December 10, 2020
11:00am – 5:15pm EST | 8:00am – 2:15pm PST
It must be shielded from corruption, compromise, or loss at all times, under all circumstances and at all costs. But the overwhelming majority of organizations face data protection challenges, including securing emerging technologies and complying with worldwide data security regulations.
This virtual event spotlights expert insights for ensuring that data is available and secured wherever and whenever a business needs it most—whether in the cloud, across corporate endpoints, or on unmanaged devices—and that its policies align with a fast-changing regulatory environment.
December 10, 2020
11:00am – 5:15pm EST | 8:00am – 2:15pm PST
- 11:00am – 11:45am EST
- 11:45am – 12:00pm EST
- 12:00pm – 12:15pm EST
- 12:15pm – 1:00pm EST
- 1:00pm – 1:15pm EST
- 1:15pm – 1:30pm EST
- 1:30pm – 2:00pm EST
- How the move to cloud is making data protection harder
- How to identify where your critical data is, the channels it flows through and establish an incident response plan
- How to move from passive data monitoring to implementing policy controls – that don’t impact productivity
- How a comprehensive understanding of risk can help you shift from a reactive to proactive posture to stop breaches before they happen
- Spear phishing and how automation is helping it evolve
- How Living off the Land attacks change the game for endpoint security
- The important of Strong Authentication
- The latest trends in Ransomware
- 2:00pm – 2:15pm EST
- 2:15pm – 2:45pm EST
Validating Your DR Strategy
- 2:45pm – 3:00pm EST
- 3:00pm – 3:30pm EST
Recovery in the Cloud
Considering a move to the cloud? Moving your disaster recovery (DR) to the cloud is a good place to start or expand cloud adoption. As the role of the cloud continues to evolve in modern IT, you may be asking what strategy or cloud model should I deploy?
Big benefits like cost savings and ease-of-use are some of the reasons many companies are shifting from on-premises to cloud for their DR, but navigating the right approach while balancing tradeoffs is important.
Join this session with experts Dale Levesque, Director of Product Management at TierPoint, and Gijsbert Janssen van Doorn, Zerto Director of Technical Marketing, to explore the technical and economic benefits of moving DR to the cloud and find the right options and approach.
- 3:30pm – 3:45pm EST
- 3:45pm – 4:15pm EST
Historically, defense in depth was mostly performed through network-layer controls. While network security controls remain an important component of cloud security, an additional layer of identity and access management (IAM) governance is now needed as organizations continue to scale their cloud presence. Similar to scanning applications for vulnerabilities, IAM policies across all cloud accounts must be constantly monitored and evaluated to determine the risk impact to the business.
From the latest Cloud Threat Report, Matt Chiodi, Chief Security Officer of Public Cloud at Palo Alto Networks, will present breaking research from the Unit 42 Threat Intelligence team. And how one simple IAM misconfiguration allowed researchers to compromise an entire massively-scaled cloud environment and bypass just about every security control.
Matt will also deep dive into the complex topic of identity security, exploring the methods attackers use to silently perform reconnaissance, common threat actors and tangible steps organizations can take to build a cloud security program based upon IAM best practices.
- 4:15pm – 4:30pm EST
- 4:30pm – 5:15pm EST
Prizes & Interaction
Explorer Giveaway
30 Points
Session Viewed
25 Points
Zone Visits
20 Points
Location Chat Attended
10 Points
Documents Viewed
5 Points
Exchanged vCards
December 10, 2020
11:00am – 5:15pm EST | 8:00am – 2:15pm PST