Securing Accelerated Transformation
Aggregating, Analyzing, and Modeling
Critical Enterprise Data
Thursday, June 25th
@ 12:00 - 1:30 pm EST
Northeast
Thursday, June 25th
@ 12:00 - 1:30 pm EST
Northeast
About the Program
Securing Accelerated Transformation: Aggregating, Analyzing, and Modeling Critical Enterprise Data is an invitation-only virtual event featuring an expert panel and open room discussion.
This event is limited to 30 information security architects, engineers, and leaders from major industries who will convene over three goals:
- Learn from insightful conversations led by our moderated panel
- Participate in interactive breakout room video discussions
- Build meaningful new connections with a group of like-minded peers
About the Content
Enterprises at any stage of their digital transformation journey have seen COVID-19 accelerate the pace of change and add urgent projects to the initiative. New complications have been introduced along the way—abrupt shifts in security architectures and policies, rapid new tool adoption, heavy reliance on the cloud, and a remote workforce signing in from a surplus of new devices.
Enterprise teams employ an average of 57.1 security tools (Censuswide) to protect these siloed, complex and hybrid-cloud systems. The ability to aggregate, centralize and model these rich sets of data is critical to the success of accelerated transformation initiatives.
As such, security leaders need to make top priorities of gaining big-picture visibility and control over their increasingly complex internal workflows. Only with this perspective can they implement the clear, automated processes needed to find and close the growing number of vulnerabilities, minimize compliance risk and tighten overall security efficacy.
Discussion Topics
- The importance of multi-source aggregation of data sets and contextual analysis for modeling across disparate network elements – including on-prem IT, OT, cloud and virtual networks
- Maintaining control, compliance and visibility of an expanding attack surface, newly connected devices, and rapidly adopted cloud technologies
- Employing analytics to find process disconnects and uncover blind spots
- Using internal and external threat contexts in continuous vulnerability assessment
- Identifying, finding, and connecting data points across the enterprise to allow efficient prioritization of threats
Moderator
Skybox Security
Event Details
Date
Thursday, June 25th, 2020
Time
12:00 pm – 1:30 pm EST
Attendee Profile
30 information security architects, engineers, and leaders
Agenda
12:00PM Attendees Enter Virtual Event & Welcome Remarks
12:05PM Video Networking in Breakout Rooms
12:15PM Panel Discussion
12:55PM Audience Q&A
1:10PM Breakout Networking Sessions
12:00PM
Attendees Enter Virtual Event
& Welcome Remarks
12:05PM
Video Networking in Breakout Rooms
12:15PM
Panel Discussion
12:55PM
Audience Q&A
1:10PM
Breakout Networking Sessions
Sponsor
Organizer
Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only, thought leadership driven, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.