Playlist

Managing Complexity: How to Define an Enterprise Cybersecurity Fabric That Delivers

5 videos in this playlist
Event Recording
The Concepts and Technologies that Comprise Contemporary Cybersecurity Fabrics
Jun 22, 2022
In this keynote, we will begin by describing the current threat landscape, and then by defining and scoping out the overall set of complementary and overlapping security technologies that are available in the market today. 
SASE: Secure Access Service Edge = connectivity + security
Zero Trust: access control at the network, application, identity, and data layers
EPDR, NDR, and XDR: detection & response products and integrated solutions
SOAR: Security Orchestration Automation & Response - a way to centralize existing security components, leverage best-of-breed tools, and improve incident response.
This session will set the stage for more detailed discussions of these technologies that will follow.
Event Recording
How to use the ISO 27002:2022 to model and quantify cyber security risks
Jun 22, 2022
During the session with a demo, participants will receive
- practical recommendations to adjust security controls to address changes in the new ISO 27002,
- a model to link vulnerabilities to ISO controls, threats to vulnerabilities and confidentiality, integrity and availability objectives to business impacts, and
- a simple spreadsheet to quantify cyber security risks using Monte Carlo Simulations
Event Recording
Panel | The Future of Cybersecurity Fabrics
Jun 22, 2022

Cybersecurity Fabrics as a concept has established itself as a common paradigm for securing organizations across the world. This panel will explore where Cybersecurity Fabrics stand today, what the future holds for the paradigm as well as what to consider when prioritizing cybersecurity services. 

Event Recording
The Changing Cyber Threat Landscape – How to win the war against cybercriminals
Jun 22, 2022

Security leaders face an uphill task as cyber-criminals become increasingly creative, highly innovative, and armed with an arsenal of seemingly unlimited resources. Rapid digitalization to re-capture post-pandemic growth coupled with an uncertain geopolitical climate, businesses face growing cyber threats that require security leaders to re-think their cybersecurity strategy. To win the win against cyber-criminals, “knowing the enemy and knowing yourself” is key to building effective defences.

Event Recording
Security Automation: Why and Why Not?
Jun 22, 2022

This presentation will explore why companies need security automation and how they can ensure success. Leveraging professional experience and doctoral research into security automation, the presenter will examine the keys to successful security automation, including how to prioritize use cases and build enterprise support. This session will look at how to decide what to automate (and what not to automate), strategies to help ensure a successful security automation program, and lessons learned from success and failure. Finally, we will discuss the worst reason to pursue security automation.