Securing Accelerated Transformation

Aggregating, Analyzing, and Modeling
Critical Enterprise Data

Thursday, June 25th
@ 12:00 - 1:30 pm EST
Northeast

Thursday, June 25th
@ 12:00 - 1:30 pm EST
Northeast

About the Program

Securing Accelerated Transformation: Aggregating, Analyzing, and Modeling Critical Enterprise Data is an invitation-only virtual event featuring an expert panel and open room discussion.

This event is limited to 30 information security architects, engineers, and leaders from major industries who will convene over three goals:

  • Learn from insightful conversations led by our moderated panel
  • Participate in interactive breakout room video discussions
  • Build meaningful new connections with a group of like-minded peers

About the Content

Enterprises at any stage of their digital transformation journey have seen COVID-19 accelerate the pace of change and add urgent projects to the initiative. New complications have been introduced along the way—abrupt shifts in security architectures and policies, rapid new tool adoption, heavy reliance on the cloud, and a remote workforce signing in from a surplus of new devices.

Enterprise teams employ an average of 57.1 security tools (Censuswide) to protect these siloed, complex and hybrid-cloud systems. The ability to aggregate, centralize and model these rich sets of data is critical to the success of accelerated transformation initiatives.

As such, security leaders need to make top priorities of gaining big-picture visibility and control over their increasingly complex internal workflows. Only with this perspective can they implement the clear, automated processes needed to find and close the growing number of vulnerabilities, minimize compliance risk and tighten overall security efficacy.

Discussion Topics

  • The importance of multi-source aggregation of data sets and contextual analysis for modeling across disparate network elements – including on-prem IT, OT, cloud and virtual networks
  • Maintaining control, compliance and visibility of an expanding attack surface, newly connected devices, and rapidly adopted cloud technologies
  • Employing analytics to find process disconnects and uncover blind spots
  • Using internal and external threat contexts in continuous vulnerability assessment
  • Identifying, finding, and connecting data points across the enterprise to allow efficient prioritization of threats

Moderator

Peter Margaris
Senior Director, Product Marketing
Skybox Security

Event Details

Date

Thursday, June 25th, 2020

Time

12:00 pm – 1:30 pm EST

Attendee Profile

30 information security architects, engineers, and leaders

Agenda

12:00PM     Attendees Enter Virtual Event & Welcome Remarks

12:05PM     Video Networking in Breakout Rooms

12:15PM     Panel Discussion

12:55PM     Audience Q&A

1:10PM       Breakout Networking Sessions

12:00PM     

Attendees Enter Virtual Event

& Welcome Remarks

 

12:05PM     

Video Networking in Breakout Rooms

 

12:15PM     

Panel Discussion

 

12:55PM     

Audience Q&A

 

1:10PM     

Breakout Networking Sessions

Sponsor

At Skybox Security, we provide you with cybersecurity management solutions to help your business innovate rapidly and with confidence. We get to the root of cybersecurity issues, giving you better visibility, context and automation across a variety of use cases. By integrating data, delivering new insights and unifying processes, you’re able to control security without restricting business agility. Skybox’s comprehensive solution unites different security perspectives into the big picture, minimizes risk and empowers security programs to move to the next level. With obstacles and complexities removed, you can stay informed, work smarter and drive your business forward, faster. For more information, visit www.skyboxsecurity.com.

Organizer

BDILogoFinal

Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only, thought leadership driven, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.

The Adobe family of companies would like to keep you informed with personalized emails about products and services. See our Privacy Policy for more details.

Please contact me via email.

By clicking “Submit” I agree that I have read and accepted the Terms of Use.

adobe.comadobe.com
Adobe Privacy Center
Adobe Privacy Policy

adobe.comadobe.com
Adobe marketing and advertising practices I Adobe
Adobe marketing and advertising practices

adobe.comadobe.com
Adobe Privacy Center
Adobe Privacy Policy

adobe.comadobe.com
Legal
Legal Terms of Use for Adobe products & services