Event Recording

Security Automation: Realizing Business Benefits, Without Adding Headcount

Show description
Speaker
Severin Collins
Director, Sales Engineering, Europe
D3 Security
Severin Collins
Severin Collins is passionate about cybersecurity and loves what he does. His experience includes enterprise security management/monitoring, technical pre-sales, risk assessment and analysis, technical training and support, as well as leadership and team management. As Director, Sales...
View profile
Playlist
Cybersecurity Leadership Summit 2022
Event Recording
Strategic Approaches to Secure Industrial Control System Environments
Nov 10, 2022

 

Event Recording
How the Current Crisis could become a Catalyst for Various Transformations
Nov 10, 2022
Event Recording
Government's Role in Providing a Secure Framework for Digital Transformation
Nov 09, 2022

This keynote will explore the role of government in providing a secure framework for digital transformation.

Event Recording
Panel | Leadership Outlook: What Are the Key Attributes of the Next-Gen CISO?
Nov 09, 2022

In this exclusively curated panel session, top CISOs from across the world reflect on where they find themselves today, explore trends that will define the cyber ecosystem over the next decade and highlight the core attributes required for future CISOs to maneuver through the challenges brought about by the digital enterprise.

Event Recording
Security Automation Strategies to Succeed or Fail: You Choose
Nov 10, 2022

This presentation will explore why companies need security automation. We will look at how companies can ensure success (and how to ensure failure). Leveraging professional experience and doctoral research into security automation, the presenter will examine the keys to successful security automation, including how to prioritize use cases and build enterprise support. This session will look at how to decide what to automate (and what not to automate), strategies to help ensure a successful security automation program, and lessons learned from success and failure, including worst reason to pursue security automation.

Event Recording
Zero Trust Journey, How We Moved from an Immature Organization to Zero Trust
Nov 09, 2022

This is the story of our journey to Zero Trust, from the initial analysis to its technical and effective implementation. As many organizations our starting point was not the best one (lack of proper asset management, mixed permissions, etc) but when we started to work on a Zero Trust implementation we were able to overcome these and also solve some unforeseen problems and offer major security also through Human Factors and Risk Management. The aim of this talk is to inspire security leaders on what is a Zero Trust Architecture (which is not an off-the-shelf solution and desn't require massive initial investments) and how they can reuse their internal knowledge and tools to deliver it.

Event Recording
Continuous Zero Trust Transformation using a Value and Risk Driven Approach
Nov 10, 2022

For big companies like Mercedes, there is no generic zero trust implementation to deliver the values for customer, workforce, suppliers and logistics. It is unlikely to have a greenfield implementation as there is a rich fundament of processes, technologies and business uses cases need to be covered. This presentation describes how to build a holistic view of your ecosystem, understand your maturity, develop a reference architecture for your vision and then come up with a continuous transformation to achieve the targets using a value and risk driven approach.

 

Event Recording
Exercising Your Cyber Crisis Plans
Nov 10, 2022
Event Recording
Workshop | From Asset Management to Asset Intelligence: Crossing the CAASM
Nov 09, 2022

As the sprawl of devices, device types, and solutions continues to skyrocket, environments only grow more complex.

But there's good news: asset management has evolved.

Today’s “asset intelligence” moves from a spreadsheet approach to an API-driven, always up-to-date view into all assets via integrations of existing tools, data correlation at scale, and querying capabilities to find and respond to gaps.

Join this workshop to learn: how asset intelligence and the emerging Cyber Asset Attack Surface Management (CAASM) category improves security hygiene, reduces manual work, and remediates gaps.

Event Recording
Risk-Based Cyber Reporting Best Practices
Nov 09, 2022

Cybersecurity reporting is a critical mechanism to ensure effective commincation of significant security issues across different levels of your organization - from software architects to the Board. Yet, reporting today is far from being a formality and does not comprehensively highlight an organization's exposure to cyber threats. Join this session to understand the factors that drive the effectiveness of a risk-based cybersecurity report and get access to best practices on communicating actionable metrics within a specific context.

Event Recording
Security in the Face of Change: Past Lessons & Prospects for Our Future
Nov 09, 2022
The convergence of organizational decentralization, digitization, and global instability have raised the need to secure vital infrastructure. Can we learn from the past? Can we prioritize and plan future scenarios? 
Join Elastic as we share insights and lessons from building security products and evaluating them and gain ideas to plan your defense.
Event Recording
Know Your Enemy and Know Yourself, How to Win at Cyber Warfare and Turn You People From the Weakest Link to a Defence Mechanism
Nov 10, 2022

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” ― Sun Tzu, The Art of War

Join this session to gain a deeper understanding of threat actors and the current threat landscape, in order to help you adapt and protect your organisation from cyber warfare. We know adversaries do not rest. Attacks are growing more destructive, causing mass disruption to organisations and society. Take away knowledge of Threat Actors, current attacks, strategies to defend your organisation and understand how your workforce puts you both at risk but can also be leveraged to be your first line of defence.