Identification: CWL2301
Credits: None available.
We see it in the news all the time: company data has been accessed and personal information of clients, customers, and others have been exposed. Do you have a plan in place for your organization? How do you communicate this to your customers without turning them against you? How do you keep leadership and board members engaged? Discover what steps should you be taking before, during and after an incident. Spoiler alert: The incident doesn’t end as soon as you think.. Our panelists will discuss the full lifecycle of a breach, including its lasting effects during this interactive roundtable discussion.
Identification: CWL2302
Credits: None available.
Generative AI can be both a powerful tool and a dangerous weapon for cybersecurity. We’ll examine the various ways in which generative AI has empowered bad actors to be more effective while also discussing specific ways in which security vendors and blue team practitioners have leveraged generative AI to be more productive and efficient than ever. Specific topics that may be discussed include deepfakes, vishing, democratised code development, security co-pilot technologies, and the tracking of Generative AI usage within one’s own enterprise.
Identification: CWL2303
Credits: None available.
For most organizations, you must compete within your company to secure budget while costs of tools and resources are rising. With any program, it is important to know what tools are available and the impacts they will have on your security program. During this session our panelists will discuss how to implement cost-appropriate solutions and controls to reduce risk responsibly, provide insights into available options, and give guidance on helping your organization effectively manage risk.
Identification: CWL2304
Credits: None available.
Security Strategy is a living, breathing organism – one that requires constant review and modifications in response to ever-changing threats. Determining the role that security plays in setting prioritization and strategy for development, engineering, IT, and other business functions is key to minimizing risk and establishing a healthy security culture. Join us as we openly discuss successes and failures seen by companies of all sizes as they navigate creating and implementing a strategy that will provide sustainable protection.
Identification: CWL2305
Credits: None available.
This session will be a panel discussion on the risk of data leaks from employee use of generative AI tools. Are your employees using generative AI tools? Are you weighing the security risks involved? The use of AI as a service has skyrocketed. These tools have been a runaway success in part because of the productivity improvements they promise (and deliver) for employees across a range of occupations, from software development to pharmaceutical research. But there’s a downside for security teams. Organizations using AIaaS tools have learned some hard lessons about data leaks and intellectual property (IP) risk after employees shared proprietary information with these public tools. While employees may not realize they’re effectively putting confidential data in the public domain, the truth is that once they share proprietary information with an AI as a service it is difficult if not impossible to erase. It’s become urgent for organizations to assess policy compliance and spot risks in real time. Join our panel as they discuss how security teams can assess, audit and secure employee use of these tools.
Identification: CWL2306
Credits: None available.
Like it, or hate it, cloud security as a key element of any effective security program. Gain insights into how to prioritize the risks that matter and safeguard your cloud data against unauthorized access. Join our esteemed panelists as they discuss top threats and best practices to keep your cloud data secure from them.
Identification: CWL2307
Credits: None available.
Security leaders are both excited and concerned about the cybersecurity rules proposed by the SEC. This session discusses feedback produced from surveying corporate directors in public and privacy companies to discover what they really care about. The lessons from this research will equip security leaders to prepare presentations and reports that not only add value at the board meeting, but also drive meaningful security outcomes for the business.
Identification: CWL2308
Credits: None available.
Apps and APIs span every generation of architecture—from monoliths to microservices and from client-server to mobile—across data centers, clouds, and at the edge. 9 out of 10 companies that operate in multi-cloud environments are struggling to maintain a consistent security posture. Join F5 to learn the importance of observability, security, and agility in a complex hybrid and multi-cloud digital world.
Identification: CWL2309
Credits: None available.
Do you report regularly to the Board of Directors? Maybe you only report up to the Audit or Risk committee. Maybe your CIO carries your message for you. What you present and to whom may be more important as how often. Join a roundtable comprised of current and former CISOs and a cybersecurity attorney to discuss key messages and how to deliver them as you make sure that your Board interactions are relevant, educational, and impactful for their governance.