Event Recording

Secure Data Sharing in a Zero-Trust World

Show description
Speaker
Alasdair Anderson
VP
Protegrity
Alasdair Anderson
Alasdair Anderson has spent over 20 years working with data technology. Alasdair has spent much of his career in Financial Services with the likes of HSBC, Nordea, ABN AMRO, JP Morgan, RBS & BNP Paribas. Alasdair is now the Financial Services Solutions SME for EMEA...
View profile
Playlist
cyberevolution
Event Recording
XM Cyber: From Vulnerability Management to Continuous Exposure Management
Nov 15, 2023
Event Recording
Panel | Improving the Security Posture with Cloud Solutions
Nov 16, 2023
Event Recording
Panel | Arresting Disaster: Driving Incident Response in Cyber-Regulated Europe in an Age of AI Threats
Nov 16, 2023

In today’s volatile cyber landscape, threats are increasingly sophisticated (e.g. AI-powered ransomware and data exfiltration techniques), and the regulatory environment is ever-changing. Now more than ever, the responsibility falls on executives to spearhead effective incident response plans. This fireside chat with industry leaders Navroop Mitter, Matthew Welling, and Evan Wolff, unpacks the complexities executives face around incident response in this new cyber-normal. The panel will delve into the intricate interplay between AI-driven threats, end-to-end encrypted communications, and new regulatory landscapes both in the U.S and Europe, particularly in the light of recent legislative developments like the U.K.'s Online Safety Bill.

We will also introduce our groundbreaking joint publication featuring specialized tabletop exercises designed for the C-suite.

Event Recording
Securing the SaaS Revolution: Protecting Your Data in the Cloud
Nov 15, 2023

The best CISO’s are never surprised! But now that SaaS apps like Salesforce, ServiceNow, or M365 have become mission-critical for organisations and process sensitive data, it's getting harder to keep track of the security metrics. CISO’s tell us they are flying blind and hope for the best. You shouldn't have to simply trust your app teams or run periodic third-party assessments to stay on top of how your SaaS is configured. What if you could define the security guardrails, which identities have access to which data, continuously monitor for drift, and be automatically alerted when a metric needs your attention? Nothing falls through the cracks. No more hope for the best, spreadsheets, and surprises.

Event Recording
Panel | AI in Cybersecurity
Nov 16, 2023
Event Recording
HP Endpoint Security - Time for a Different Endpoint Security
Nov 16, 2023

IT Security – In a General Perspective:

  • Security Investment vs. Success
  • New Goals, Rediscovering Old Objectives

Closing the Gap with HP Wolf Security

Event Recording
Artificial Intelligence: A New Tool in the Hacker's Arsenal
Nov 15, 2023
Event Recording
Federation Bubbles - Dynamic Trust Moves Beyond The Commons
Nov 15, 2023

Traditional federation agreements are relatively static. It takes some effort to onboard an IdP and RP to each other, but once that trust is established, it's good until some exceptional event breaks the federation.

But what about a more dynamic world, one where trust comes and goes based on context? What if users could be provisioned dynamically into a space based on trust from elsewhere? What if an isolated space could still function in a disconnected state and still have powerful security properties? What if these isolated spaces could reconnect to the network and provide audit capabilities and security signaling to other components throughout the wide ecosystem? And what if all of this could be built on a layer of trusted software that didn't rely on pre-placing keys or accounts ahead of time?

Come to this talk to learn about Federation Bubbles, the proof of concept being built out on top of a suite of technology including OpenID Connect, OAuth, SPIFFE, Verifiable Credentials, and more.

Event Recording
Re-inventing risk management for artificial intellect
Nov 15, 2023

This presentation delves into the imperative task of redefining risk management in the era of Artificial Intelligence (AI). As AI reshapes industries, it also introduces unique risks and challenges. This abstract offers a glimpse into how traditional risk management approaches must evolve to effectively address the intricacies of AI-related uncertainties. Through real-world examples, it explores emerging concerns like algorithmic bias, privacy infringements, and unforeseen consequences. Attendees will gain insights into proactive strategies, including leveraging AI itself for risk assessment and mitigation. By the presentation's conclusion, participants will grasp the essential steps needed to navigate the uncharted territory of AI-driven risks, ensuring responsible and secure integration of this transformative technology.

Event Recording
Conquering Crisis: Effective Strategies for Incident Management
Nov 16, 2023

Immerse yourself in an in-depth exploration of the strategies of incident management. Through critical examination of real-world cases and emerging trends, they illuminate the integral stages of effective incident response. The dialogue underscores the importance of strategic foresight, seamless communication, and constant progress, providing indispensable insights to strengthen cyber defenses and build resilience. This discussion ensures a compelling exchange of knowledge and tactics, serving as an indispensable tool for organizations in the ever-evolving landscape of cybersecurity threats.

Event Recording
Asset Management for Cybersecurity: A Modern Solution for An Age-Old Challenge
Nov 16, 2023

Asset management used to be easy, but not anymore. Where and how we work, the types and amount of devices we use, and the ways and places we store information have all changed.

What’s stayed the same, though, is the fact that knowing what’s in our environment is absolutely essential to securing it.

So, it’s time we say goodbye to manual asset inventory approaches, and hello to a modern approach to asset management — one that leverages existing data and automation to solve the challenges specific to cybersecurity.
 
Join this session to learn:

  • Why old asset management approaches fall short
  • How other cybersecurity initiatives are impacted by insufficient asset management
  • A new approach that leverages existing data to solve the asset management challenge for cybersecurity
Event Recording
Understanding the complexity and ambiguity of AI Ethics
Nov 16, 2023