We have been talking about digital identity for years. Is it a myth, or is it finally on the verge of becoming reality? Stephen Wilson of Lockstep Group has extensive experience in this field, and he offers his candid – sometimes controversial – views on:
The state of digital identity
What we can learn from...
New Zealand was one of the country’s hit least by the COVID-19 pandemic. And yet its healthcare system was hardly immune to the seismic telehealth changes that struck the entire world in 2020.
In this exclusive session, the CISO of Health Alliance New Zealand opens up on
How healthcare delivery has evolved...
Many businesses are implementing software security solutions. But as hackers get more sophisticated, threats are attacking the hardware layer. Hardware-based security features built-in to the hardware provide an important layer of protection for business devices, applications, and data. The Intel vPro® platform...
A longtime cybersecurity practitioner and thought-leader, Chirag Joshi currently serves as business information security office at AMP, as well as director of ISACA’s Sydney chapter. He also has published this book: 7 Rules to Influence Behavior and Win at Cyber Security Awareness. In this session, he shares some of...
Throughout 2020 organizations widely adopted a zero trust architecture in response to the pandemic and it is now fast replacing traditional VPN approaches. As the zero trust approach continues to evolve, the challenge for organizations in 2021 and beyond lies in how to implement this approach across environments,...
Fixing a breach is far more costly than prevention. Organizations are under pressure to respond to it faster. More often than not, though, it can be weeks or months before you’ve even realized that you’ve suffered one.
The session will discuss:
Understanding the legal implications of the incident and plan a...
As businesses surge ahead with agile development processes, cloud and DevOps, traditional security can no longer be the show stopper. Security needs to integrate with the DevOps process to ensure responsibility is shared and security is built in.
DevSecOps enables application security testing by the developer and...
After the SolarWinds attack, how can an entity ever trust that any vendor’s security incident won’t become their own next crisis? Healthcare sector entities in particular deal with a complex digital supply chain that range from critical IT vendors to suppliers of life-saving network-connected patient gear, and all...
Segments of healthcare sector cybersecurity have been rocky for a while, despite incremental improvements in the wake of a HHS cyber task report making key recommendations. But how has the pandemic further stressed and strained healthcare cybersecurity – and what seams and cracks are now widening? What needs to be...
Millions of dollars are spent annually to set up SOCs in the healthcare industry and yet, in just the last two years alone, 89% of healthcare organizations have experienced a data breach. Why are SOCs failing? Listen as ISMG’s Nick Holland interviews Exabeam’s Chief Strategy Officer Gorka Sadowski to learn more...
We distill the collective wisdom of CISOs, authors, academia, CEOs, and change agents from forty interviews over a year. What have they learned, and what are their key themes in building a cyber-resilient future?
The session will discuss:
People: Behavior change is critical, avoiding CISO burnout, organizational...
As analysts say, after feeling so defenseless in the face of calamity, enterprises are moving to an adaptive era. With the distributed workforce will come the inevitable discomfort of potentially exposing organizations to cyberattacks if the right precautions are not taken to adapt to this new phenomenon.
Should...
As organizations struggle to manage endpoints that need access to corporate data, enterprises have been providing ‘zero trust’ solutions for the digital workforce through multi-factor authentication and robust user access policy tools. However, the most significant concern for enterprise security today is the...
Today's most significant challenge for enterprises is the uncertainty of their network security finding a TrickBot or any encrypted malware and an activity that can safely help validate the organization's security posture. With the increasing reliance on endpoint security, it's a constant challenge to establish...
Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use daily.
But in this new digital age where data...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.