supply chain "exploits", such as Struts incident at Equifax, prey on publicly disclosed open source vulnerabilities that are left unpatched in the wild. Conversely, next-generation software supply chain "attacks" are far more sinister because bad actors are no longer waiting for public vulnerability...
Security is everyone's problem, forging close partnerships between developers, DevOps, and AppSec teams is critical. Ops must create pipelines that let developers work at the speed of serverless and still deploy applications in a realistic and secure way.
As we begin 2021, many financial services companies are turning their attention to planning for the future - this means adapting to a hybrid workforce and a much greater reliance on cloud for operational efficiencies. While the transition is well underway for many organizations, the journey is fraught with challenges...
Fixing a breach is far more costly than prevention. Organizations are under pressure to respond to it faster. More often than not, though, it can be weeks or months before you’ve even realized that you’ve suffered one.
The session will discuss:
Understanding the legal implications of the incident and plan...
How to strategize and see security in a new light amidst new challenges.
The emergence of technologies such as IoT, skill shortage, insider threats, and cloud movement has posed the most significant risks for enterprises in the current times, which are amplified by increasing phishing attacks, targeted attacks,...
For years, playing whack-a-mole with security threats has been the only way to keep attackers at bay. With specialized solutions suited to every flavor of attack out there, cybersecurity has become capital intensive and increasingly complex. But what if, instead of ‘mole-whacking’ vector-based defense, IT could...
COVID-19 has resulted in increased digitization across sectors, with the enterprise cybersecurity leaders suddenly finding themselves tasked with securing a new hybrid workforce and defending their largest-ever attack surface. The trend has led to data proliferation, and organizations struggle to handle the sheer...
Covid-19 had a major impact on cryptocurrency activity, both legal and illegal, resulting in record breaking ransomware attacks seen around the world. As the pandemic raged, cybercriminals took advantage of new extortion tactics, with victim payments rising over 500% compared to 2019. Join us as we break down the...
While corporate strategies around digital transformation drive good business outcomes, cybersecurity threats are amplified by the ongoing pandemic and the emergence of new technologies such as IoT and cloud momentum. How can security leaders avoid obstacles and become catalysts for change and deliver business value...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.