Security Automation Track
Facebook Twitter LinkedIn

Security Automation Track

Combined Session
Wednesday, September 15, 2021 11:00—12:00
Location: AMMERSEE II

Security Automation in the Financial Sector: Research Findings, Best Practices, and Lessons Learned

This presentation combines the findings of a doctoral study into security automation in the financial sector with real-world experiences in implementing security automation. The research focused on strategies financial institutions need to reduce the gap between the attacker's time to compromise and the defender's time to detect and respond. Learn from the experiences of companies that have implemented or are implementing security automation. This session will look at what to expect from security automation (and what not to expect), how to decide what to automate, strategies to help ensure a successful security automation program, and lessons learned from success and failure.

Dr. Donnie Wendt
Dr. Donnie Wendt
Mastercard
Dr. Donnie Wendt is a Principal Security Researcher for Mastercard. In this role, Donnie researches the latest security threats, technologies, products, services, and innovations to drive the...

Why must CISOs and security leaders let IAM drive their cloud security adoption?

As organizations expand their cloud footprint to accelerate innovation and digital transformation, increased security risks pose an imminent and elevated threat to their growing cloud presence. The market is overwhelmed with numerous security technologies, approaches and frameworks for securing an organization’s cloud adoption journey, but security leaders and architects must meticulously assess the security risks associated with their cloud usage, migration patterns and digital interactions with customers, employees and partners to suite their business requirements and cloud security priorities.

Identity and Access Management (IAM) remains one of the key security disciplines to support digital transformation and cloud adoption objectives, by not only providing a secure identity and access foundation for the user, device and cloud-service types but also by offering additional cloud-specific security provisions that include cloud access management, cloud entitlement management, cloud privileged access and cloud access governance to its evolving technology portfolio.

In this session, we will discuss the important security tenets of an organization's cloud adoption program and how effective IAM architecture and planning can help navigate CISOs and security leaders through their cloud adoption journey.

Anmol Singh
Anmol Singh
Microsoft
Anmol Singh is a Principal Product Manager at Microsoft and brings more than 20 years of cybersecurity experience focused on IAM and related security technologies. Through his career, Singh has...

Tickets

On-Demand Access
Re-live EIC 2021
€100
 
Watch more than 250 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address