Risk Management
11:00 AM – 5:15 PM EST | 8:00 AM – 2:15 PM PST
11:00 AM – 5:15 PM EST | 8:00 AM – 2:15 PM PST
- 11:00am – 11:45am EST
- 11:45am – 12:00pm EST
- 12:15pm – 1:00pm EST
- 1:00pm – 1:15pm EST
- 1:30pm – 2:00pm EST
As organizations look to secure their cloud-native deployments, they find themselves investing in additional agents, cloud-native firewalls, and other security control planes required to run in public cloud environments. These hidden costs can increase ongoing cloud compute costs by 25% or more and lead to vendor lock-in.
Learn how you can affordably and securely move workloads to the cloud. This session will also cover defining, automatically generating, and managing cloud-native security policies across multi and hybrid-cloud applications and workloads by leveraging native cloud controls.
Take full advantage of cloud-native security controls and avoid the hidden tax imposed by other cloud security solutions.
- 1:30pm – 2:00pm EST
- 2:15pm – 2:45pm EST
The recent and rapid shift to distributed work has pushed the need for a modern, zero trust approach to security to the front of many IT and security leaders’ agendas. Today, we can no longer have a network perimeter-centric view of security; instead, we need to securely enable access for all members of your workforce (employees, partners, contractors, collaborators) regardless of their location, device, or network.
In this webinar, we’ll take a look at progress made when it comes to the identity foundation of zero trust. We’ll discuss insights from a recent survey of 500 security leaders worldwide to see where organizations are currently having success, what’s changed since last year, and what hurdles they plan to tackle next — and explore the impact the recent crisis has had on those priorities as well.
- 2:15pm – 2:45pm EST
- How admins can review and act on the access information provided by Device Insight
- What considerations may affect your access strategy, and how to mature it
- Why Trust Monitor can further reduce the workload on admins by flagging anomalous behavior
- 2:45pm – 3:15pm EST
You will learn:
- How silent malware launches, remote password hash capture, and how rogue rules work
- Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
- Details behind clickjacking and web beacons
- Actionable steps on how to defend against them all
- 3:30pm – 4:00pm EST
Presented by: Joe Burke, Chief Architect – Privileged Access Management (PAM)
Attackers actively seek out privileged accounts, credentials and/or secrets to exploit your infrastructure, operations and data.
Add in automation, hybrid datacenters, the push towards public clouds, serverless architectures and infrastructure as code, all of which creates a target rich ecosystem of privileged information to attract attackers.
Avoid the front page headline, widespread and irreparable damage, intellectual property loss, and brand equity tarnishing by reducing risk with adequate and comprehensive controls across the hybrid enterprise.
Join Joe Burke, Chief Architect for Privileged Access Management at Symantec, as he discusses how OnePAM protects the modern enterprise
- 4:00pm – 4:30pm EST
Working from anywhere, people have moved beyond the edge of secured networks. Your workforce, partners, and customers are increasingly using personal devices to directly access cloud-delivered resources. Trading convenience for security, they put proprietary and sensitive information at risk by using unsecured networks, unsanctioned applications, and all-purpose browsers.
To dynamically manage risks while meeting escalating governance and compliance mandates, you need a platform that provides observability, insights, and automation across the organization.
In this session, you will learn how to:
- Engage innovative protections for the workforce, applications, APIs and content regardless of where they reside
- Leverage endpoint inspection, device management, SASE and SD-WAN for comprehensive security at the edge
- Ensure that all actions and transactions are continuously situationally aware and contextually risk appropriate
- 4:30pm – 5:15pm EST
Here’s What to Look For
Panelists: Brien Posey, Microsoft MVP, Technical Writer and Ryan Davis, Sr. Product Marketing Manager, ExtraHop
Prizes & Interaction
Explorer Giveaway
30 Points
Session Viewed
25 Points
Zone Visits
20 Points
Location Chat Attended
10 Points
Documents Viewed
5 Points
Exchanged vCards
11:00 AM – 5:15 PM EST | 8:00 AM – 2:15 PM PST