Whether it’s customer lists, intellectual property, or a secret recipe, your mission-critical data is what makes your organization unique – the lifeblood of your enterprise. Yet, with one shrewd exploit, an online attacker – or even one of your own employees – could break the security of that critical information. What steps should you be taking to protect it?
Attend and you’ll learn
Strategies For Protecting Mission-Critical Data
This free, all-day online conference produced by the editors of Dark Reading, offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Among the topics that will be covered at Strategies for Protecting Mission-Critical Data:
- Processes and best practices for identifying sensitive data across the enterprise
- Tips and tools for ensuring that even “trusted users” cannot access or exfiltrate important data without authorization
- The latest technologies and strategies for protecting on-premises infrastructure, including networks, servers, and storage systems
Get insight on how to store critical information securely, ensure its security when it is passed across networks, and special steps you can take to provide extra protection for your most essential data and information.
Listen to top security experts discuss data encryption strategies, on-prem infrastructure defenses, and how to protect mission-critical data across a host of environments.
Hear expert viewpoints and recommendations on how to protect your mission-critical data, and advice on how to identify and protect sensitive data that might be handled outside the IT department’s knowledge or control.
Join us for a full-day virtual event on tools, technologies, and processes for ensuring the cybersecurity of your enterprise’s most sensitive information.
Agenda at at glance
When you’re responsible for protecting your organization’s most valuable information, you are on the hot seat every day. In this eye-opening keynote, Mike Witt, NASA’s chief information security officer, offers unique insight on key issues, priorities, and strategies for protecting sensitive, mission-critical data. You’ll also hear strategies for adding an extra layer of security to your most important data, as well as a few “war stories” to help you identify potential pitfalls before they happen to you.
Whether you have a full-blown security operations center (SOC) or just a single security person, there are some functions that every organization must execute in order to keep their most sensitive data safe. In this instructive keynote address, a top SOC expert will discuss some of the key capabilities required for security operations, as well as essential tools, people, and practices for building out the security operations function in your organization.
The most feared online attack is the one that comes from a trusted user who has access to your enterprise’s most critical information. In this panel discussion, top experts outline some of the most common ways that data might be exfiltrated from your organization, either maliciously or accidentally. You’ll also get recommendations on how to monitor your enterprise for data leaks, and how to build systems and policies that help to minimize the insider threat risk.
Enterprises have gone beyond the experimentation phase of implementing cloud technology and are now trusting cloud services providers to handle increasingly sensitive business information. What are the most important steps in protecting critical data in the cloud? What additional capabilities do cloud services providers offer for securing very sensitive data? A panel of cloud security experts discusses the areas where cloud services might be vulnerable, and offers advice on how to work with service providers to add special protection for critical information.
Most cybersecurity defenses are built to prevent the most common online attacks, as well as automated malware that could infect any organization. But what happens when a sophisticated attacker targets your specific organization, attempting to crack your most valuable intellectual property? In this panel discussion, top experts discuss methods for protecting against determined, sophisticated attackers who know how to build targeted exploits. You’ll get insight on how to recognize a targeted attack, as well as recommendations on how to mitigate it.
Even though many organizations have implemented multi-factor authentication (MFA) through mobile push, or One Time Passwords (OTP) via SMS and mobile apps, these phone-based authentication techniques are not very secure and vulnerable to account takeovers.
Information security professionals should realize they can no longer rely on phone numbers as a secure method of strong authentication. In fact, NIST has deprecated the use of SMS authentication in their guidelines. Similarly other mobile based authentication methods can also be susceptible to phishing and man-in-the-middle (MITM) attacks.
Attend this webinar to learn:
- The challenges with current phone-based authentication methods
- The pros and cons of each authentication method
- How FIDO2 and WebAuthn, the new authentication standards, enable strong, user-friendly authentication
- Best practices for enterprise authentication
More to Come
Take A Tour
Explore the environment from a previous Dark Reading Virtual Event. View the slideshow to get an insider look at these key spaces in this virtual event, prior to attending:
Lobby: Navigate your way around the show floor.
Zones: Resource repositories curated by our editors & industry experts.
Auditorium: View live keynotes, panels, and webinar sessions.
Help Desk: Receive 1:1 assistance and the day’s program/agenda.
If you want to know more about the available tools and best practices for protecting mission-critical data from cyberattack – and get some help choosing the right methods and technologies for your own organization — then this virtual event is for you. Register today!