IT Security Virtual Conferences | SC Media

Virtual Conferences

UPCOMING VIRTUAL CONFERENCES

Virtual Conference

Third-Party Risk: Overcoming supply chain and other outsourcing threats

Today’s supply chains are as much about the flow of information as they are about goods and services. Managing their associated security risk is a complex and critical task that touches on multiple functions within and outside the enterprise.

Register for Third-Party Risk: Overcoming supply chain and other outsourcing threats
Third-Party Risk: Overcoming supply chain and other outsourcing threats

Today’s supply chains are as much about the flow of information as they are about goods and services. Managing their associated security risk is a complex and critical task that touches on multiple functions within and outside the enterprise.

Cybersecurity in the supply chain spans the full breadth of your organization’s ecosystem: sourcing, vendor management, business continuity and quality control, physical security and more. To help organizations get their arms around this challenge, SC Media is hosting a two-day virtual conference focused on assessing exposures and charting a path forward. Discussions and presentations will include:

  • Establishing an enterprise risk assessment process.
  • Verifying supplier practices and procedures
  • Integrating threat intelligence approaches

A secure organization is only as strong as its weakest link. Learn about the scalable and repeatable processes that keep your counterparties and suppliers in line with your risk management vision. Register now.

Virtual Conference

Threat Intelligence: Building a program that turns data into action

Shifting your security focus to the risks that matter most requires intelligence. But even organizations with access to threat intelligence can find themselves challenged when it comes to leveraging that data effectively and consistently. Join SC Media for a two-day eSummit from April 20-21 focused on building a threat intelligence program that fits your organization’s needs. This strategic learning opportunity is designed to help both organizations that are considering standing up a threat intelligence practice as well as those that may have struggled with implementation.

Register for Threat Intelligence: Building a program that turns data into action

Sponsored by: Anomali, AttackIQ, DarkTrace, Intel471, Recorded Future, Sophos, VMWare

Threat Intelligence: Building a program that turns data into action

Shifting your security focus to the risks that matter most requires intelligence. But even organizations with access to threat intelligence can find themselves challenged when it comes to leveraging that data effectively and consistently.

Join SC Media for a two-day eSummit from May 18-19 focused on building a threat intelligence program that fits your organization’s needs. This strategic learning opportunity is designed to help both organizations that are considering standing up a threat intelligence practice as well as those that may have struggled with implementation. Experienced threat intel professionals will dive deep on topics that include:

  • How threat intelligence programs can shift a security team from a reactive to a predictive stance.
  • Why efficiency immediately increases for security teams once programs are implemented.
  • How organizations find strength in numbers through collaborative threat programs.

Positioning your organization to foresee potential threats can have a profound impact on risk reduction. Join us to discover how to turn threat data into action. Register now.

Virtual Conference

Enterprise Data Security: Scaling data protection beyond discovery and classification

Enterprises today face tremendous data-security challenges: Datasets are growing and diversifying; privacy regulations are reaching farther and gaining complexity; the attack surface is expanding. It’s not just about data loss. The exposure of customer data has quickly become a central area of concern for security departments, as well as board members.

Register for Enterprise Data Security: Scaling data protection beyond discovery and classification
Enterprise Data Security: Scaling data protection beyond discovery and classification

Enterprises today face tremendous data-security challenges: Datasets are growing and diversifying; privacy regulations are reaching farther and gaining complexity; the attack surface is expanding. It’s not just about data loss. The exposure of customer data has quickly become a central area of concern for security departments, as well as board members.

Changing data regulations coupled with increased consumer awareness have made data privacy and protection a constant and continuous project for security organizations. Security professionals today must scrutinize every practice within the business to implement a scalable data protection strategy that expands beyond traditional data discovery and classification.

In this upcoming two-day virtual event, SC Media brings together leading data security experts who will unpack the challenges today’s enterprises face on topics that include:

  • Updates to data privacy regulations that are in progress
  • Tools and strategies to help manage data protection
  • How to remain compliant in cloud environments

Discover new strategic approaches and technologies that will allow you to scale data security within your business. Register now.

Virtual Conference

Multi-cloud Security: Confronting the expanding dilemma of cloud architecture

As more organizations embrace multi-cloud strategies, the architecture of choice has increasingly become a private / public hybrid. While such solutions offer flexibility and scalability — and support innovation — they bring complexity to IT security — including new challenges in authentication, data governance and security visibility, and a new requirements for the skills to address these issues.

Register for Multi-cloud Security: Confronting the expanding dilemma of cloud architecture

Sponsored by: AttackIQ, FireMon

Multi-cloud Security: Confronting the expanding dilemma of cloud architecture

As more organizations embrace multi-cloud strategies, the architecture of choice has increasingly become a private / public hybrid. While such solutions offer flexibility and scalability — and support innovation — they bring complexity to IT security — including new challenges in authentication, data governance and security visibility, and a new requirements for the skills to address these issues.

Join SC Media on June 8-9 for a two-day virtual conference that brings together industry leaders who will share their insights and experiences on the fast-changing world of cloud security. Topics covered will include:

•Determining whether native or third-party security solutions are the right approach for your environment
• Key compliance challenges you can expect and how to handle them
• What an effective defense looks like in a hybrid cloud environment

To evaluate the implications of your cloud architecture, register now.

Virtual Conference

Integrating Application Security: Reengineering AppSec as a business catalyst

Here’s the challenge: Web applications are progressively extending the range of critical business operations they support. But software development for cloud-native environments requires continuous security oversight. Against this backdrop, cybersecurity leaders and strategists must strike a balance between accelerating a business’s go-to-market and safeguarding the applications that fuel its growth and productivity.

Register for Integrating Application Security: Reengineering AppSec as a business catalyst
Integrating Application Security: Reengineering AppSec as a business catalyst

Here’s the challenge: Web applications are progressively extending the range of critical business operations they support. But software development for cloud-native environments requires continuous security oversight. Against this backdrop, cybersecurity leaders and strategists must strike a balance between accelerating a business’s go-to-market and safeguarding the applications that fuel its growth and productivity.

Producing quality code quickly and securely is always the goal. But efforts to integrate security into the software development cycle is more often perceived as a roadblock than a catalyst. Join SC Media for a two-day virtual event from June 22-23 to hear from top experts in a series of discussions and presentations focused on application security. Topics include:

• How to map application security requirements to compliance frameworks
• Embracing and extending DevSecOps principles
• Standardizing application security policies within business lines

Discover how modern application security programs can operate at the speed and scale that’s required to empower, not deter, the business. Register now.

Virtual Conference

Identity and Access Management: Rethinking your organization’s approach to credentials and permissions

Insider threats are among the most difficult cyber risks to detect and prevent — and getting identity and access management (IAM) right is an essential step in keeping them at bay. The shift by many organizations to predominantly remote workforces has compounded the issue, with larger organizations especially vulnerable as the number of entry points to their networks has increased.

Register for Identity and Access Management: Rethinking your organization’s approach to credentials and permissions
Identity and Access Management: Rethinking your organization’s approach to credentials and permissions

Insider threats are among the most difficult cyber risks to detect and prevent — and getting identity and access management (IAM) right is an essential step in keeping threats at bay. The shift by many organizations to predominantly remote workforces has compounded the issue, with larger organizations especially vulnerable as the number of entry points to their networks has increased.

From strong authentication protocols to behavior monitoring capabilities, next-generation identity and access management solutions are showing the way forward. An effective IAM approach will enable security organizations to separate signal from noise — managing and resolving a broad range of exceptions and system-admin failures. It also must fit your organization’s culture and operating model. On June 29-30, SC Media will convene an all-star team of identity security experts to discuss the role of IAM in Rethinking Your Organization’s Approach to Insider Threats. Topics will include:, including:

  • The fundamentals of Identity and Access Management
  • Tools and software that help combat insider threats
  • Why insider threats aren’t just tied to malicious employees

Register today for a fresh look at your organization’s approach to IAM, and its exposure to insider risk.

Virtual Conference

Data Privacy: Addressing today’s compliance demands

As legal and regulatory data protection frameworks have proliferated, it’s harder for organizations — of all sizes — to define and maintain a safe zone in which management and administration of sensitive data meets both business and government requirements. While some jurisdictions are clear, others are fuzzy; and the rules themselves are moving targets. Increased reliance on multi-cloud environments — in which sensitive data is more dispersed — raises the bar higher.

Register for Data Privacy: Addressing today’s compliance demands
Data Privacy: Addressing today’s compliance demands

As legal and regulatory data protection frameworks have proliferated, it’s harder for organizations — of all sizes — to define and maintain a safe zone in which management and administration of sensitive data meets both business and government requirements. While some jurisdictions are clear, others are fuzzy; and the rules themselves are moving targets. Increased reliance on multi-cloud environments — in which sensitive data is more dispersed — raises the bar higher.

Join SC Media for a two-day virtual event from July 13-14 as a collection of security experts share advice on level-setting your data-privacy and security posture, and overcoming compliance challenges. Topics include:

• How to put privacy legislation in the service of your organization
• Understanding key requirements of recent data privacy regulations
• What are the common threat models that lead to data exposure

Aligning your security model with a strong data privacy policy is necessary to prevent breaches that put customers and employees at risk — and expose your organization to legal action. Register now.

Virtual Conference

Vulnerability Management: Moving your organization from a tactical to a strategic posture

Vulnerability management is a core cybersecurity discipline that encompasses scanning, assessment and prioritization. Scanning for weaknesses is not enough, especially when businesses are expanding their work-from-home populations, adopting cloud-first postures and introduce new technologies. Successful vulnerability management requires a coordinated program, continuously executed, from detection to remediation.

Register for Vulnerability Management: Moving your organization from a tactical to a strategic posture
Vulnerability Management: Moving your organization from a tactical to a strategic posture

Vulnerability management is a core cybersecurity discipline that encompasses scanning, assessment and prioritization. Scanning for weaknesses is not enough, especially when businesses are expanding their work-from-home populations, adopting cloud-first postures and introduce new technologies. Successful vulnerability management requires a coordinated program, continuously executed, from detection to remediation.

SC Media will host a two-day virtual event on this important topic from July 20-21. Join our faculty of vulnerability management experts as they share their experienceand explore the essentials, including:

• Designing a vulnerability management process from the ground up
• Identifying the tools, resources and processes that work best for your organization
• Setting risk-acceptance criteria

Establishing a vulnerability management program is a key step in your organization’s progress toward its ideal state of cybersecurity. Register now.

Virtual Conference

Advanced Incident Detection: Protecting your business from state-sponsored actors

It doesn’t take much for a hacker to wreak havoc on an organization. Even unsophisticated cybercriminals can readily acquire hacking tools and exploits on the dark web. But the stakes change when threat actors are backed by a government’s resources. Businesses are increasingly a favorite target for state-sponsored threat actors that understand — and aim to exploit — the resource challenges their targets face. To protect your organization from these advanced adversaries, it’s essential to understand how they operate and to adjust your security posture accordingly.

Register for Advanced Incident Detection: Protecting your business from state-sponsored actors
Advanced Incident Detection: Protecting your business from state-sponsored actors

It doesn’t take much for a hacker to wreak havoc on an organization. Even unsophisticated cybercriminals can readily acquire hacking tools and exploits on the dark web. But the stakes change when threat actors are backed by a government’s resources.
Businesses are increasingly a favorite target for state-sponsored threat actors that understand — and aim to exploit — the resource challenges their targets face. To protect your organization from these advanced adversaries, it’s essential to understand how they operate and to adjust your security posture accordingly.

Join SC Media from August 11-12 as we host a virtual event that convenes leaders and specialists in combatting state-sponsored attackers. Discussions and presentations will provide insight on how to detect and prevent such threats, including:

• How to integrate security culture into your organization
• Proven methods to clean up tech supply chain
• Tales from the front lines of targeted intrusions

Our Advanced Incident Detection curriculum will give you the perspective you need to position your defenses. Register now.

Virtual Conference

Maintaining Endpoint Security: New opportunities and new risks

Endpoint security has become an area of intense scrutiny and change over the past 12 months as the remote workforce has expanded and concerns over disappearing network perimeters have ramped up. Changing business cultures and cost structures are leading many organizations to view work-from-home and BYOD policies in a new light. But those who aim to lean into such opportunities must undertake a parallel rethink of their cybersecurity implications.

Register for Maintaining Endpoint Security: New opportunities and new risks
Maintaining Endpoint Security: New opportunities and new risks

Endpoint security has become an area of intense scrutiny and change over the past 12 months as the remote workforce has expanded and concerns over disappearing network perimeters have ramped up. Changing business cultures and cost structures are leading many organizations to view work-from-home and BYOD policies in a new light. But those who aim to lean into such opportunities must undertake a parallel rethink of their cybersecurity implications.

SC Media’s upcoming virtual event “Maintaining Endpoint Security: New Opportunities and New Risks” is designed to help organizations set a course for secure workforce growth and change following a year of disruption. This two-day event, August 25-26, convenes cybersecurity innovators and practitioners who will share their expertise and experience in addressing critical endpoint security issues, including:

• The problem of data-sharing and how to rein it in
• Determining the endpoint capabilities your organization needs to achieve its goals
• Understanding the top security threats for remote users

Now more than ever, the cybersecurity battle is being fought at the endpoint. Register today.

Virtual Conference

Data Breach Response: Preparing for the inevitable security incident

For the security organization, containment is the goal in cyber incident response. Although a one-size-fits all approach does not exist, there are critical steps and dialogue that must take place to contain a data breach. Building a comprehensive plan that activates the right people and tools at the right time helps identify an attack, contain the damage, and eliminate the root cause of the incident.

Register for Data Breach Response: Preparing for the inevitable security incident
Data Breach Response: Preparing for the inevitable security incident

For the security organization, containment is the goal in cyber incident response. Although a one-size-fits all approach does not exist, there are critical steps and dialogue that must take place to contain a data breach. Building a comprehensive plan that activates the right people and tools at the right time helps identify an attack, contain the damage, and eliminate the root cause of the incident.

A quick and efficient response leads to a reduction of losses and quickly restored processes and services for an organization. Join SC Media for a two-day virtual conference from September 21-22 as experts on the topic share what optimal management of a cyber incident should look like. Topics include:

• Knowing when to call in a third-party vs. your own staff
• The role that cybersecurity insurance plays in incident response
• Developing a security culture that impacts your containment strategy

Incident response is all about the maturity and culture that’s developed by the security organization. Discover how to implement one that works for you. Register now.

Virtual Conference

Malware Analysis: Taking incident-management to the next level

Malware analysis is an increasingly important tool in an organization’s incident-management toolkit — enabling it to determine the source and potential impact of an intercepted virus, worm or trojan. Malware analysis can also help a target company assess damage and data loss, respond accordingly, and reset defenses going forward.

Register for Malware Analysis: Taking incident-management to the next level

Sponsored by: AttackIQ

Malware Analysis: Taking incident-management to the next level

Malware analysis is an increasingly important tool in an organization’s incident-management toolkit — enabling it to determine the source and potential impact of an intercepted virus, worm or trojan. Malware analysis can also help a target company assess damage and data loss, respond accordingly, and reset defenses going forward.

Please join SC Media for a two-day virtual conference — Oct. 5-6 — that will bring you up to speed on a capability of increasing relevance to companies across a broad range of sizes and sectors. Key discussion and presentation topics will include:

  • Proven tools and methodologies that detect and mitigate malware attacks
  • Establishing a malware analysis capability that suits your organization
  • A look over the horizon at tomorrow’s malware threats

To determine if malware analysis has place in your security plan, register now.

Virtual Conference

Detecting Ransomware: Countermeasures to overcome cybercrime’s biggest threat

Ransomware revenue for cybercriminals is in the billions of dollars and counting. Equipped with advanced evasion techniques that elude traditional antivirus solutions, this threat is at the top of every cybersecurity professional’s list.  While there’s no silver bullet on the ransomware detection front, security professionals can employ a multi-pronged approach…

Register for Detecting Ransomware: Countermeasures to overcome cybercrime’s biggest threat
Detecting Ransomware: Countermeasures to overcome cybercrime’s biggest threat

Ransomware revenue for cybercriminals is in the billions of dollars and counting. Equipped with advanced evasion techniques that elude traditional antivirus solutions, this threat is at the top of every cybersecurity professional’s list. 

While there’s no silver bullet on the ransomware detection front, security professionals can employ a multi-pronged approach that includes detection measures focused on networks, endpoints and end users. Join CyberRisk Alliance from November 9-10 for a virtual event that will feature experts ready to share strategies that you can implement right now to detect ransomware in your environment. Topics include: 

  • The role that predictive algorithms play in detecting ransomware
  • How sacrificial network shares can serve as an early warning system
  • The latest exploit kit detection rules that will help detection efforts

Prevent your organization from being locked out. Bolster your knowledge on detection efforts by registering now.