As analysts say, after feeling so defenseless in the face of calamity, enterprises are moving to an adaptive era. With the distributed workforce will come the inevitable discomfort of potentially exposing organizations to cyberattacks if the right precautions are not taken to adapt to this new phenomenon. Are enterprises geared up to respond the growing nation-state attacks and other cyber espionage? Should CISOs start making tough decisions and what should they prioritize and how ruthless they need to be in responding to threats?
Automation also helps in promptly resolving newly identified risks with vendors and enables addressing risks on repeatable processes, allowing humans to focus on the most significant threats.
This session will discuss:
We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. Still, the supply chain attack was an attack on a service provider that cannot be ruled out as it is a significant intrusion of the entire ecosystem. The supply chain attacks ushers in the risk: supplier vulnerabilities which the common cause of compromise. Keeping a watchful eye on suppliers' security status – always knowing the risks they bring in – is an essential part of building resilience and response.
The session will discuss:
The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust architecture. This session provides a practical approach to adopting zero trust, outlining the strategy, the possibilities for leveraging existing investments and the need for new investments.
This session will also discuss:
As analysts say, after feeling so defenseless in the face of calamity, enterprises are moving to an adaptive era. With the distributed workforce will come the inevitable discomfort of potentially exposing organizations to cyberattacks if the right precautions are not taken to adapt to this new phenomenon. Are enterprises geared up to respond the growing nation-state attacks and other cyber espionage? Should CISOs start making tough decisions and what should they prioritize and how ruthless they need to be in responding to threats?
Automation also helps in promptly resolving newly identified risks with vendors and enables addressing risks on repeatable processes, allowing humans to focus on the most significant threats.
This session will discuss:
We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. Still, the supply chain attack was an attack on a service provider that cannot be ruled out as it is a significant intrusion of the entire ecosystem. The supply chain attacks ushers in the risk: supplier vulnerabilities which the common cause of compromise. Keeping a watchful eye on suppliers' security status – always knowing the risks they bring in – is an essential part of building resilience and response.
The session will discuss:
The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust architecture. This session provides a practical approach to adopting zero trust, outlining the strategy, the possibilities for leveraging existing investments and the need for new investments.
This session will also discuss:
July 6 - 7, 2022
Cybersecurity Summit: Bangalore