The adoption of the Secure Access Service Edge, or SASE, model is being driven by numerous factors, including the need to bring down administrative costs and to effectively manage network security, according to a panel of experts who offer implementation advice.
The threat landscape has changed tremendously. What are the major threats impacting enterprises globally? What are some significant changes and challenges cybersecurity leaders face? IS it good to depend on AI and ML for every problem?
This session will discuss:
How to evaluate a good feed
How to set the right...
Speakers:
Daminda Kumara, Head of Cybersecurity and Risk, West Farmers Industrial and Safety
Daniel Pludek, Global CTO, Kip McGrath
Amit Chaubey, Head of Security Risk, Governance and Compliance, Ausgrid
A major Australian broadcaster recently was hit by ransomware – just the latest strike against...
New technologies have been a boon to all industries specifically in cost and efficiency optimization. Organizations have been incorporating new tech over the years. While the CISOs have been busy managing and securing IT assets, this new tech is slipping in unnoticed. Today an organization's infrastructure not only...
Many businesses are implementing software security solutions. But as hackers get more sophisticated, threats are attacking the hardware layer. Hardware-based security features built-in to the hardware provide an important layer of protection for business devices, applications, and data. The Intel vPro® platform...
The IoXT Alliance is an industry group that has come together to help solve three major challenges for connected devices: Security, Upgradability and Transparency. In this exclusive session, Brad Ree, CTO of the Alliance, shares insights on:
The state of connected device security
Where the cybersecurity needle is...
Scientist, educator, government official. Kevin Fu is a pioneer in the battle to achieve medical device cybersecurity, and he has played multiple roles. From his current position within the FDA, Fu discusses the state of medical device security, including:
Archaic engineering principals
Threat modeling
Education...
From baby monitors to printers to tablets and automobiles, home branch offices are loaded with smart devices that share two common traits: They are internet connected, and they are hackable.
Join this expert panel for a discussion about understanding and remediating the risks from connected devices,...
By 2025, researchers predict that we will have 41.6 billion connected devices in play. That’s a lot of real estate to protect. In this session, veteran cybersecurity expert Diana Kelley examines the risk inherent in these vulnerable devices, and she shares her vision of how to secure them via seven principles of an...
IoT technologies that are carefully aligned with business use cases enable process optimization, enhanced product offerings, and can transform customer and employee experiences. However, use of IoT technologies leads to heightened risk for the organization. However, many orgs continue to struggle with immature...
There is a growing demand for public cloud services as most enterprises embrace the cloud's opportunities. But there is no denying that moving to the cloud comes at a cost-increasing attack surface for every organization. Though the ever-increasing breaches of data storage services have resulted in cloud security...
Today, cybersecurity risk is siloed throughout a health system with disparate data across different teams using manual processes and non-integrated tools. This approach clearly isn't working. To significantly reduce the occurrence of risks or the impact of an incident, it's time that we, as health system leaders and...
HHS OCR issued a record number of HIPAA settlements in 2020 in cases involving patient “right of access” violations. Meanwhile, compliance with HHS’ health IT interoperability and information blocking regulations – which include provisions for providing patients secure access to their health information via...
After the SolarWinds attack, how can an entity ever trust that any vendor’s security incident won’t become their own next crisis? Healthcare sector entities in particular deal with a complex digital supply chain that range from critical IT vendors to suppliers of life-saving network-connected patient gear, and all...
As analysts say, after feeling so defenseless in the face of calamity, enterprises are moving to an adaptive era. With the distributed workforce will come the inevitable discomfort of potentially exposing organizations to cyberattacks if the right precautions are not taken to adapt to this new phenomenon.
Should...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.