SecTor 2016 is quickly approaching! From October 17 to 19, Toronto will host a number of top information security experts and professionals from around the world at Canada’s largest security expo. Are you planning to attend? If so, pencil these 5 talks into your schedule—you won’t want to miss them!
5. Overwhelmed by Security Vulnerabilities? Learn How to Prioritize Remediation
When it comes to vulnerability remediation, many organizations face an excess of threats and a shortage of team members. That means remediation must be properly prioritized, so that the vulnerabilities representing the greatest risks can be fixed immediately. In this presentation, Amol Sarwate will share with SecTor 2016 attendees some best practices for improving remediation and reducing risk in the age of vulnerability overload.
4. Securing a Cloud-Based Data Center
As interest in cloud computing continues to gain traction in Canada, Peter Cresswell’s SecTor2016 talk about how Trend Micro is delivering security controls in these potentially high-risk environments, using standard management tools, is well timed. Join the panel for a succinct overview of this unique approach to securing your cloud data center.
3. Eliminating the Automation and Integration Risks of the “Security Frankenstein”
The workflow of today’s Security Operations Center (SOC) might be envisioned as a “Security Frankenstein”—where each “limb” represents a disparate solution in the steps of security. The result is an ineffective, costly, and cumbersome approach to security activities, as you are probably all too aware. In this SecTor 2016 session, Chris Pogue will explore how an adaptive security approach to the SOC workflow delivers an integrated, context-aware, endpoint security solution for threat prevention, detection, response, and remediation that continuously monitors all layers of the IT stack.
2. Can Massive Data Harvesting Drive Down the Time to Breach Detection?
It seems as though almost every day, there’s a report of yet another organization’s security being breached. Organizations know they need to remain on their toes about breaches and react to them as soon as they’re discovered. But with the time to breach detection remaining between 100 and 200 days, hundreds of millions of dollars will be lost to ransomware this year. In light of this, suffice it to say that there’s a fundamental flaw in the traditional defense model. Any individual layer, when it receives updated security intelligence, does not look backward at previously analyzed traffic, files, or events. It merely looks forward, inspecting new events in far more detail.
In this interactive SecTor 2016 discussion, Sean Earhard will review time-to-detection data from the last two years and examine the role massive data harvesting plays in fixing the traditional model of security—and how it could help organizations reduce the time it takes to detect security breaches.
Along with keeping organizations on their toes about security, every breach report seems to bring with it a new standard or framework to help handle this cybersecurity crisis and prevent future attacks. What few regulators realize is that most IT and security professionals are already overwhelmed with the responsibilities of performing day-to-day tasks; adding additional compliance activities to the security team’s workload is not an effective, long-term solution.
In this talk, Uzado’s own Dave Millier will present an approach that allows security professionals to quickly review proposed or existing standards and frameworks. The discussion will also present a methodology for systematizing a consistent, reliable, and repeatable approach to managing compliance, which will provide your organization with the ability to automate activities where feasible. The goal is to free up time for you and the members of your organization responsible for compliance activities. This is your chance to get an inside look at how the Uzado platform works!