IT Security Virtual Conferences | SC Media

Virtual Conferences

UPCOMING VIRTUAL CONFERENCES

Virtual Conference
SC Media eSummit

Integrating Application Security: Reengineering AppSec as a business catalyst

Here’s the challenge: Web applications are progressively extending the range of critical business operations they support. But software development for cloud-native environments requires continuous security oversight. Against this backdrop, cybersecurity leaders and strategists must strike a balance between accelerating a business’s go-to-market and safeguarding the applications that fuel its growth and productivity.

Register for Integrating Application Security: Reengineering AppSec as a business catalyst

Sponsored by: Contrast Security, Duo Security, Human, Invicti

Integrating Application Security: Reengineering AppSec as a business catalyst

Earn up to 6.5 CPE credits by attending this virtual conference.

Here’s the challenge: Web applications are progressively extending the range of critical business operations they support. But software development for cloud-native environments requires continuous security oversight. Against this backdrop, cybersecurity leaders and strategists must strike a balance between accelerating a business’s go-to-market and safeguarding the applications that fuel its growth and productivity.

Producing quality code quickly and securely is always the goal. But efforts to integrate security into the software development cycle is more often perceived as a roadblock than a catalyst. Join SC Media for a two-day virtual event from June 22-23 to hear from top experts in a series of discussions and presentations focused on application security. Topics include:

• How to map application security requirements to compliance frameworks
• Embracing and extending DevSecOps principles
• Standardizing application security policies within business lines

Discover how modern application security programs can operate at the speed and scale that’s required to empower, not deter, the business. Register now.

FEATURED KEYNOTES

Kevin Johnson, CEO, Secure Ideas
Alissa Knight, Partner at Knight Inc | Virtual CISO at Quontic 
Keith Hoodlet, Director, Application Experience, Thermo Fisher Scientific

SESSIONS

Embed sophisticated bot detection into your CI/CD pipeline with a single line of code
Hosted by Human Security

Between the chair and the keyboard
Hosted by Duo Security at Cisco

Virtual Conference
SC Media eSummit

Identity and Access Management: Rethinking your organization’s approach to credentials and permissions

Insider threats are among the most difficult cyber risks to detect and prevent — and getting identity and access management (IAM) right is an essential step in keeping them at bay. The shift by many organizations to predominantly remote workforces has compounded the issue, with larger organizations especially vulnerable as the number of entry points to their networks has increased.

Register for Identity and Access Management: Rethinking your organization’s approach to credentials and permissions

Sponsored by: BeyondTrust, CloudFlare, Duo Security, Ermetic, Okta, One Identity, OneLogin, RSA

Identity and Access Management: Rethinking your organization’s approach to credentials and permissions

Earn up to 6.5 CPE credits by attending this virtual conference.

Insider threats are among the most difficult cyber risks to detect and prevent — and getting identity and access management (IAM) right is an essential step in keeping threats at bay. The shift by many organizations to predominantly remote workforces has compounded the issue, with larger organizations especially vulnerable as the number of entry points to their networks has increased.

From strong authentication protocols to behavior monitoring capabilities, next-generation identity and access management solutions are showing the way forward. An effective IAM approach will enable security organizations to separate signal from noise — managing and resolving a broad range of exceptions and system-admin failures. It also must fit your organization’s culture and operating model. On June 29-30, SC Media will convene an all-star team of identity security experts to discuss the role of identity and access management in rethinking your organization’s approach to insider threats. Topics will include:

  • The fundamentals of Identity and Access Management
  • Tools and software that help combat insider threats
  • Why insider threats aren’t just tied to malicious employees

Register today for a fresh look at your organization’s approach to IAM, and its exposure to insider risk.

FEATURED KEYNOTES

Tee Patel, COO and vCISO, Iron Oak Security

Bob West, Founder and Managing Partner, West Strategy Group

SESSIONS

Using cloud-based identity services in a zero trust world – is it safe?
Hosted by RSA Business

Securely delight your customers with Okta Devices
Hosted by Okta

Succeeding with Secure Access Service Edge (SASE)
Hosted by Cloudflare

Security challenges with digital coworkers
Hosted by One Identity

The path to zero trust: A security paradigm shift
Hosted by BeyondTrust

Virtual Conference
SC Media eSummit

Data Privacy: Addressing today’s compliance demands

As legal and regulatory data protection frameworks have proliferated, it’s harder for organizations — of all sizes — to define and maintain a safe zone in which management and administration of sensitive data meets both business and government requirements. While some jurisdictions are clear, others are fuzzy; and the rules themselves are moving targets. Increased reliance on multi-cloud environments — in which sensitive data is more dispersed — raises the bar higher.

Register for Data Privacy: Addressing today’s compliance demands
Data Privacy: Addressing today’s compliance demands

Earn up to 6.5 CPE credits by attending this virtual conference.

As legal and regulatory data protection frameworks have proliferated, it’s harder for organizations — of all sizes — to define and maintain a safe zone in which management and administration of sensitive data meets both business and government requirements. While some jurisdictions are clear, others are fuzzy; and the rules themselves are moving targets. Increased reliance on multi-cloud environments — in which sensitive data is more dispersed — raises the bar higher.

Join SC Media for a two-day virtual event from July 13-14 as a collection of security experts share advice on level-setting your data-privacy and security posture, and overcoming compliance challenges. Topics include:

• How to put privacy legislation in the service of your organization
• Understanding key requirements of recent data privacy regulations
• What are the common threat models that lead to data exposure

Aligning your security model with a strong data privacy policy is necessary to prevent breaches that put customers and employees at risk — and expose your organization to legal action. Register now.

Virtual Conference
SC Media eSummit

Vulnerability Management: Moving your organization from a tactical to a strategic posture

Vulnerability management is a core cybersecurity discipline that encompasses scanning, assessment and prioritization. Scanning for weaknesses is not enough, especially when businesses are expanding their work-from-home populations, adopting cloud-first postures and introduce new technologies. Successful vulnerability management requires a coordinated program, continuously executed, from detection to remediation.

Register for Vulnerability Management: Moving your organization from a tactical to a strategic posture
Vulnerability Management: Moving your organization from a tactical to a strategic posture

Earn up to 6.5 CPE credits by attending this virtual conference.

Vulnerability management is a core cybersecurity discipline that encompasses scanning, assessment and prioritization. Scanning for weaknesses is not enough, especially when businesses are expanding their work-from-home populations, adopting cloud-first postures and introduce new technologies. Successful vulnerability management requires a coordinated program, continuously executed, from detection to remediation.

SC Media will host a two-day virtual event on this important topic from July 20-21. Join our faculty of vulnerability management experts as they share their experience and explore the essentials, including:

• Designing a vulnerability management process from the ground up
• Identifying the tools, resources and processes that work best for your organization
• Setting risk-acceptance criteria

Establishing a vulnerability management program is a key step in your organization’s progress toward its ideal state of cybersecurity. Register now.

Virtual Conference
SC Media eSummit

Advanced Incident Detection: Protecting your business from state-sponsored actors

It doesn’t take much for a hacker to wreak havoc on an organization. Even unsophisticated cybercriminals can readily acquire hacking tools and exploits on the dark web. But the stakes change when threat actors are backed by a government’s resources. Businesses are increasingly a favorite target for state-sponsored threat actors that understand — and aim to exploit — the resource challenges their targets face. To protect your organization from these advanced adversaries, it’s essential to understand how they operate and to adjust your security posture accordingly.

Register for Advanced Incident Detection: Protecting your business from state-sponsored actors
Advanced Incident Detection: Protecting your business from state-sponsored actors

Earn up to 6.5 CPE credits by attending this virtual conference.

It doesn’t take much for a hacker to wreak havoc on an organization. Even unsophisticated cybercriminals can readily acquire hacking tools and exploits on the dark web. But the stakes change when threat actors are backed by a government’s resources.
Businesses are increasingly a favorite target for state-sponsored threat actors that understand — and aim to exploit — the resource challenges their targets face. To protect your organization from these advanced adversaries, it’s essential to understand how they operate and to adjust your security posture accordingly.

Join SC Media from August 10-11 as we host a virtual event that convenes leaders and specialists in combatting state-sponsored attackers. Discussions and presentations will provide insight on how to detect and prevent such threats, including:

• How to integrate security culture into your organization
• Proven methods to clean up tech supply chain
• Tales from the front lines of targeted intrusions

Our Advanced Incident Detection curriculum will give you the perspective you need to position your defenses. Register now.

Virtual Conference
SC Media eSummit

Maintaining Endpoint Security: New opportunities and new risks

Endpoint security has become an area of intense scrutiny and change over the past 12 months as the remote workforce has expanded and concerns over disappearing network perimeters have ramped up. Changing business cultures and cost structures are leading many organizations to view work-from-home and BYOD policies in a new light. But those who aim to lean into such opportunities must undertake a parallel rethink of their cybersecurity implications.

Register for Maintaining Endpoint Security: New opportunities and new risks
Maintaining Endpoint Security: New opportunities and new risks

Earn up to 6.5 CPE credits by attending this virtual conference.

Endpoint security has become an area of intense scrutiny and change over the past 12 months as the remote workforce has expanded and concerns over disappearing network perimeters have ramped up. Changing business cultures and cost structures are leading many organizations to view work-from-home and BYOD policies in a new light. But those who aim to lean into such opportunities must undertake a parallel rethink of their cybersecurity implications.

SC Media’s upcoming virtual event “Maintaining Endpoint Security: New Opportunities and New Risks” is designed to help organizations set a course for secure workforce growth and change following a year of disruption. This two-day event, August 24-25, convenes cybersecurity innovators and practitioners who will share their expertise and experience in addressing critical endpoint security issues, including:

• The problem of data-sharing and how to rein it in
• Determining the endpoint capabilities your organization needs to achieve its goals
• Understanding the top security threats for remote users

Now more than ever, the cybersecurity battle is being fought at the endpoint. Register today.

Virtual Conference
SC Media eSummit

Secure Cloud Migration: Create a plan for flexibility, scalability and automation

Earn up to 6.5 CPE credits by attending this virtual conference. The pandemic-prompted rush to the cloud has made many organizations more technologically nimble but has also increased their attack surfaces. Cybersecurity leaders are being tasked with correcting many known problems along the way — like fixing the proverbial airplane…

Register for Secure Cloud Migration: Create a plan for flexibility, scalability and automation
Secure Cloud Migration: Create a plan for flexibility, scalability and automation

Earn up to 6.5 CPE credits by attending this virtual conference.

The pandemic-prompted rush to the cloud has made many organizations more technologically nimble but has also increased their attack surfaces. Cybersecurity leaders are being tasked with correcting many known problems along the way — like fixing the proverbial airplane midflight. But “cyber leader as mid-air technician” is not a sustainable model. 

IT security leaders need a seat in the cockpit so they can better assess compliance, security, privacy, and cloud-migration risks. This enables cybersecurity executives to create, or update, a cloud security migration plan that best incorporates flexibility, scalability and automation to ensure their organization is on the right path. 

Attend SC Media’s Secure Cloud Migration eSummit, a two-day virtual event on September 14-15, where industry leaders will share their insights and experiences on cloud migration security strategies. Topics covered will include:

  • Enforcing consistent security and policy compliance with cloud solutions
  • Improving security and user experiences across mobile and digital channels
  • Leveraging cloud applications to balance risk management with business objectives and customer experiences

Ensure your cloud migration efforts are on the right flight path, supported by an effective and adaptive cloud security strategy. Register now.

Virtual Conference
SC Media eSummit

Data Breach Response: Preparing for the inevitable security incident

For the security organization, containment is the goal in cyber incident response. Although a one-size-fits all approach does not exist, there are critical steps and dialogue that must take place to contain a data breach. Building a comprehensive plan that activates the right people and tools at the right time helps identify an attack, contain the damage, and eliminate the root cause of the incident.

Register for Data Breach Response: Preparing for the inevitable security incident
Data Breach Response: Preparing for the inevitable security incident

Earn up to 6.5 CPE credits by attending this virtual conference.

For the security organization, containment is the goal in cyber incident response. Although a one-size-fits all approach does not exist, there are critical steps and dialogue that must take place to contain a data breach. Building a comprehensive plan that activates the right people and tools at the right time helps identify an attack, contain the damage, and eliminate the root cause of the incident.

A quick and efficient response leads to a reduction of losses and quickly restored processes and services for an organization. Join SC Media for a two-day virtual conference from September 21-22 as experts on the topic share what optimal management of a cyber incident should look like. Topics include:

• Knowing when to call in a third-party vs. your own staff
• The role that cybersecurity insurance plays in incident response
• Developing a security culture that impacts your containment strategy

Incident response is all about the maturity and culture that’s developed by the security organization. Discover how to implement one that works for you. Register now.

Virtual Conference
SC Media eSummit

Detecting Ransomware: Countermeasures to overcome cybercrime’s biggest threat

Earn up to 6.5 CPE credits by attending this virtual conference. Ransomware revenue for cybercriminals is in the billions of dollars and counting. Equipped with advanced evasion techniques that elude traditional antivirus solutions, this threat is at the top of every cybersecurity professional’s list.  While there’s no silver bullet on…

Register for Detecting Ransomware: Countermeasures to overcome cybercrime’s biggest threat
Detecting Ransomware: Countermeasures to overcome cybercrime’s biggest threat

Earn up to 6.5 CPE credits by attending this virtual conference.

Ransomware revenue for cybercriminals is in the billions of dollars and counting. Equipped with advanced evasion techniques that elude traditional antivirus solutions, this threat is at the top of every cybersecurity professional’s list. 

While there’s no silver bullet on the ransomware detection front, security professionals can employ a multi-pronged approach that includes detection measures focused on networks, endpoints and end users. Join CyberRisk Alliance from September 28-29 for a virtual event that will feature experts ready to share strategies that you can implement right now to detect ransomware in your environment. Topics include: 

  • The role that predictive algorithms play in detecting ransomware
  • How sacrificial network shares can serve as an early warning system
  • The latest exploit kit detection rules that will help detection efforts

Prevent your organization from being locked out. Bolster your knowledge on detection efforts by registering now.

Virtual Conference
SC Media eSummit

Malware Analysis: Taking incident-management to the next level

Malware analysis is an increasingly important tool in an organization’s incident-management toolkit — enabling it to determine the source and potential impact of an intercepted virus, worm or trojan. Malware analysis can also help a target company assess damage and data loss, respond accordingly, and reset defenses going forward.

Register for Malware Analysis: Taking incident-management to the next level

Sponsored by: AttackIQ

Malware Analysis: Taking incident-management to the next level

Earn up to 6.5 CPE credits by attending this virtual conference.

Malware analysis is an increasingly important tool in an organization’s incident-management toolkit — enabling it to determine the source and potential impact of an intercepted virus, worm or trojan. Malware analysis can also help a target company assess damage and data loss, respond accordingly, and reset defenses going forward.

Please join SC Media for a two-day virtual conference — October 5-6 — that will bring you up to speed on a capability of increasing relevance to companies across a broad range of sizes and sectors. Key discussion and presentation topics will include:

  • Proven tools and methodologies that detect and mitigate malware attacks
  • Establishing a malware analysis capability that suits your organization
  • A look over the horizon at tomorrow’s malware threats

To determine if malware analysis has place in your security plan, register now.

Virtual Conference
SC Media eSummit

Zero Trust: Protect assets within and beyond your network perimeter

Earn up to 6.5 CPE credits by attending this virtual conference. Recent market forces are driving cybersecurity leaders to give zero trust strategies a closer look. Cloud migrations are accelerating.  Organizations are embracing remote or hybrid work environments. Employees continue to use their own devices for business. And supply chain…

Register for Zero Trust: Protect assets within and beyond your network perimeter
Zero Trust: Protect assets within and beyond your network perimeter

Earn up to 6.5 CPE credits by attending this virtual conference.

Recent market forces are driving cybersecurity leaders to give zero trust strategies a closer look. Cloud migrations are accelerating.  Organizations are embracing remote or hybrid work environments. Employees continue to use their own devices for business. And supply chain partners, as the recent SolarWinds attack demonstrated, are becoming much more digitally entangled. These trends all have one thing in common – they expose organizations to more risk beyond traditional network perimeters.

Zero trust aims to help enterprises improve their overall security posture by providing protection within and beyond such boundaries — requiring authentication and continuous validation of all users and devices, inside and outside the firewall, before permitting access to applications and data.

Join SC Media’s Zero Trust eSummit on October 12-13, to learn more about this cybersecurity model and assess whether it’s right for your organization. Practitioners and experts will share their experiences and insights on how to:

  • Minimize your attack surface
  • Adapt to the distributed nature of users and data
  • Improve visibility into assets you’re protecting

Advance your cybersecurity efforts and protect your assets on both sides of the firewall. Register now.

Virtual Conference
SC Media eSummit

Cybersecurity Training and Awareness

Earn up to 6.5 CPE credits by attending this virtual conference. The need for all-hands, no-exceptions cybersecurity training and awareness is beyond dispute. But what does a successful cybersecurity training and awareness program look like today? SC Media will host a two-day event focused on this topic on Nov.

Register for Cybersecurity Training and Awareness
Cybersecurity Training and Awareness

Earn up to 6.5 CPE credits by attending this virtual conference.

The need for all-hands, no-exceptions cybersecurity training and awareness is beyond dispute. But what does a successful cybersecurity training and awareness program look like today?

SC Media will host a two-day event focused on this topic on Nov. 16-17 to help cybersecurity professionals design and implement the awareness and training program that’s right for their organization — its culture, counterparties, and employee community.

This interactive learning program will feature experts on security awareness program development and technologies who will discuss the discipline’s state of the art and lead a deep dive on topics including:

  • Knowing the strengths and weaknesses of your workforce and turning them to your advantage
  • Building security into the fabric of your culture
  • Understanding the threat of business email compromise and why it persists

To gain knowledge and perspective that will help you build cybersecurity buy-in from your company’s entry level to its C-suite, register now.

Virtual Conference
SC Media eSummit

Cloud Shared Responsibility: Who’s accountable for cloud security?

Earn up to 6.5 CPE credits by attending this virtual conference.  In a cloud environment, you can’t simply hand the keys to a cloud service provider and walk away. Companies like Amazon Web Services (AWS) and Microsoft Azure operate in a shared responsibility model, which means your cyber team still has cloud security responsibilities. However, it’s not…

Register for Cloud Shared Responsibility: Who’s accountable for cloud security?
Cloud Shared Responsibility: Who’s accountable for cloud security?

Earn up to 6.5 CPE credits by attending this virtual conference. 

In a cloud environment, you can’t simply hand the keys to a cloud service provider and walk away. Companies like Amazon Web Services (AWS) and Microsoft Azure operate in a shared responsibility model, which means your cyber team still has cloud security responsibilities. However, it’s not always clear what they are, as responsibilities can vary among service providers (e.g., AWS doesn’t claim the same exact security responsibilities as Azure). Plus, depending on the type of deployment (IaaS, PaaS, or SaaS), these responsibilities can change.

To minimize vulnerabilities across your stack and from there to connected systems, it’s essential to understand where the CSP’s responsibilities start and end.

Join SC Media at its Cloud Shared Responsibility eSummit, a two-day virtual event (November 30 to December 1), where leading industry experts will address: 

  • What security measures to expect from your cloud service provider 
  • What cloud security responsibilities are required of your cyber team 
  • Strategies to keep your integrated cloud security efforts on track 

Learn how to best protect your cloud investment. Register now. 

Virtual Conference
SC Media eSummit

Threat Intelligence: Shift from a reactive to a proactive cybersecurity strategy

Earn up to 6.5 CPE credits by attending this virtual conference. The volume, velocity and variety of threat alerts threaten to overwhelm many organizations’ cybersecurity defenses. Without knowing the severity of each warning, analysts and security operations teams often waste time chasing false alarms and, as a result, miss real…

Register for Threat Intelligence: Shift from a reactive to a proactive cybersecurity strategy
Threat Intelligence: Shift from a reactive to a proactive cybersecurity strategy

Earn up to 6.5 CPE credits by attending this virtual conference.

The volume, velocity and variety of threat alerts threaten to overwhelm many organizations’ cybersecurity defenses. Without knowing the severity of each warning, analysts and security operations teams often waste time chasing false alarms and, as a result, miss real and significant threats.

This is where an effective threat intelligence strategy can help — gathering information from a variety of sources to provide security teams with evidence-based knowledge, including context, implications, and advice about remediation. A strong approach to threat intelligence enables a cybersecurity team to proactively target the threats that matter most.

Join SC Media and select industry professionals at the Threat Intelligence eSummit on December 7 – 8, where they will help analysts and security operations teams:

  • Gain visibility into existing and emerging threats
  • Minimize risk of information loss and associated costs
  • Improve efficiency and effectiveness of incident response efforts

Register today to see how an effective threat intelligence strategy can minimize disruptions to your business operations.

Virtual Conference
SC Media eSummit

Cybersecurity for Financial Services

Register for Cybersecurity for Financial Services
Cybersecurity for Financial Services