Day 1 - 29 September 2021

09:30AM

(PDT)

Panel: Doing more with less: consolidating your SecToolkit

  • Coping with reduced security budgets and staffing post-pandemic – Best practices for weathering the storm 
  • How can interaction between technologies, systems and processes improve performance on a tight budget?   
  • Discussing the merits of combined-functionality solutions 

10:10AM

(PDT)

Create A Control-Centered Approach To Managing Your Risk

  • Construct a Best-Practice Cybersecurity Program
  • React To Evolving Regulations and Standards
  • Utilize Controls as the Foundation
  • Empower The Team To Detect Failures
  • Respond To High-Level Pressure

10:40AM

(PDT)

Roland Cloutier

Global Chief Security Officer

TikTok

Associated Talks:

10:15AM - Day 1

View Fireside Chat: Next Generation Security Operations Centres

10:40AM - Day 1

View Fireside Chat: Managing Security in the spotlight

View Full Info

Fireside Chat: Managing Security in the spotlight

  • Sharing experiences as the CSO of TikTok- threat landscapes, challenges and staying ahead
  • Building a culture of transparency in security
  • How TikTok empowers its users and community to make the right security & privacy choices
. Roland Cloutier, Global Chief Security Officer, TikTok

11:00AM

(PDT)

Candy Alexander

President, International Directors

ISSA

View Full Info

Panel: Surviving the worst-case scenario – best practices for incident response

  • How can a strong response put the house back together 
  • Understanding and enacting the 6 phases of an incident response plan – how timing is everything  
  • Top tips for managing collateral damage 
Moderator: . Candy Alexander, President, International Directors, ISSA

11:40AM

(PDT)

Cyber in the physical world

  • Exploring security for industrial control systems and critical infrastructure 
  • The convergence of IT & OT – addressing new vulnerabilities and risks posed 
  • Best practices for security in today’s industrial networks 

12:00PM

(PDT)

Confidential Computing: Moving Data to the Cloud Without Compromise

As our reliance on data grows in the hybrid cloud era, the need for data privacy and protection is imperative. Companies are being challenged with finding the most comprehensive ways to assure security across the lifecycle of their customers’ data. IBM Cloud focuses on enabling capabilities that go beyond confidential computing for the highest level of privacy assurance. Hear about new core technologies and use cases from automotive to financial services and healthcare.

12:30PM

(PDT)

The Role of Detection & Response

  • Detection & Response team: Goals, Scope, and Principles
  • Focus areas of Detection & Response teams
  • Industry best practices in Detection & Response
  • Engineering
  • Detection Engineering
  • Incident Response

12:50PM

(PDT)

Hammad Alam

Principal Solutions Architect

Aviatrix

Associated Talks:

12:50PM - Day 1

View How to achieve Deep Visibility into your Cloud Network for the sake of Security

View Full Info

How to achieve Deep Visibility into your Cloud Network for the sake of Security

As applications are moving from enterprise data centers to Public Cloud (AWS, Azure, GCP and OCI), the changing security landscape is challenging enterprises in:

  • How to maintain and enhance security postures (encryption, service insertion, segmentation etc.)
  • How to provide deep visibility for day2 troubleshooting and auditability for compliance
  • How to do all of this in a repeatable fashion across multiple clouds
. Hammad Alam, Principal Solutions Architect, Aviatrix

01:10PM

(PDT)

Panel: Get out of my cloud! Preventing a data breach

  • Using cloud-based resources safely – moving sensitive workloads out of legacy data centres  
  • How training can help  
  • Examples of organisations using the cloud securely to enhance customer experience and user journey  

01:50PM

End of Day One