When it comes to enterprise cybersecurity, the only constant is change. On one side, many organizations are being transformed by technological change, including the rapid movement toward cloud services, digital transformation, and the Internet of Things. On the other side, security teams are rethinking their defense strategies to respond to new threats such as ransomware, crypto mining, and next-generation malware. And as if that isn’t enough, major regulatory changes such as GDPR are putting new pressures on enterprise security and privacy.
Attend and you’ll get
Prepare for 2019
At this Dark Reading virtual event, security practitioners, industry visionaries, and technology developers come together to discuss the key changes to expect in the next 12 months – and how you can prepare for them.
What are the key cybersecurity steps that enterprises should be taking in the coming year?
What are the critical changes that IT organizations should anticipate, and how should they prioritize their security initiatives?
Identify key cybersecurity steps enterprises should take in 2019
Explore critical changes that IT organizations should anticipate
Learn how to prioritize your security initiatives
No matter what threats you’re facing – or what the size of your IT security team – you will find useful advice and concrete recommendations that you can use in your own environment.
Agenda at at glance
Featured speaker: Richard Rushing, CISO of Motorola Mobility
One of cybersecurity’s chief challenges is that it’s a moving target. Today’s IT security professionals must not only wrestle with ever-present challenges such as malware and insider data leaks, but also with emerging exploits from attackers, emerging regulations from government agencies, and emerging digital challenges from technology vendors. In this eye-opening keynote session, a top expert will offer a look at some of security’s top challenges for the coming year – and how you can prepare your organization to meet them.
Featured speaker: Adam Meyers, Vice President, Intelligence at CrowdStrike
Polymorphic malware. Next-generation ransomware that can not only encrypt your data, but destroy it. Nation-state-sponsored surveillance. Hardware-based attacks. Today’s enterprise is faced with a wide range of new exploits and automated attacks – and new threats are being discovered and experienced every day. In this fascinating session, a leading security researcher will offer a look at some of the latest online exploits, as well as some emerging threats that may be in cybercriminals’ arsenal for the coming year. You’ll also get some insight on how to prepare your IT environment for the coming storm.
In the early days of cloud technology, most IT teams attempted to apply traditional, premises-based security strategies to the new cloud environment – and found it an uphill struggle. Today, however, enterprises and information security teams are becoming more sophisticated, developing strategies and tools that are designed for the very different world of cloud services and applications. In this panel discussion, cloud experts will offer advice and recommendations on how to approach the problem of cloud security in more advanced and practical ways – and how to prepare for cloud-focused attacks that may emerge in your environment.
No matter what your industry, it’s likely that you are now facing new security challenges presented by connected devices that aren’t computers or phones – and aren’t part of your established cybersecurity plan. What are the best ways to prepare your environment to secure IoT technology? How can you manage the risk that this new technology may present to your organization? In this panel discussion, top IoT security thinkers will discuss the various ways that IoT can alter your security strategy – and how to ensure that you’re limiting the risk that IoT technology adds to your enterprise.
In the past, the IT security department focused most of its efforts on building and managing a secure “perimeter” and spent most of its time managing passwords and access control lists. Today, however, the security operations center (SOC) has become a place for not only building a strong defense against the latest attacks, but for analyzing and responding to new attacks that have evaded traditional defenses. In this panel discussion, SOC experts and leaders offer war stories and recommendations on how to implement the latest tools and practices in SOC operations – and how to prepare your organization for the next major security incident, even if your enterprise doesn’t have a SOC in place.
More to Come
Take A Tour
Explore the environment from a previous Dark Reading Virtual Event. View the slideshow to get an insider look at these key spaces in this virtual event, prior to attending:
Lobby: Navigate your way around the show floor.
Zones: Resource repositories curated by our editors & industry experts.
Auditorium: View live keynotes, panels, and webinar sessions.
Help Desk: Receive 1:1 assistance and the day’s program/agenda.
This event is a unique opportunity to look at some of 2019’s greatest security challenges – presented by some of the industry’s top experts, security practitioners, and technology developers.