Start of first round of discussion for around 50 minutes. There will be 10 different roundtables and you can attend at two different tables means topics.
Roundtable 1: Panaseer
The drivers and challenges to automating data-driven cyber controls monitoring and reporting
Data is king. But, proactively reporting on Security Posture, Controls Status, Tools Coverage, and exposure to Threat Scenarios is an enormous recurring time sink for cyber professionals, risk managers, and asset owners to undertake. Automating data collection, correlation, transformation, and metrics and reporting creation is the obvious answer, but there is a lack of standardisation or acceptance on standing up such a data-driven capability in Cyber. And - it's a hard technical challenge to engineer just right for your unique business.
Let's explore:
- the increasing internal and external pressures for standing up such an initiative,
- what folk have done so far,
- what controls you care most about monitoring,
- how long we can get away with manual reporting,
- and the key business objections and technical challenges that are getting in the way.
Roundtable 2: Jay Christiansen, Manager and Lead of the Mandiant EMEA Red Team
(Details will follow)
Roundtable 3: Elier Cruz, Global Enterprise Security Architect, Check Point
Building Bridges: Integrating Zero Trust, Cybersecurity Mesh, and AI
In this roundtable we discover how to weave together Zero Trust, Cybersecurity Mesh, and AI into a robust cybersecurity fabric. We'll discuss the synergies and potential conflicts, share best practices, and outline a roadmap to successful integration, equipping you with the insights to enhance your security strategy.
Roundtable 4: Intel471
Target CTI Professionals across multiple industries
Gaining access to corporate networks has become big business in the underground, as it enables ransomware attacks, hacktivists, data theft, extortion and a host of other threats. Join as us we discuss how you can become proactive in ensuring that your perimeter does not offer attackers any opportunity to penetrate your security by looking at current best practices for staying secure.
Roundtable 5: xxx
Roundtable 6: xxx
Roundtable 7: xxx
Roundtable 8: xxx
Roundtable 9: xxx
Roundtable 10: xxx