Event Recording

R.O.N. - Return on Negligence – The Impact of Cybercrime

Show description
Speaker
Denny Prvu
Director of Architecture - Innovation and Technology
Royal Bank of Canada
Denny Prvu
Denny Prvu has been fortunate enough to work around the world with public and private sector organizations as a strategist, architect, and communicator on identity, security, and privacy topics for over 20 years.  Experience by working on standards and active contributions in areas...
View profile
Playlist
Cybersecurity Leadership Summit 2022
Event Recording
Workshop | Strategy, Risk, and Security: Building Business Resilience for Your Organization
Nov 09, 2022

Every business should be equipped to understand for itself what most threatens and endangers its business model. This is the starting point for preparation measures for disruptions and crises that, if not properly managed, can endanger and even kill organizations as a whole.

Assessing and understanding key assets and the threats towards them is true, applied, real-life risk management. Acting and reacting in the crisis needs to be based on a proper preparation. Service continuity and IT service continuity do not happen out of the blue but out of business-informed planning, and preparation.

Christopher Schuetze, Matthias Reinwarth and Kai Boschert will highlight the most important steps of an organization's journey to prepare for and even embrace disruptive events and circumstances as part of a holistic, sustainable business approach.

They will provide guidance and, even more importantly, challenge the audience with collaborative exercises for understanding and applying key methodologies to converge business resilience management and cybersecurity into a single, tailored, yet agile survical strategy. Five building blocks will be outlined that form the foundation of a unified strategy to achieve the common goals of resilience and recovery while limiting the impact of cyber attacks on business operations.

Event Recording
Panel | Best Practices for Implementing Enterprise Security Automation for Threat Detection and Intelligence
Nov 10, 2022

As the intensity and sophistication of cyber-attacks continues to increase amidst an uncertain threat landscape, enterprises are actively looking to embrace security automation as a potential solution. With machine learning developments maturing at a rapid pace, security automation has become increasingly practical and is the need of the hour to stem the tide of cyber attacks that are becoming bigger, faster and stealthier. Amidst the backdrop of state-sponsored attacks that can circumvent traditional defense systems, this panel will explore the need for security automation and automated threat intelligence, and will dive into best practices for implementing such initiatives in enterprise.

Event Recording
Managing the Cyber Security Technical Debt: How did we get there? And what to do about it?
Nov 10, 2022

This presentation will explore why companies need security automation. We will look at how companies can ensure success (and how to ensure failure). Leveraging professional experience and doctoral research into security automation, the presenter will examine the keys to successful security automation, including how to prioritize use cases and build enterprise support. This session will look at how to decide what to automate (and what not to automate), strategies to help ensure a successful security automation program, and lessons learned from success and failure, including worst reason to pursue security automation.

Event Recording
Quantum Computers: The Ultimate Opponent for Data Protection
Nov 09, 2022
Event Recording
Ask Just Anything
Nov 10, 2022
Event Recording
Panel | Getting Started on Your Zero Trust Journey
Nov 09, 2022

As organizations continue to grapple with security issues, a 'zero-trust' approach to cybersecurity has been touted as a potential solution to enhance enterprise security. However, taking on Zero Trust architectures can be an overwhelming experience for even the most seasoned cybersecurity professionals. This panel session features security leaders who go beyond network principles reliant on the “never trust, always verify” philosophy to focus on effective deployment of a Zero Trust strategy at your organization.

Event Recording
Learn How SD Worx Turned Its Cybersecurity Strategy Into a Business Enabler
Nov 09, 2022
Event Recording
The Changing Face of Resilience
Nov 10, 2022

Resilience has been changing over the last 15-20 years, where we now accept and acknowledge the various types of reslience an organisation should be responding to. This session will explore how security has moved from a focus on just protection to faster detection and response. It will aso explore what the fast moving technologies mean for other types of resilience that organisations will be faced with in the coming future, and what they can do about it.

Event Recording
Why Threat Intelligence is Losing its Edge and How to Overcome Noise Overload
Nov 09, 2022
Event Recording
Panel | Cyber Hygiene Best Practices: Why Does It Matter?
Nov 10, 2022

Security of users, data, devices and networks is orchestrated via a set of precautionary cyber measures called cyber hygiene. Enterprises today deal wih a sheer volume users, data and devices, often distributed across complex cloud/hybrid environments – making cyber hygiene monitoring a challenging task. In this session, leading cyber experts shed light on the importance of implementing effective cyber hygiene amidst an uncertain threat landscape and share best practices on how to do so.

Event Recording
Continuous Zero Trust Transformation using a Value and Risk Driven Approach
Nov 10, 2022

For big companies like Mercedes, there is no generic zero trust implementation to deliver the values for customer, workforce, suppliers and logistics. It is unlikely to have a greenfield implementation as there is a rich fundament of processes, technologies and business uses cases need to be covered. This presentation describes how to build a holistic view of your ecosystem, understand your maturity, develop a reference architecture for your vision and then come up with a continuous transformation to achieve the targets using a value and risk driven approach.

 

Event Recording
Only Those Who Know the Dangers Can Protect Themselves
Nov 10, 2022

How do cyber criminals go about a hacking attack and how easy is it to capture sensitive data? As the saying goes, "Keep your friends close, but your enemies closer," we take a look at how hackers and social engineers work with social pentester Graham Stanforth.