
Victoria Windsor

One of the things that has struck me during the conversations I’ve had in the run up to the event has been the collaborative and vibrant nature of the East Coast infosec community.

Headlines and the increasing need for cyber security solutions are fuelling unprecedented growth in the sector.

From the hacking of cars and planes, to the security of Wi-Fi enabled kettles, the Internet of Things has the potential to cause a myriad of cybersecurity risks. But what is the real level of risk to enterprises?

The Chief Information Security Officer is no longer a purely technical role, having evolved into that of a business leader and enabler, acting as the conduit of security information across the enterprise, translating security threats into business speak and communicating and managing risk.

The increasing complexity of the information security threat landscape means it has never been more important to be able to rapidly identify and fix vulnerabilities, and the industry needs to look at how to facilitate collaboration and responsible vulnerability disclosure to enable this to happen.

During this session, the speakers will share best practice on how to build resilience and how to respond effectively to a security incident to minimise business impact.

As organisations accept that they are more than likely to be breached, strengthening business resilience and response capabilities is becoming just as important as developing defensive strategies.

From the faster development of new technologies and products, to global connectivity, collaboration and innovation, the benefits presented by cyberspace are immense.

The social engineer is a highly-skilled, highly-motivated adversary and for the information security professional who knows that the human factor is the biggest weakness in any multi-layered defense strategy, social engineering represents one of their biggest challenges.

As data moves to the cloud, databases are increasingly vulnerable to breaches, and as a result enterprises need to ensure that they apply rigorous strategies and controls to protect their information assets. During this webinar, the speakers will discuss how to classify and discover data, manage the risks associated with migrating data to the cloud and identify effective tools and techniques to detect and respond to data breaches. • Understand the factors to consider when migrating data to the cloud and the shared responsibilities of the cloud provider and the database owner • Evaluate the security and compliance requirements for protecting sensitive information in databases in the cloud • Assess various approaches to monitoring the security of databases in the cloud • Identify key steps to detect and prevent database breaches in the cloud