Governance & Risk Based Cybersecurity Strategy
Facebook Twitter LinkedIn

Governance & Risk Based Cybersecurity Strategy

Expert Talk
Wednesday, May 10, 2017 14:30—15:30
Location: WINTER GARDEN

Where Cybersecurity Strategy (Risk Management) and Practical Deployment meet

A Risk based Strategy is in great demand for all organizations, but how do you formulate a risk approach that can realize a practical deployment? Are there practical examples of how to do this and can I use them to be effective in stopping the wide array of threats facing my organization? Where do you start and what tools and customized frameworks can help you to move beyond compliance to risk-based strategy that your management understands and supports? Learn how in the discussion of what others are doing and take it past just a strategy and risk approach to a practical reality.

Key Takeaways:

Where Cybersecurity Strategy (Risk Management) and Practical Deployment meet
Presentation deck
Where Cybersecurity Strategy (Risk Management) and Practical Deployment meet
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Peter Allor
Peter Allor
IBM Security
Peter Allor is the Senior Cyber Security Strategist for IBM Security. He has been instrumental in IBM's strategy and development for securing Critical Infrastructures, Central Government Operations...

Achieving Enhanced Security While Driving Business Growth with the Power of Identity

The world today is more advanced and interconnected than it ever has been before. The channels for information and systems access are now many and varied. In today’s IT environment, it is far easier to gain information and access through these new channels and much harder to protect it. Every business today walks the fine line between business-enabled access and appropriate security and privacy. Information security investment involves a complex set of competing priorities. Most enterprises have made significant investments in endpoint protection, anti-virus, encryption, network security monitoring and much more. Sensitive information must be protected since the consequences of not doing so are catastrophic. But what is the cost of all this security? Are we striking the right balance between convenience and controls? Have we become so paralysed by the technology that we are losing our ability to be innovative and enhance core business drivers? Are we foregoing competitive advantage and business expansion in order to stay safe?

Darran Rolls
Darran Rolls
SailPoint
Mr. Darran Rolls is the Chief Technology Officer and Chief Information Security Officer and at SailPoint, where he is responsible for directing the company’s technology strategy and security...

RBAC to ABAC – a Pragmatic Scenario

André Koot - From RBAC to ABAC in a Pragmatic Way
Event Recording
André Koot - From RBAC to ABAC in a Pragmatic Way
Click here to watch the recording of this session. You'll need to log in to watch it.
RBAC to ABAC – a Pragmatic Scenario
Presentation deck
RBAC to ABAC – a Pragmatic Scenario
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
André Koot
André Koot
Nixu Cybersecurity
André Koot has more than 25 years of experience in the field of information security, and as an economist he practices this from a business point of view. The last 15 years he specializes in...
Subscribe for updates
Please provide your email address