Event Recording

Security Automation: Why and Why Not?

Show description
Speaker
Dr. Donnie Wendt
Principal Security Researcher
Mastercard
Dr. Donnie Wendt
Dr. Donnie Wendt is a Principal Security Researcher for Mastercard. In this role, Donnie researches the latest security threats, technologies, products, services, and innovations to drive the company’s long-range security roadmap. He has worked at Mastercard for 18 years,  including...
View profile
Playlist
Managing Complexity: How to Define an Enterprise Cybersecurity Fabric That Delivers
Event Recording
The Changing Cyber Threat Landscape – How to win the war against cybercriminals
Jun 22, 2022

Security leaders face an uphill task as cyber-criminals become increasingly creative, highly innovative, and armed with an arsenal of seemingly unlimited resources. Rapid digitalization to re-capture post-pandemic growth coupled with an uncertain geopolitical climate, businesses face growing cyber threats that require security leaders to re-think their cybersecurity strategy. To win the win against cyber-criminals, “knowing the enemy and knowing yourself” is key to building effective defences.

Event Recording
How to use the ISO 27002:2022 to model and quantify cyber security risks
Jun 22, 2022
During the session with a demo, participants will receive
- practical recommendations to adjust security controls to address changes in the new ISO 27002,
- a model to link vulnerabilities to ISO controls, threats to vulnerabilities and confidentiality, integrity and availability objectives to business impacts, and
- a simple spreadsheet to quantify cyber security risks using Monte Carlo Simulations
Event Recording
The Concepts and Technologies that Comprise Contemporary Cybersecurity Fabrics
Jun 22, 2022
In this keynote, we will begin by describing the current threat landscape, and then by defining and scoping out the overall set of complementary and overlapping security technologies that are available in the market today. 
SASE: Secure Access Service Edge = connectivity + security
Zero Trust: access control at the network, application, identity, and data layers
EPDR, NDR, and XDR: detection & response products and integrated solutions
SOAR: Security Orchestration Automation & Response - a way to centralize existing security components, leverage best-of-breed tools, and improve incident response.
This session will set the stage for more detailed discussions of these technologies that will follow.
Event Recording
Panel | The Future of Cybersecurity Fabrics
Jun 22, 2022

Cybersecurity Fabrics as a concept has established itself as a common paradigm for securing organizations across the world. This panel will explore where Cybersecurity Fabrics stand today, what the future holds for the paradigm as well as what to consider when prioritizing cybersecurity services.