In the age of the ubiquitous data breach, it is important for enterprises to know what information is circulating about them - and their customers - within cybercriminal circles. That comes down to knowing what is on the dark web - but how can you do that?
In this session, a banking security leader and an FBI agent detail:
Internal threats in today's era are complex and crucial in the cybersecurity domain. Understanding dynamic and multivariate user behavior is challenging too. Traditional sequential and timeline-based methods cannot easily address the complexity of temporal and relational features of user behaviors. Hence, we need an AI-based report that enables analysts to understand user behavior patterns that result in identification of anomalies. We can strengthen our security further by including access management as the core of zero trust architecture to create a zero trust extended ecosystem.
It's been 12 years since created the concept and term ""zero trust,"" and it's now been one year since President Biden issued a cybersecurity Executive Order with zero trust as its foundation. How has the framework matured - and why do so many people still continue to misunderstand and misapply it?
Join this exclusive town hall meeting for your chance to talk about:
• What zero trust is - and is not
• How to develop your own roadmap
• Impact of the executive order beyond federal government
Solutions Showcase: Gain insight into leading security trends and technology from cutting-edge solution providers. Walk away with practical solutions to apply in your place of work
The “modern” CISO must take advantage of every opportunity to strengthen their organizations’ defenses. While many expect the economy and business activity to slow down in 2023, bad actors do not adhere to these cycles. With a potentially slower pace of business activity, CISOs have the opportunity to improve upon their existing programs and sharpen their communications to effectively translate security-speak to management decision makers. Our expert group of CISOs will share their perspectives on what lies ahead in 2023 and how to communicate budget needs and the evolving threat environment to management. They will:
As the Washington state chief information security officer within the Office of Cybersecurity, Vinod Brahmapuram is at the heart of the state government's digital transformation and efforts to modernize SecOps. In this exclusive conversation, he discusses:
A lack of commitment and investment from executive leadership is a major factor in the failure of piecemeal IT security solutions. By neglecting to prioritize comprehensive cybersecurity strategies, businesses expose themselves to increased risk and hinder their ability to successfully implement other technology projects. It is essential that executive leadership takes an active role in championing proper cybersecurity investments and ensuring they are a top priority in order to secure the business and maximize the potential of technology projects.
In this session we will explore:
Hybrid work models, cloud migration and new digital channels are highlights of the past two years of aggressive digital transformation. But what does the future bring in terms of how we work, conduct commerce and secure our digital assets from ever-evolving, ever-automating cyber adversaries?
Join RBC CISOs for a thoughtful discussion on securing the future, with focus on:
In the age of the ubiquitous data breach, it is important for enterprises to know what information is circulating about them - and their customers - within cybercriminal circles. That comes down to knowing what is on the dark web - but how can you do that?
In this session, a banking security leader and an FBI agent detail:
Internal threats in today's era are complex and crucial in the cybersecurity domain. Understanding dynamic and multivariate user behavior is challenging too. Traditional sequential and timeline-based methods cannot easily address the complexity of temporal and relational features of user behaviors. Hence, we need an AI-based report that enables analysts to understand user behavior patterns that result in identification of anomalies. We can strengthen our security further by including access management as the core of zero trust architecture to create a zero trust extended ecosystem.
It's been 12 years since created the concept and term ""zero trust,"" and it's now been one year since President Biden issued a cybersecurity Executive Order with zero trust as its foundation. How has the framework matured - and why do so many people still continue to misunderstand and misapply it?
Join this exclusive town hall meeting for your chance to talk about:
• What zero trust is - and is not
• How to develop your own roadmap
• Impact of the executive order beyond federal government
Solutions Showcase: Gain insight into leading security trends and technology from cutting-edge solution providers. Walk away with practical solutions to apply in your place of work
The “modern” CISO must take advantage of every opportunity to strengthen their organizations’ defenses. While many expect the economy and business activity to slow down in 2023, bad actors do not adhere to these cycles. With a potentially slower pace of business activity, CISOs have the opportunity to improve upon their existing programs and sharpen their communications to effectively translate security-speak to management decision makers. Our expert group of CISOs will share their perspectives on what lies ahead in 2023 and how to communicate budget needs and the evolving threat environment to management. They will:
As the Washington state chief information security officer within the Office of Cybersecurity, Vinod Brahmapuram is at the heart of the state government's digital transformation and efforts to modernize SecOps. In this exclusive conversation, he discusses:
A lack of commitment and investment from executive leadership is a major factor in the failure of piecemeal IT security solutions. By neglecting to prioritize comprehensive cybersecurity strategies, businesses expose themselves to increased risk and hinder their ability to successfully implement other technology projects. It is essential that executive leadership takes an active role in championing proper cybersecurity investments and ensuring they are a top priority in order to secure the business and maximize the potential of technology projects.
In this session we will explore:
Hybrid work models, cloud migration and new digital channels are highlights of the past two years of aggressive digital transformation. But what does the future bring in terms of how we work, conduct commerce and secure our digital assets from ever-evolving, ever-automating cyber adversaries?
Join RBC CISOs for a thoughtful discussion on securing the future, with focus on:
March 21, 2023
North America East Summit