Identification: SAP2202
Credits: None available.
While not included as part of this recording, the video message from High Representative Izumi Nakamitsu may be viewed here.
Cybersecurity has become a key component of building secure digital business solutions. With the increase in cyberthreats targeting Organizations and with the constant pressure to more with less, Cybersecurity teams find it challenging to demonstrate the value they add towards enabling the business. In this session, Tima will provide an overview of the key performance indicators that Organizations can leverage to demonstrate the success of Cybersecurity programmes.
Learning Objectives:Identification: 001
Credits: None available.
Identification: SAP2205
Credits: None available.
Confidential Computing is getting attention these years in Cloud security area. In this session, we will walk through what is confidential computing and dive into the key technologies used in major Confidential Computing services.
Identification: SAP2204
Credits: None available.
As technology keeps evolving at a rapid pace, so do cyber criminals. Cybercrime has become a matured industry with perfect supply chain management. Less skill & less focus script-kiddies are transforming to high skill & high focus advanced persistent threat (APT) actors. In this session, the speaker discusses on recent cyber incidents, tactics used in committing the crimes, modus-operandi adopted by the criminals, exchange of TTP’s -barter system to Cryptosystems and anti-forensic techniques adopted to defeat the forensic investigation.
Identification: 002
Credits: None available.
Identification: SAP2206
Credits: None available.
Statistics show that an increase diversity and inclusion within cyber is imperative to securing diverse communities across the globe. Yet, how does that diversity truly impact and create a more sustainable cyber profession? In this fireside chat, we’ll discover how elevating and creating space for more diverse voices leads to that sustainability. We’ll talk with Jacqui Loustau—a leading voice for women in cyber—and discuss her journey in the profession and how she has navigated her navigated space for women in the APAC region through the Australian Women in Security Network.
Identification: SAP2207
Credits: None available.
Ransomware attack is on rise since covid 19 pandemic and ransomware attacks are evolving to be more harmful every year. As per one of the recent surveys, over one-third of organizations have experienced a loss in revenue due to a ransomware attack in the last twelve months which is alarming. Considering the ever evolving cyber threat landscape and ransomware attacks, it is important to relook at our cyber defense and prevention strategy to ensure we are considering people, process and technology when it comes combating complex ransomware attack. We need to update our tactics, techniques , mitigation and prevention strategies. In this talk we will discuss the key prevention & Cyber Defense strategies to successfully combat and protect organizations from ransomware attack and future proof our organizations.
Learning Objective:Identification: 003
Credits: None available.
Identification: SAP22ST01
Credits: None available.
Detecting, investigating, and responding to cyberthreats is the core function of the SOC, and the team never gets a break - attackers are carrying out more sophisticated attacks, the attack surface continues to expand, and talent shortages are the reality. Join this session with Google Cloud experts to see how Chronicle Security Operations has cracked the code on speed and scale, automation, and detection/investigation/response processes.
Learning Objectives:Identification: SAP2208
Credits: None available.
Digitalisation, accelerated by the global pandemic has driven the integration of technologies, devices, things from outside the sphere of traditional IT into a new converged world of IT/OT and IoT. Security governance and cyber defense teams are grappling with how to drive, absorb and apply effective policies to this expanded estate, and how to scale their existing operations securely and safely. .
Learning Objective: