IT Security Virtual Conferences | SC Media

Virtual Conferences

UPCOMING VIRTUAL CONFERENCES

Virtual Conference

Are You Ready for Zero Trust? Securing your network by verifying and validating everything

Since its introduction nearly a decade ago, the zero-trust security model has gradually made its way into cybersecurity’s mainstream. Zero trust’s opportunity — the increasing desire for silo-free, agile operating environments — also represents the biggest obstacle to its successful adoption: How does an organization enable free and open interaction while ratcheting up validation and verification to an absolute degree?

Register for Are You Ready for Zero Trust? Securing your network by verifying and validating everything

Sponsored by: A10 Networks, CloudFlare, Fortinet, Illumio

Are You Ready for Zero Trust? Securing your network by verifying and validating everything

Since its introduction nearly a decade ago, the zero-trust security model has gradually made its way into cybersecurity’s mainstream. Zero trust’s opportunity — the increasing desire for silo-free, agile operating environments — also represents the biggest obstacle to its successful adoption: How does an organization enable free and open interaction while ratcheting up validation and verification to an absolute degree?

Zero-trust security mandates authentication and continuous validation of all users, whether outside or inside an enterprise network, for them to receive and maintain access to applications and data. To ensure this level of security, zero trust leans heavily on core security disciplines such as multifactor authentication, identity and access management, and endpoint security technology.

To learn more about zero trust and to understand whether it’s right for your organization, we invite you to attend SC Media’s virtual conference “Are You Ready for Zero Trust?” on March 9. At this event, top experts on the subject will provide perspective on key topics including:

• Organizational attributes likely to lead to successful adoption of zero trust
• Avoiding common pitfalls tied to implementation
• The role of an IT audit in the zero-trust adoption cycle

Discover whether adopting a zero trust model is the right next step in your organization’s cybersecurity evolution. Register now.

Virtual Conference

Secure Cloud Series: DevSecOps in High-Velocity Environments

Scale and speed are two words that aren’t typically synonymous with cybersecurity, but that’s all changing. As organizations continue to expand their digital capabilities and reach — harnessing cloud technology’s power along the way — they’re increasingly embracing DevSecOps — an approach in which development, security and operations work together, in a fully integrated process from kick-off to delivery.

Register for Secure Cloud Series: DevSecOps in High-Velocity Environments

Sponsored by: Cobalt, FireMon, Gigamon, Okta

Secure Cloud Series: DevSecOps in High-Velocity Environments

Scale and speed are two words that aren’t typically synonymous with cybersecurity, but that’s all changing. As organizations continue to expand their digital capabilities and reach — harnessing cloud technology’s power along the way — they’re increasingly embracing DevSecOps — an approach in which development, security and operations work together, in a fully integrated process from kick-off to delivery.

At the heart of DevSecOps is an assumption that optimal security is built in, rather than applied as a ring fence around applications and data. Reaching an ideal state of fast, efficient, and secure development, requires shifting security left and out of its customary position at the end of a waterfall process.

To bring you up to speed, SC Media is hosting a new virtual conference focused on DevSecOps for the Cloud. Scheduled from March 23-25, it will provide instruction and insights on key topics, including: 

  • How to establish a comprehensive DevSecOps program
  • Integrating your security team within a DevSecOps framework
  • Understanding DevSecOps implications for application security implications, asset management and more

To keep your business on the cutting edge of development — and security — register now.

Virtual Conference

Ransomware: Critical components of an incident response playbook and more

Primarily thanks to ransomware, hackers have been on a winning streak in the war for cybersecurity.. Early detection matters, of course. But responding once an attack has taken root is just as critical. To help contain attacks and limit their impact, it’s essential to establish a ransomware readiness plan that strikes the right balance of people, process and technology resources. Responsibility assignment, team training, simulation exercises – all have roles to play.

Register for Ransomware: Critical components of an incident response playbook and more

Sponsored by: Cybereason, DarkTrace, Gigamon, KnowBe4, Sophos

Ransomware: Critical components of an incident response playbook and more

Primarily thanks to ransomware, hackers have been on a winning streak in the war for cybersecurity.. Early detection matters, of course. But responding once an attack has taken root is just as critical. To help contain attacks and limit their impact, it’s essential to establish a ransomware readiness plan that strikes the right balance of people, process and technology resources. Responsibility assignment, team training, simulation exercises — all have roles to play.

Join SC Media for a two-day eSummit from April 13-14, to learn from industry leaders as they share insights on adopting an effective response strategy. Topics include:

  • Developing a ransomware incident response playbook
  • An update on new ransomware strains found in the wild
  • The role “human firewalls” can play in your defensive toolkit

As ransomware evolves, so should your approach. Detecting a ransomware attack requires prompt action. Start preparing now and register today.

Virtual Conference

Threat intelligence: Building a program that turns data into action

Shifting your security focus to the risks that matter most requires intelligence. But even organizations with access to threat intelligence can find themselves challenged when it comes to leveraging that data effectively and consistently. Join SC Media for a two-day eSummit from April 20-21 focused on building a threat intelligence program that fits your organization’s needs. This strategic learning opportunity is designed to help both organizations that are considering standing up a threat intelligence practice as well as those that may have struggled with implementation.

Register for Threat intelligence: Building a program that turns data into action

Sponsored by: Anomali, AttackIQ, DarkTrace, Intel471, Recorded Future, Sophos

Threat intelligence: Building a program that turns data into action

Shifting your security focus to the risks that matter most requires intelligence. But even organizations with access to threat intelligence can find themselves challenged when it comes to leveraging that data effectively and consistently.

Join SC Media for a two-day eSummit from April 20-21 focused on building a threat intelligence program that fits your organization’s needs. This strategic learning opportunity is designed to help both organizations that are considering standing up a threat intelligence practice as well as those that may have struggled with implementation. Experienced threat intel professionals will dive deep on topics that include:

  • How threat intelligence programs can shift a security team from a reactive to a predictive stance.
  • Why efficiency immediately increases for security teams once programs are implemented.
  • How organizations find strength in numbers through collaborative threat programs.

Positioning your organization to foresee potential threats can have a profound impact on risk reduction. Join us to discover how to turn threat data into action. Register now.

Virtual Conference

Cybersecurity for your Supply Chain: Overcoming the interconnected threats impacting businesses

Today’s supply chains are as much about the flow of information as they are about goods and services. Managing their associated security risk is a complex and critical task that touches on multiple functions within and outside the enterprise.

Register for Cybersecurity for your Supply Chain: Overcoming the interconnected threats impacting businesses
Cybersecurity for your Supply Chain: Overcoming the interconnected threats impacting businesses

Today’s supply chains are as much about the flow of information as they are about goods and services. Managing their associated security risk is a complex and critical task that touches on multiple functions within and outside the enterprise.

Cybersecurity in the supply chain spans the full breadth of your organization’s ecosystem: sourcing, vendor management, business continuity and quality control, physical security and more. To help organizations get their arms around this challenge, SC Media is hosting a two-day virtual conference focused on assessing exposures and charting a path forward. Discussions and presentations will include:

  • Establishing an enterprise risk assessment process.
  • Verifying supplier practices and procedures
  • Integrating threat intelligence approaches

A secure organization is only as strong as its weakest link. Learn about the scalable and repeatable processes that keep your counterparties and suppliers in line with your risk management vision. Register now.

Virtual Conference

Enterprise Data Security: Scaling data protection beyond discovery and classification

Enterprises today face tremendous data-security challenges: Datasets are growing and diversifying; privacy regulations are reaching farther and gaining complexity; the attack surface is expanding. It’s not just about data loss. The exposure of customer data has quickly become a central area of concern for security departments, as well as board members.

Register for Enterprise Data Security: Scaling data protection beyond discovery and classification
Enterprise Data Security: Scaling data protection beyond discovery and classification

Enterprises today face tremendous data-security challenges: Datasets are growing and diversifying; privacy regulations are reaching farther and gaining complexity; the attack surface is expanding. It’s not just about data loss. The exposure of customer data has quickly become a central area of concern for security departments, as well as board members.

Changing data regulations coupled with increased consumer awareness have made data privacy and protection a constant and continuous project for security organizations. Security professionals today must scrutinize every practice within the business to implement a scalable data protection strategy that expands beyond traditional data discovery and classification.

In this upcoming two-day virtual event, SC Media brings together leading data security experts who will unpack the challenges today’s enterprises face on topics that include:

  • Updates to data privacy regulations that are in progress
  • Tools and strategies to help manage data protection
  • How to remain compliant in cloud environments

Discover new strategic approaches and technologies that will allow you to scale data security within your business. Register now.

Virtual Conference

Accelerate 2021: Enabling business innovation through security

Achieving your organization’s future vision requires re-envisioning cybersecurity as a growth enabler. What do design, development and planning look like when information security comes to the table early and stays there for the duration? Forward-thinking C-level executives no longer see cybersecurity as a check on their ambitions but instead embrace it as a driver of innovation, competitiveness and growth. CyberRisk Alliance’s Accelerate 2021 – a new flagship virtual conference – will focus on Enabling Business Innovation Through Security.

Register for Accelerate 2021: Enabling business innovation through security

Sponsored by: Gigamon, KnowBe4

Accelerate 2021: Enabling business innovation through security

Achieving your organization’s future vision requires re-envisioning cybersecurity as a growth enabler. What do design, development and planning look like when information security comes to the table early and stays there for the duration?

Forward-thinking C-level executives no longer see cybersecurity as a check on their ambitions but instead embrace it as a driver of innovation, competitiveness and growth. CyberRisk Alliance’s Accelerate 2021 – a new flagship virtual conference – will focus on Enabling Business Innovation Through Security.

As operations, processes, and business functions are re-engineered into a single digital operating model, information security is introduced early on and staying throughout the process. Accelerate 2021 will bring together a community of experts and thinkers that have created a culture of innovation and trust within their organizations.

Throughout this virtual two-day, multi-track event, security professionals will access informative discussions and guidance to propel them to inspire change within their businesses. From supporting agility and streamlining operations to improving data management, attendees will tap into concepts that allow them to achieve growth through cybersecurity management.

It’s time to position yourself for success to thrive in the digital age. Register now.

Virtual Conference

Integrating Application Security: Reengineering AppSec as a business catalyst

Here’s the challenge: Web applications are progressively extending the range of critical business operations they support. But software development for cloud-native environments requires continuous security oversight. Against this backdrop, cybersecurity leaders and strategists must strike a balance between accelerating a business’s go-to-market and safeguarding the applications that fuel its growth and productivity.

Register for Integrating Application Security: Reengineering AppSec as a business catalyst
Integrating Application Security: Reengineering AppSec as a business catalyst

Here’s the challenge: Web applications are progressively extending the range of critical business operations they support. But software development for cloud-native environments requires continuous security oversight. Against this backdrop, cybersecurity leaders and strategists must strike a balance between accelerating a business’s go-to-market and safeguarding the applications that fuel its growth and productivity.

Producing quality code quickly and securely is always the goal. But efforts to integrate security into the software development cycle is more often perceived as a roadblock than a catalyst. Join SC Media for a two-day virtual event from June 22-23 to hear from top experts in a series of discussions and presentations focused on application security. Topics include:

• How to map application security requirements to compliance frameworks
• Embracing and extending DevSecOps principles
• Standardizing application security policies within business lines

Discover how modern application security programs can operate at the speed and scale that’s required to empower, not deter, the business. Register now.

Virtual Conference

Identity and Access Management: Rethinking your organization’s approach to insider threats

Insider threats are among the most difficult cyber risks to detect and prevent — and getting identity and access management (IAM) right is an essential step in keeping them at bay. The shift by many organizations to predominantly remote workforces has compounded the issue, with larger organizations especially vulnerable as the number of entry points to their networks has increased.

Register for Identity and Access Management: Rethinking your organization’s approach to insider threats
Identity and Access Management: Rethinking your organization’s approach to insider threats

Insider threats are among the most difficult cyber risks to detect and prevent — and getting identity and access management (IAM) right is an essential step in keeping them at bay. The shift by many organizations to predominantly remote workforces has compounded the issue, with larger organizations especially vulnerable as the number of entry points to their networks has increased.

From strong authentication protocols to behavior monitoring capabilities, next-generation identity and access management solutions are showing the way forward. An effective IAM approach will enable security organizations to separate signal from noise — managing and resolving a broad range of exceptions and system-admin failures. It also must fit your organization’s culture and operating model. On June 29-30, SC Media will convene an all-star team of identity security experts to discuss the role of IAM in Rethinking Your Organization’s Approach to Insider Threats. Topics will include:, including:

  • The fundamentals of Identity and Access Management
  • Tools and software that help combat insider threats
  • Why insider threats aren’t just tied to malicious employees

Register today for a fresh look at your organization’s approach to IAM, and its exposure to insider risk.

Virtual Conference

Data Privacy: Addressing today’s compliance demands

As legal and regulatory data protection frameworks have proliferated, it’s harder for organizations — of all sizes — to define and maintain a safe zone in which management and administration of sensitive data meets both business and government requirements. While some jurisdictions are clear, others are fuzzy; and the rules themselves are moving targets. Increased reliance on multi-cloud environments — in which sensitive data is more dispersed — raises the bar higher.

Register for Data Privacy: Addressing today’s compliance demands
Data Privacy: Addressing today’s compliance demands

As legal and regulatory data protection frameworks have proliferated, it’s harder for organizations — of all sizes — to define and maintain a safe zone in which management and administration of sensitive data meets both business and government requirements. While some jurisdictions are clear, others are fuzzy; and the rules themselves are moving targets. Increased reliance on multi-cloud environments — in which sensitive data is more dispersed — raises the bar higher.

Join SC Media for a two-day virtual event from July 13-14 as a collection of security experts share advice on level-setting your data-privacy and security posture, and overcoming compliance challenges. Topics include:

• How to put privacy legislation in the service of your organization
• Understanding key requirements of recent data privacy regulations
• What are the common threat models that lead to data exposure

Aligning your security model with a strong data privacy policy is necessary to prevent breaches that put customers and employees at risk — and expose your organization to legal action. Register now.

Virtual Conference

Vulnerability Management: Moving your organization from a tactical to a strategic posture

Vulnerability management is a core cybersecurity discipline that encompasses scanning, assessment and prioritization. Scanning for weaknesses is not enough, especially when businesses are expanding their work-from-home populations, adopting cloud-first postures and introduce new technologies. Successful vulnerability management requires a coordinated program, continuously executed, from detection to remediation.

Register for Vulnerability Management: Moving your organization from a tactical to a strategic posture
Vulnerability Management: Moving your organization from a tactical to a strategic posture

Vulnerability management is a core cybersecurity discipline that encompasses scanning, assessment and prioritization. Scanning for weaknesses is not enough, especially when businesses are expanding their work-from-home populations, adopting cloud-first postures and introduce new technologies. Successful vulnerability management requires a coordinated program, continuously executed, from detection to remediation.

SC Media will host a two-day virtual event on this important topic from July 20-21. Join our faculty of vulnerability management experts as they share their experienceand explore the essentials, including:

• Designing a vulnerability management process from the ground up
• Identifying the tools, resources and processes that work best for your organization
• Setting risk-acceptance criteria

Establishing a vulnerability management program is a key step in your organization’s progress toward its ideal state of cybersecurity. Register now.

Virtual Conference

Advanced incident detection: Protecting your business from state-sponsored actors

It doesn’t take much for a hacker to wreak havoc on an organization. Even unsophisticated cybercriminals can readily acquire hacking tools and exploits on the dark web. But the stakes change when threat actors are backed by a government’s resources.Businesses are increasingly a favorite target for state-sponsored threat actors that understand — and aim to exploit — the resource challenges their targets face. To protect your organization from these advanced adversaries, it’s essential to understand how they operate and to adjust your security posture accordingly.

Register for Advanced incident detection: Protecting your business from state-sponsored actors
Advanced incident detection: Protecting your business from state-sponsored actors

It doesn’t take much for a hacker to wreak havoc on an organization. Even unsophisticated cybercriminals can readily acquire hacking tools and exploits on the dark web. But the stakes change when threat actors are backed by a government’s resources.
Businesses are increasingly a favorite target for state-sponsored threat actors that understand — and aim to exploit — the resource challenges their targets face. To protect your organization from these advanced adversaries, it’s essential to understand how they operate and to adjust your security posture accordingly.

Join SC Media from August 11-12 as we host a virtual event that convenes leaders and specialists in combatting state-sponsored attackers. Discussions and presentations will provide insight on how to detect and prevent such threats, including:

• How to integrate security culture into your organization
• Proven methods to clean up tech supply chain
• Tales from the front lines of targeted intrusions

Our Advanced Incident Detection curriculum will give you the perspective you need to position your defenses. Register now.

Virtual Conference

Maintaining endpoint security: New opportunities and new risks

Endpoint security has become an area of intense scrutiny and change over the past 12 months as the remote workforce has expanded and concerns over disappearing network perimeters have ramped up. Changing business cultures and cost structures are leading many organizations to view work-from-home and BYOD policies in a new light. But those who aim to lean into such opportunities must undertake a parallel rethink of their cybersecurity implications.

Register for Maintaining endpoint security: New opportunities and new risks
Maintaining endpoint security: New opportunities and new risks

Endpoint security has become an area of intense scrutiny and change over the past 12 months as the remote workforce has expanded and concerns over disappearing network perimeters have ramped up. Changing business cultures and cost structures are leading many organizations to view work-from-home and BYOD policies in a new light. But those who aim to lean into such opportunities must undertake a parallel rethink of their cybersecurity implications.

SC Media’s upcoming virtual event “Maintaining Endpoint Security: New Opportunities and New Risks” is designed to help organizations set a course for secure workforce growth and change following a year of disruption. This two-day event, August 25-26, convenes cybersecurity innovators and practitioners who will share their expertise and experience in addressing critical endpoint security issues, including:

• The problem of data-sharing and how to rein it in
• Determining the endpoint capabilities your organization needs to achieve its goals
• Understanding the top security threats for remote users

Now more than ever, the cybersecurity battle is being fought at the endpoint. Register today.

Virtual Conference

Multi-cloud security: Confronting the expanding dilemma of cloud architecture

As more organizations embrace multi-cloud strategies, the architecture of choice has increasingly become a private / public hybrid. While such solutions offer flexibility and scalability — and support innovation — they bring complexity to IT security — including new challenges in authentication, data governance and security visibility, and a new requirements for the skills to address these issues.

Register for Multi-cloud security: Confronting the expanding dilemma of cloud architecture

Sponsored by: AttackIQ, FireMon

Multi-cloud security: Confronting the expanding dilemma of cloud architecture

As more organizations embrace multi-cloud strategies, the architecture of choice has increasingly become a private / public hybrid. While such solutions offer flexibility and scalability — and support innovation — they bring complexity to IT security — including new challenges in authentication, data governance and security visibility, and a new requirements for the skills to address these issues.

Join SC Media on Sept. 14-15 for a two-day virtual conference that brings together industry leaders who will share their insights and experiences on the fast-changing world of cloud security. Topics covered will include:

•Determining whether native or third-party security solutions are the right approach for your environment
• Key compliance challenges you can expect and how to handle them
• What an effective defense looks like in a hybrid cloud environment

To evaluate the implications of your cloud architecture, register now.

Virtual Conference

Data Breach Response: Preparing for the inevitable security incident

For the security organization, containment is the goal in cyber incident response. Although a one-size-fits all approach does not exist, there are critical steps and dialogue that must take place to contain a data breach. Building a comprehensive plan that activates the right people and tools at the right time helps identify an attack, contain the damage, and eliminate the root cause of the incident.

Register for Data Breach Response: Preparing for the inevitable security incident
Data Breach Response: Preparing for the inevitable security incident

For the security organization, containment is the goal in cyber incident response. Although a one-size-fits all approach does not exist, there are critical steps and dialogue that must take place to contain a data breach. Building a comprehensive plan that activates the right people and tools at the right time helps identify an attack, contain the damage, and eliminate the root cause of the incident.

A quick and efficient response leads to a reduction of losses and quickly restored processes and services for an organization. Join SC Media for a two-day virtual conference from September 21-22 as experts on the topic share what optimal management of a cyber incident should look like. Topics include:

• Knowing when to call in a third-party vs. your own staff
• The role that cybersecurity insurance plays in incident response
• Developing a security culture that impacts your containment strategy

Incident response is all about the maturity and culture that’s developed by the security organization. Discover how to implement one that works for you. Register now.

Virtual Conference

Malware analysis: Taking incident-management to the next level

Malware analysis is an increasingly important tool in an organization’s incident-management toolkit — enabling it to determine the source and potential impact of an intercepted virus, worm or trojan. Malware analysis can also help a target company assess damage and data loss, respond accordingly, and reset defenses going forward.

Register for Malware analysis: Taking incident-management to the next level

Sponsored by: AttackIQ

Malware analysis: Taking incident-management to the next level

Malware analysis is an increasingly important tool in an organization’s incident-management toolkit — enabling it to determine the source and potential impact of an intercepted virus, worm or trojan. Malware analysis can also help a target company assess damage and data loss, respond accordingly, and reset defenses going forward.

Please join SC Media for a two-day virtual conference — Oct. 5-6 — that will bring you up to speed on a capability of increasing relevance to companies across a broad range of sizes and sectors. Key discussion and presentation topics will include:

  • Proven tools and methodologies that detect and mitigate malware attacks
  • Establishing a malware analysis capability that suits your organization
  • A look over the horizon at tomorrow’s malware threats

To determine if malware analysis has place in your security plan, register now.

Virtual Conference

Detecting ransomware: Countermeasures to overcome cybercrime’s biggest threat

Ransomware revenue for cybercriminals is in the billions of dollars… and counting. Equipped with advanced evasion techniques that elude traditional antivirus solutions, this threat is at the top of every cybersecurity professional’s list. While there’s no silver bullet on the ransomware detection front, but security professionals can employ a multi-pronged…

Register for Detecting ransomware: Countermeasures to overcome cybercrime’s biggest threat
Detecting ransomware: Countermeasures to overcome cybercrime’s biggest threat

Ransomware revenue for cybercriminals is in the billions of dollars… and counting. Equipped with advanced evasion techniques that elude traditional antivirus solutions, this threat is at the top of every cybersecurity professional’s list.

While there’s no silver bullet on the ransomware detection front, but security professionals can employ a multi-pronged approach that includes detection measures focused on networks, endpoints, but involve the workforce. Join CyberRisk Alliance from November 9-10 for a virtual event that will feature experts ready to share quick wins that you can implement right now to detect ransomware in your environment. Topics include:

  • The role that predictive algorithms play in detecting ransomware
  • How sacrificial network shares can serve as an early warning system
  • The latest exploit kit detection rules that will help detection efforts

Prevent your organization from being locked out. Bolster your knowledge on detection efforts by registering now.