IT Security Virtual Conferences | SC Media

Virtual Conferences

UPCOMING VIRTUAL CONFERENCES

Virtual Conference

Building a Better Identity Management Roadmap

The way organizations operate and process information has drastically changed over the last six months as the global economic and health crisis has resulted in job losses, an expanded remote workforce, and increased use of temporary staff. One important byproduct of this shift: Security leaders are rethinking their approaches to access control. Even in the best of circumstances, ensuring effective oversight of digital identities is among a security leader’s most daunting responsibilities. Innovations in contextual and biometric authentication remain promising — though the latter must confront increased social and legal resistance — but the growing complexity of internal and external networks we rely on keeps the bar high.

Register for Building a Better Identity Management Roadmap
Building a Better Identity Management Roadmap

The way organizations operate and process information has drastically changed over the last six months as the global economic and health crisis has resulted in job losses, an expanded remote workforce, and increased use of temporary staff. One important byproduct of this shift: Security leaders are rethinking their approaches to access control. Even in the best of circumstances, ensuring effective oversight of digital identities is among a security leader’s most daunting responsibilities. Innovations in contextual and biometric authentication remain promising — though the latter must confront increased social and legal resistance — but the growing complexity of internal and external networks we rely on keeps the bar high.

CyberRisk Alliance’s eSummit focused on identity and access management, taking place September 23-24, will address these issues. Industry experts and practitioners will share ideas and experiences on mission-critical topics, including:

  • Insider-threat mitigation.
  • Enforcing attribute-based access controls in multi-cloud environments.
  • Building an effective IAM roadmap.

Securing the identities of today’s digital workforce and enforcing access controls is at the center of many successful security programs. Learn how to reach this ideal state by registering now.

Virtual Conference

New frontiers in security awareness

The way we work is evolving fast and an undisputed byproduct of this shift is an expanding attack surface. The question is: Has your security awareness model evolved at a similar pace?

Register for New frontiers in security awareness
New frontiers in security awareness

October 14-15, 2020 10:30 am – 4:30 pm EDT

The way we work is evolving fast and an undisputed byproduct of this shift is an expanding attack surface. The question is: Has your security awareness model evolved at a similar pace?

The end users of your organization’s critical systems and databases — your acknowledged last line of defense — may be growing more productive than ever, but they are also growing more distracted than ever. Meanwhile, their requirement for anywhere-anytime access is becoming increasingly difficult to constrain. And the implications of the Covid-19 pandemic are clear: A majority of organizations have had no choice but to expand their BYOD and work-from-home policies.

Led by experts in the field, SC Media’s two-day virtual conference — New Frontiers in Security Awareness — will dive deep on this important topic. Join us from Oct. 14-15, as we unpack strategies and tactics your organization can deploy to expand and improve security awareness. Topics include:

  • New approaches to avoid information leakage
  • Ensuring your user community understands the latest phishing threats
  • Gaining support from senior leadership to optimize security awareness participation

Traditional security awareness models are no longer sufficient to protect the enterprise of today. The data protection challenges businesses face are growing in size and complexity. Stay ahead of the curve. Register now.

Virtual Conference

Gaining a Cybersecurity Edge with Threat Intelligence

Gaining a Cybersecurity Edge with Threat Intelligence November 4-5, 2020 10:30 am – 4:30 pm EDT Join SC Media on Wednesday, November 4, to help identify the benefits a threat intelligence program could provide for your organizationUnderstanding how threat actors think and operate is an essential component of blocking and remediating future digital assaults aimed at siphoning critical data or shutting down operations. This SC Media virtual conference will bring you up to speed and help identify the benefits a threat intelligence program could provide for your organization.

Register for Gaining a Cybersecurity Edge with Threat Intelligence
Gaining a Cybersecurity Edge with Threat Intelligence

November 4-5, 2020 10:30 am – 4:30 pm EDT

With an overabundance of threat information available, the burden is on the user organization to define an appropriate threat intelligence strategy and ensure its implementation. While larger enterprises may have the resources to allocate the security staff and technology required to sift and analyze the torrent of data, many with limited resources have walked away — leaving untapped the value it could provide to their security programs.

Understanding what threat intelligence can, and should, mean to your organization is the first step in successfully leveraging it. Join SC Media on Wednesday, November 4, to help identify the benefits a threat intelligence program could provide for your organization.

This learning and networking opportunity will give you the knowledge and context you need to define — or update — your approach. Key topics will include:

  • Integrating threat intelligence into your existing infrastructure
  • Training your team to maximize the value of threat intelligence
  • The latest in cybercrime (from COVID-19 exploits to political phishing and more).

Understanding how threat actors think and operate is an essential component of blocking and remediating future digital assaults aimed at siphoning critical data or shutting down operations. This SC Media virtual conference will bring you up to speed. Register now.

Virtual Conference

Zero Trust in Practice: The Art of the Possible

Zero Trust in Practice: The Art of the Possible November 11-12, 2020 10:30 am – 4:00 pm EDT This new SC Media virtual conference will help you understand the leading strategic approaches to adopting a zero-trust model. The event will feature leading experts who will dive deep into the discipline’s key components, including a full zero trust architecture, where organizations struggle in reaching zero trust, gaining granular visibility into your network and much more.

Register for Zero Trust in Practice: The Art of the Possible
Zero Trust in Practice: The Art of the Possible

November 11-12, 2020 10:30 am – 4:00 pm EDT

Is it time finally for zero trust skeptics to take a closer look? Originally proposed by a Forester analyst in 2010, the zero-trust security model gained steam as high-powered companies like Google embraced it. But for most organizations, the concept remains daunting on its face: Continuous verification? Permission every data transaction? Create and enforce departmental barriers at a time when my company is trying to tear them down? For information security leaders at these companies, zero-trust models appeared to be well out of reach.

But the skeptics’ ranks may be thinning. With a majority of threats already known to emanate from within the enterprise walls, the castle-and-moat analogy once commonplace among security professionals is laughable. Meanwhile, the challenge of verifying the digital identities of a pandemic-dispersed workforce is leading an increasing number of security departments to adopt a zero-trust framework — one that takes seriously the challenge of bringing employees’ anywhere-anytime activities under control.

Zero Trust in Practice: The Art of the Possible — a new SC Media virtual conference — will tackle an increasingly important subject. Scheduled for November 11-12, this unique learning and networking opportunity will help you understand the leading strategic approaches to adopting a zero-trust model. The event will feature leading experts who will dive deep into the discipline’s key components, including:

  • A comprehensive review of a full zero trust architecture
  • Where organizations struggle in reaching zero trust
  • Gaining granular visibility into your network
  • How remote work creates an invisible perimeter

The security leader of today has no choice but to trust no one. Doing so may require a strategic approach. Register now.

Webcasts

ON DEMAND VIRTUAL CONFERENCES

Virtual Conference

RiskSec DIGITAL 2020

RiskSec DIGITAL 2020 is a unique event for cybersecurity’s leaders and aspiring leaders.Reserve your spot today to join us on September 16-17 for two mornings focused on Resilient Thinking in an Unpredictable World.

Register for RiskSec DIGITAL 2020
RiskSec DIGITAL 2020

RiskSec DIGITAL 2020 is a special invitation-only event for cybersecurity’s leaders and aspiring leaders.

Apply today to join us on September 16-17 for two mornings focused on Resilient Thinking in an Unpredictable World.

MORE INFO


Speaker and Faculty Development Partner

Virtual Conference

Is your incident response plan what it needs to be?

Join us August 19-20 to hear from incident-response experts and network with other security professionals who can share real-world experiences on what’s worked and what hasn’t. With cyber threats continuously looming, there is a good chance you’ll have an incident to respond to in your future. Taking a proactive stance is essential. Register today.

Register for Is your incident response plan what it needs to be?
Is your incident response plan what it needs to be?

Though data breaches may be commonplace, their potential to do harm remains high. The lack of an appropriate response plan only multiplies their likely impact. Is Your Incident Response Plan What It Needs to Be? is a new virtual conference produced by SC Media. Offering a comprehensive perspective on an essential cybersecurity discipline, this two-day event is designed both for organizations that lack a plan and those that suspect their plan may need an update.

Through our engaging and interactive e-learning format, the program and conversation will provide awareness of the fundamental problems of incident response planning, and go deep on the solutions, including:

  • When, how and where you should invest in preparation.
  • The people, processes, and technologies of a successful incident response program.
  • A look at the realities a modern-day responder faces.
  • Steps you must take to ensure your organization will spring into action when the time comes.

Join us August 19-20 to hear from incident-response experts and network with other security professionals who can share real-world experiences on what’s worked and what hasn’t. With cyber threats continuously looming, there is a good chance you’ll have an incident to respond to in your future. Taking a proactive stance is essential. Register today.


Speaker and Faculty Development Partner

Virtual Conference

The new cloud security challenge

Join us July 15-16 to network with other security professionals and learn from the experts who will have an immediate impact on your security strategy and effectiveness. As cloud platforms continue to dominate CIO roadmaps, addressing their security and privacy risks, and related compliance requirements, is critical.

Register for The new cloud security challenge
The new cloud security challenge

Join us July 15-16 to network with other security professionals and learn from the experts who will have an immediate impact on your security strategy and effectiveness. As cloud platforms continue to dominate CIO roadmaps, addressing their security and privacy risks, and related compliance requirements, is critical.

Under more info: Even before the pandemic changed the world of work, cloud platforms posed a unique set of challenges for I.T. and cybersecurity professionals. Since the pandemic, the cloud-security bar has been set even higher. The work-from-home user has become as ubiquitous as the mobile worker, and both are putting extraordinary pressure on cloud security policies, systems and services.

The new cloud security challenge — a virtual conference produced by SC Media — is designed to boost your knowledge and understanding of this important topic. Leveraging an interactive and conversational e-learning format, this two-day event will drill down on the essentials of cloud security:

  • Tools and strategies your organization can apply to effectively address your unique risk profile.
  • Fundamental cloud security controls you should implement in the near term.
  • Containing risk from misconfigured servers, malware, and unauthorized access.

Join us July 15-16 to network with other security professionals and learn from the experts who will have an immediate impact on your security strategy and effectiveness.

As cloud platforms continue to dominate CIO roadmaps, addressing their security and privacy risks, and related compliance requirements, is critical. Register today.