Product marketing manager from Thycotic, Erin Ducan, discusses privilege in this Digital Summit session. Erin sets the stage with this: “We know that cyber attackers are utilizing new technology and a…
Security
Real-Time Change In Incident Management
Jim Brady discusses real-time change in incident management. His extensive experience in a multitude of security roles throughout his career means he has seen a lot of changes in the healthcare cyber…
Implementing A Layered Approach To Phishing And Whaling
During this digital summit panel, Suresh Chawdhary, head of security & privacy for Nokia, stresses the importance of a layered, multi-pronged cyber security approach to best protect from phishing and…
Incident Of The Week: Educational Infrastructures At Risk Of Invasive Breaches
As educators are scrambling to create distance learning curriculum, they are being thrust into a world of technology that they are not all well-versed or trained in.
How To Use Non-Technical Skills To Propel Your Cyber Security Career
The BISO role is still young, but that doesn’t mean it isn’t critical to cyber security operations, communications, and overall success. One of the secrets to a well-rounded BISO is the ability to lev…
A Practical Approach To Zero Trust
Zero Trust security is becoming mainstream in the cyber security world. Phil Allen and Baber Amin, with Ping Identity, spend this session focusing on how to achieve a Zero Trust framework that support…
Enable Secure Velocity At Scale: DevOps Automation With Identity
Ivan Dwyer, group product marketing manager with Okta, begins this virtual session by acknowledging the challenges of security professionals as an increasing number of organizations adopt cloud and De…
Incident of the Week: Impact Mobile Home Communities Breached
One of the largest owner-operators of manufactured housing communities in North America experienced a data privacy breach on July 3, 2019. Although Impact Communities isn’t aware of any misuse of the…
The Top 5 Foundational Programs Every CISO Should Prioritize
Aligning IT and security teams with the business is an oft-discussed topic and even though security professionals might say they are aligned with their businesses, many can’t articulate how the busine…
Should Certification For Cyber Security Professionals Be A Requirement?
It’s never been a more challenging time to be a cyber security professional. Phishing and ransomware attacks are up, record numbers of employees are working from home and CISOs are stressed to the max…