Deep Dive Topics
- Zero Trust
- OT
- Cybercrime
- Ransomware
- Fraud
SESSION FORMAT – Moderated by a security thought leader and foremost solution provider in a closed-door boardroom setting.
ISMG Engage Princeton, New Jersey will address the top threats, risks and security needs facing the healthcare sector, including the most critical cybersecurity challenges and lessons emerging from the global pandemic. Join our attendees and subject matter experts to learn more about strategies and tactics to defend against and respond to ransomware and other disruptive cyberattacks; bolster medical device security; prevent and detect privacy breaches; tackle identity and access issues; address telehealth challenges, and manage other leading cybersecurity concerns.
NOTE: This in an invitation-only event and space is limited. All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
SESSION FORMAT – Moderated by a security thought leader and foremost solution provider in a closed-door boardroom setting.
They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:
4:00 pm – 4:45 PM ET
They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:
4:00 pm – 4:45 PM ET
They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:
4:00 pm – 4:45 PM ET
They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:
4:00 pm – 4:45 PM ET
In a digital first age, make personal and profound connections with fellow leading security experts, business leaders and practitioners to exchange real-world insights.
4:45 pm et – 5:00 pm et & 6:00 pm et – 6:30 pm et
Meet with security industry leaders in a boardroom setting to converse with peers and gain insight into leading security trends and technology. Participate in two of the following topic-based closed door Deep Dive Discussions.
However they often struggle to understand threats and translate them into actionable countermeasures.
High quality defensive knowledge is scarce, and adversaries continue to take advantage of weak points including misconfigured defenses, poor security architectures, and excessive privileges, further reducing the value of investment in security solutions.
Discussion topics will explore:
The SASE (secure access service edge) model enables this transformation by leveraging the power of the public cloud to simultaneously improve security and user experience. A well architected SASE approach can help organizations accelerate their digital journey by consistently applying zero trust policies for all users, applications and devices, no matter where they may be located.
Gartner forecasts that SASE will be a $15 billion market in Asia-Pacific and Japan by 2025. However, with all the market noise around SASE, it is hard to differentiate between hype and practical outcomes and strategies. But questions remain: What is the business value of a SASE strategy? How to communicate the SASE strategy to the business and board of directors?
Discussion topics will explore:
In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.
A potential lack of visibility into apps, users and network traffic, coupled with alert fatigue, means practitioners may need a clearer view of their environment – before low-and-slow network reconnaissance leads to a potential crypto-locking nightmare. As enterprises mature in the cloud and their technology stacks grow – it becomes increasingly important to quickly detect and respond to vulnerabilities, malware and compromised assets. Network defenders, then, must use “contextual risk” factors to determine their next action items.
Discussion topics will explore:
What are the top trends in both application-layer and network-layer DDoS attacks? What are the ransom attack trends? What are the five critical considerations for mitigating modern DDoS attacks?
Discussion Points will explore:
Specifically, executives believe that security (75%) and compliance (76%) requirements hinder innovation. Catching problems early and fixing them before they slow the process or get into production is still the ultimate goal of shift left. However, a new approach and mindset are required to deliver on the promise.
Discussion topics will explore:
7:30 pm et – 8:00 pm et
#ISMGEngage
@ISMG_News
ISMG Engage brings the foremost thought leaders and educators in the security space to the stage and knowledge sharing discussions. Hear what is on the minds of leading security experts as they share insights and challenges of the ever-evolving threat landscape.
Join like-minded cybersecurity professionals ready to learn from an industry keynote and share their thoughts and opinions during the Deep Dive sessions. Hear from your peers and interact with others that face the same day-to-day challenges as you.
Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
Upcoming ISMG Events