Share
Cloud Security eSummit
Event Agenda

Registration is free!
Watch this space for updates and announcements!

12:00 PM ET
Cloud Security eSummit opens!

12:10 PM - 1:00 PM ET
KEYNOTE: Digital Transformation, Governance and The Cloud
Mark Thomas,
President, Escoute Consulting

Cloud solutions have been around for some time now, but with the emergence of “digital transformation” the cloud is a central to an enterprise’s digitization strategy. The cloud can provide great benefits such as cost savings and efficiencies; however, there are some inherent risks that most organizations don’t consider when they choose this route. How can you guarantee information protection when you can’t touch the server that your data is stored on? 

Moving in this direction does not provide immunity to some core accountabilities organizations have regarding the governance and protection of the information being managed in the cloud. Enterprises are responsible for the Governance, Risk and Compliance of their data regardless of where or how it is processed. In this presentation, we will review the core tenets of a GRC program, define the most common risk scenarios to cloud usage, and translate these into realistic and meaningful controls that can assist in reducing the likelihood and/or impact of those risks. Learning Objectives:

  • Explore the various forms of cloud usage in a digital transformation initiative
  • Define the core risk scenarios inherent to moving applications and data to the cloud
  • Identify and prioritize key strategies to mitigate the risks of cloud usage

1:00 PM - 1:10 PM ET
BREAK

1:10 PM - 1:45 PM ET
WEBCAST: Zero Trust in Practice
Nick Fisher
, Product Marketing, Okta
Ivan Dwyer, Product Marketing, Okta

Why Identity Drives an Adaptive Workforce
Zero Trust is quickly becoming the dominant security model for the cloud, shifting the perimeter from the network to the people and devices that make up a modern workforce. As a model with many moving parts, the immediate question is where to start? This session will focus on:

  • The full Zero Trust reference architecture and steps to get there
  • Why Identity is the foundational layer to build contextual access controls from

1:45 PM - 1:55 PM ET
BREAK

1:55 PM - 2:30 PM ET
WEBCAST: Attackers Don’t Break In, They Log In
Richard Beckett,
  Senior Product Marketing Manager, Messaging Security, Sophos

Highly targeted social engineering and email fraud attacks are targeting your employees in Office 365. Allowing attackers to bypass the systems, applications and networks they previously attacked with malicious content to gain access to funds, data and access credentials. With cybersecurity a top priority for organization and skills in short supply, join us to see how Sophos compliments O365 to catch email attacks and create a security awareness culture among employees. You’ll see for yourself how:

  • Sophos Email closes the gaps in Office 365 email security
  • Sophos Phish Threat educates and trains your employees to spot and stop attacks
  • The importance of a layered defense against cyber-attacks, managed from a single console, Sophos Central

2:30 PM - 2:40 PM ET
BREAK

2:40 PM - 3:40 PM ET
WEBCAST: Past the Perimeter: Earned Access Through A Zero-Trust Model
Sean Frazier, 
Federal Advisory CISO, Duo Security

In this webcast, you will learn:

  • Why the traditional perimeter-focused security model won’t meet the needs of most modern organizations
  • How a zero-trust security model can overcome these challenges
  • How you can incorporate this approach into your existing architecture without starting from scratch

Most businesses leverage at least some cloud resources, and users accessing these tools want the flexibility to work anywhere and on any device. An effective security strategy must be flexible enough to protect access from boardrooms and bars, cubicles and coffee shops alike. To do this, companies must ensure that users and their devices meet the same security controls, whether they’re outside or inside the network perimeter. 

Duo adopted the “zero-trust network” model to solve this challenge. All networks and devices are treated as untrusted until proven otherwise, and their health is checked each time a user connects to a protected resource. This approach depends on visibility into whether basic device and network security standards are met. It also requires the ability to enforce granular policy controls based on the results of that health check. This allows you to manage access in the cloud just as easily as on your own network.

The perimeter is disappearing, and it’s not coming back… find out how you can get a head start on what’s next.

3:40 PM - 3:50 PM ET
BREAK

3:50 PM - 4:15 PM ET
WEBCAST: Security Without Borders: How Cyber AI Defends the Cloud
David Masson
, Director of Enterprise Cyber Security, Darktrace

As Cloud Service Providers continue to bolster their cyber defenses, sophisticated criminals are increasingly targeting the weak link in the cloud’s Shared Responsibility Model: you. In fact, Gartner estimates that at least 99% of cloud security failures will have occurred on the customer’s portion of this model by 2023—the result of insider threats that legacy tools aren’t designed to detect and machine-speed attacks that incident responders can’t contain.

The latest cyber AI systems employ a fundamentally unique approach to safeguard today’s borderless networks, one that defends multi-cloud and hybrid infrastructures in real time. Unlike conventional security tools that look only for known malware variants at the perimeter, cyber AI works by self-learning what constitutes normal behavior for each user, device, and container it protects, monitoring the entire digital estate to catch the subtly anomalous behavior indicative of both novel and insider threats. Most critically, cyber AI response capabilities can now autonomously neutralize cloud-based attacks in second—before it’s too late. Such attacks have unfortunately become a fact of life for today’s cities and companies, but with cyber AI, data stored in the cloud can weather the storm. In this session, you will learn:

  • How cyber AI response tools neutralize cloud attacks that strike at machine speed
  • Where criminals are exploiting key blind spots on modern, borderless networks
  • Why only the AI anomaly detection approach can catch cloud-based insider threats
  • What gaining 100% visibility across your virtual environments, third-party clouds, and hybrid deployments can reveal about your latent vulnerabilities

4:15 PM - 4:25 PM ET
BREAK

4:25 PM - 4:55 PM ET
WEBCAST: 
Securing Identities in a Zero Trust Reality
Asaf Lerner,
Identity and Access Management Market Owner, Gemalto

Organizations should not automatically trust anything inside or outside their perimeters. As we enter the no perimeter reality, enterprises should leverage granular security applied at the application level based on users, their locations and other data to establish trust. This zero trust model puts all its effort behind protecting applications and the data they access.

4:55 PM - 5:15 PM ET
NETWORKING BREAK IN THE EXHIBIT HALL

5:15 PM ET
Cloud Security eSummit closes

 

 

 

(ISC)² members: (ISC)² members who attend MISTI virtual events or eSummits may be eligible for one CPE credit each applicable webcast subject to (ISC)² approval. Please refer to (ISC)² Guidelines before reporting CPE activity directly on www.ISC2.org