Securing Accelerated Transformation

Aggregating, Analyzing, and Modeling
Critical Enterprise Data

Thursday, June 11th
@ 11am PST / 1pm CST
West

Thursday, June 11th
@ 11am PST / 1pm CST
West

About the Program

Securing Accelerated Transformation: Aggregating, Analyzing, and Modeling Critical Enterprise Data is an invitation-only virtual event featuring an expert panel and open room discussion.

This event is limited to 30 information security architects, engineers, and leaders from major industries who will convene over three goals:

  • Learn from insightful conversations led by our moderated panel
  • Participate in interactive breakout room video discussions
  • Build meaningful new connections with a group of like-minded peers

About the Content

Enterprises at any stage of their digital transformation journey have seen COVID-19 accelerate the pace of change and add urgent projects to the initiative. New complications have been introduced along the way—abrupt shifts in security architectures and policies, rapid new tool adoption, heavy reliance on the cloud, and a remote workforce signing in from a surplus of new devices.

Enterprise teams employ an average of 57.1 security tools (Censuswide) to protect these siloed, complex and hybrid-cloud systems. The ability to aggregate, centralize and model these rich sets of data is critical to the success of accelerated transformation initiatives.

As such, security leaders need to make top priorities of gaining big-picture visibility and control over their increasingly complex internal workflows. Only with this perspective can they implement the clear, automated processes needed to find and close the growing number of vulnerabilities, minimize compliance risk and tighten overall security efficacy.

Discussion Topics

  • The importance of multi-source aggregation of data sets and contextual analysis for modeling across disparate network elements – including on-prem IT, OT, cloud and virtual networks
  • Maintaining control, compliance and visibility of an expanding attack surface, newly connected devices, and rapidly adopted cloud technologies
  • Employing analytics to find process disconnects and uncover blind spots
  • Using internal and external threat contexts in continuous vulnerability assessment
  • Identifying, finding, and connecting data points across the enterprise to allow efficient prioritization of threats

Moderator

Peter Margaris
Senior Director, Product Marketing
Skybox Security

Panelists

Paul Brager
Director, Global OT Security Programs
Baker Hughes
Boyan Vukichevich
Director, Application Development
J.B. Poindexter & Co., Inc.

Event Details

Date

Thursday, June 11th, 2020

Time

11am PST / 1pm CST

Attendee Profile

30 information security architects, engineers, and leaders

Agenda

11:00AM     Attendees Enter Virtual Event & Welcome Remarks

11:05AM     Video Networking in Breakout Rooms

11:15AM     Panel Discussion

11:55AM     Audience Q&A

12:10PM     Breakout Networking Sessions

11:00AM     

Attendees Enter Virtual Event

& Welcome Remarks

11:05AM     

Video Networking in Breakout Rooms

11:15AM     

Panel Discussion

11:55AM     

Audience Q&A

12:10PM     

Breakout Networking Sessions

Sponsor

At Skybox Security, we provide you with cybersecurity management solutions to help your business innovate rapidly and with confidence. We get to the root of cybersecurity issues, giving you better visibility, context and automation across a variety of use cases. By integrating data, delivering new insights and unifying processes, you’re able to control security without restricting business agility. Skybox’s comprehensive solution unites different security perspectives into the big picture, minimizes risk and empowers security programs to move to the next level. With obstacles and complexities removed, you can stay informed, work smarter and drive your business forward, faster. For more information, visit www.skyboxsecurity.com.

Organizer

BDILogoFinal

Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only, thought leadership driven, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.

The Adobe family of companies would like to keep you informed with personalized emails about products and services. See our Privacy Policy for more details.

Please contact me via email.

By clicking “Submit” I agree that I have read and accepted the Terms of Use.

adobe.comadobe.com
Adobe Privacy Center
Adobe Privacy Policy

adobe.comadobe.com
Adobe marketing and advertising practices I Adobe
Adobe marketing and advertising practices

adobe.comadobe.com
Adobe Privacy Center
Adobe Privacy Policy

adobe.comadobe.com
Legal
Legal Terms of Use for Adobe products & services