December 4, 2023

Princeton/New Jersey

4:00 PM ET - 8:00 PM ET

Event Overview

ISMG Engage Princeton, New Jersey will address the top threats, risks and security needs facing the healthcare sector, including the most critical cybersecurity challenges and lessons emerging from the global pandemic. Join our attendees and subject matter experts to learn more about strategies and tactics to defend against and respond to ransomware and other disruptive cyberattacks; bolster medical device security; prevent and detect privacy breaches; tackle identity and access issues; address telehealth challenges, and manage other leading cybersecurity concerns.

Sample Agenda

sample agenda

Venue

Princeton/New Jersey

NOTE: This in an invitation-only event and space is limited. All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.

Deep Dive Topics

  • Zero Trust
  • OT
  • Cybercrime
  • Ransomware
  • Fraud

SESSION FORMAT – Moderated by a security thought leader and foremost solution provider in a closed-door boardroom setting.

Agenda

You can now view or download a PDF version of the attendee guide.

Welcome & Keynote Address

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Securing the Future: A Keynote Panel on Tackling API Security, Third-Party Risk and the Impact of ChatGPT

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

4:00 pm – 4:45 PM ET

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Securing the Future: A Keynote Panel on Tackling API Security, Third-Party Risk and the Impact of ChatGPT

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

4:00 pm – 4:45 PM ET

Deniz Hanley

Canada CISO and Head of Technology Risk Canada, Morgan Stanley

Greg Thompson

VP, CISO, ManuLife

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Securing the Future: A Keynote Panel on Tackling API Security, Third-Party Risk and the Impact of ChatGPT

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

4:00 pm – 4:45 PM ET

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Securing the Future: A Keynote Panel on Tackling API Security, Third-Party Risk and the Impact of ChatGPT

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

4:00 pm – 4:45 PM ET

Networking & Refreshment Breaks

In a digital first age, make personal and profound connections with fellow leading security experts, business leaders and practitioners to exchange real-world insights.

4:45 pm et – 5:00 pm et    &  6:00 pm et – 6:30 pm et

Deep Dives

Meet with security industry leaders in a boardroom setting to converse with peers and gain insight into leading security trends and technology. Participate in two of the following topic-based closed door Deep Dive Discussions.

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Deep Dive: Advancing Threat Intel to Learn the Adversary's Next Move

However they often struggle to understand threats and translate them into actionable countermeasures.

High quality defensive knowledge is scarce, and adversaries continue to take advantage of weak points including misconfigured defenses, poor security architectures, and excessive privileges, further reducing the value of investment in security solutions.

Discussion topics will explore:

  • Discuss how to advance your threat intelligence program, and what strategies are best to proactively achieve this
  • Assess what defensive strategies are most advantageous to predict the adversary’s next move
  • Provide insights on how to improve resiliency and mitigate impact of attacks
Session 1 – 5:00 PM et – 6:00 PM et   Session 2 – 6:30 PM et – 7:30 PM et

Speaker Full Name

Job Title, Company Name

Deep Dive: Answering the Big Questions About SASE and Zero Trust

The SASE (secure access service edge) model enables this transformation by leveraging the power of the public cloud to simultaneously improve security and user experience. A well architected SASE approach can help organizations accelerate their digital journey by consistently applying zero trust policies for all users, applications and devices, no matter where they may be located.

Gartner forecasts that SASE will be a $15 billion market in Asia-Pacific and Japan by 2025. However, with all the market noise around SASE, it is hard to differentiate between hype and practical outcomes and strategies. But questions remain: What is the business value of a SASE strategy? How to communicate the SASE strategy to the business and board of directors?

Discussion topics will explore:

  • Determine how to leverage SASE for your ZTNA, and which strategies are most advantageous accordingly
  • Debate whether or not all SASE approaches are created equal, if not, determine the key differences between the approaches
  • Analyze how SASE and zero trust can both complement existing security investments and strategies
  • Evaluate key indicators for selecting SASE vendors
  • Discuss the critical steps to complete SASE migration with your partner
Session 1 – 5:00 PM et – 6:00 PM et   Session 2 – 6:30 PM et – 7:30 PM et

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Deep Dive: Better Understanding Cloud Security Risks

In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps, users and network traffic, coupled with alert fatigue, means practitioners may need a clearer view of their environment – before low-and-slow network reconnaissance leads to a potential crypto-locking nightmare. As enterprises mature in the cloud and their technology stacks grow – it becomes increasingly important to quickly detect and respond to vulnerabilities, malware and compromised assets. Network defenders, then, must use “contextual risk” factors to determine their next action items.
 

Discussion topics will explore:

  • Whether or not your organization should be cloud-first, and if this migration is necessary
  • Asses the risk and vulnerabilities’ detection in your cloud environment to mitigate potentially devastating consequences
  • How intertwined cloud security practices are with instances of ransomware, shadow IT or other concerns
  • Analyze the state of cloud security in the near- and long-terms, and what strategies your enterprise is utilizing to evolve accordingly
Session 1 – 5:00 PM et – 6:00 PM et   Session 2 – 6:30 PM et – 7:30 PM et

Speaker Full Name

Job Title, Company Name

Deep Dive: Critical Considerations for DDoS Mitigation

What are the top trends in both application-layer and network-layer DDoS attacks? What are the ransom attack trends? What are the five critical considerations for mitigating modern DDoS attacks?

Discussion Points will explore:

  • Assess today’s top application-layer and network-layer DDoS trends
  • Discuss how DDoS attacks are being leveraged in ransom campaigns
  • Analyze the key considerations between always-on and on-demand DDoS protection
Session 1 – 5:00 PM et – 6:00 PM et   Session 2 – 6:30 PM et – 7:30 PM et

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Deep Dive: Financial Services: “Shift Left Done Right!

Specifically, executives believe that security (75%) and compliance (76%) requirements hinder innovation. Catching problems early and fixing them before they slow the process or get into production is still the ultimate goal of shift left. However, a new approach and mindset are required to deliver on the promise.
 

Discussion topics will explore:

  • Best practices to transform and deliver software at the speed the business demands
  • Evaluate techniques that ensure assets are compliant at every stage
  • Look at how security and compliance teams can change from the “department of slow” to the “department of go”
Session 1 – 5:00 PM et – 6:00 PM et   Session 2 – 6:30 PM et – 7:30 PM et

Closing Comments

7:30 pm et – 8:00 pm et

Don’t miss your chance to attend this dynamic impactful event

#ISMGEngage

@ISMG_News

Our Sponsors

Our Partners

CyberTech logo
Women in Cybersecurity logo
Water ISAC logo
Information Systems Security Association International logo
Swiss Cyber Institute logo

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Engage brings the foremost thought leaders and educators in the security space to the stage and knowledge sharing discussions. Hear what is on the minds of leading security experts as they share insights and challenges of the ever-evolving threat landscape.

Who Attends

Join like-minded cybersecurity professionals ready to learn from an industry keynote and share their thoughts and opinions during the Deep Dive sessions. Hear from your peers and interact with others that face the same day-to-day challenges as you.

The Engage Experience

CPE Credits

Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Please register on the form below

Upcoming ISMG Events

Decemebr 5-6, 2024

Virtual IoT/OT Summit

December 10, 2024

State of Identity: Protecting Identities in the Modern Climate

December 10, 2024

Transformez vos Opérations avec l'IA Générative Avancée d'Elastic et Google Cloud Paris

december 12, 2024

Revolutionizing AppSec with Multi-AI Agent Approach

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

Upcoming ISMG Events

Decemebr 5-6, 2024

Virtual IoT/OT Summit

December 10, 2024

State of Identity: Protecting Identities in the Modern Climate

December 10, 2024

Transformez vos Opérations avec l'IA Générative Avancée d'Elastic et Google Cloud Paris