CISO WEBINAR: Phishing Threats in a Post-Perimeter World
Full Day Meeting
May 06, 2020
Unfortunately, there isn’t a cyber defense or information system that is 100% secure. What’s safe today won’t be tomorrow given the profitable nature of cybercrime. Criminals are constantly finding new methods of attack. That said, it’s critical to be on top of the latest business and tech strategies to safeguard your organization’s data.
The Argyle Group presents the CYBERSECURITY LEADERSHIP FORUM New York event, an intimate gathering of CISOs and senior-level IT & cybersecurity executives in search of peer-to-peer discussions and deep-dive examination of the latest cybersecurity technologies and processes.
With an emphasis on advanced threat defense, endpoint protection, cloud security, security analytics and intelligence, data protection, and emerging trends in identity and access management, this must-attend event will present cybersecurity case studies from top-tier companies with an enterprise perspective.
By attending this “by invitation only” event, you will better understand:
Join us for this day of deep dive discussions regarding the above and more. You’re also invited to join us for our CIO LEADERSHIP FORUM – New York event taking place the previous day on Tuesday, May 5. Attend one or both events and walk away with specific strategies and actionable steps to take your organization to the next level of digital transformation and data security.
If you'd like to recommend a speaker, please email email@example.com
Session description coming soon.
Join us for these intimate group peer-to-peer Table Talk discussions, whereas topics of discussion will be based upon the topics you indicated you would like to discuss further, as per your answers in Argyle’s pre-event insight survey. In these off-the-record exchanges of ideas, session attendees will have the opportunity to share their greatest challenges, pain points, and real-world decision-making efforts & solutions to said obstacles.
With an exponential increase in the volume and velocity of new vulnerabilities, security and operations teams find it difficult, if not impossible, to meet the increasing remediation demands.
In this presentation, we will discuss and explore practical ways to address the increasing challenges and roadblocks of modern vulnerability management. In particular, how does a practitioner transition from a traditional vulnerability management program to a data-driven Risk-Based Vulnerability Management Program?
Principal Security Engineer
Blockchain is one of the biggest buzz words of the past few years. NASA and many other risk-laden enterprises have implemented blockchain-based solutions to improve cybersecurity and prevent denial of service (DoS) and other attacks. Blockchain can be used to ensure that data is encrypted, which makes modification of the data more difficult. Could blockchain be your next best line of defense?
In this session, key takeaways will include:
Cybersecurity in the cloud is a growing issue. Building virtual walls to protect the massive amount of data that most enterprises now store in the cloud, requires specific policies, controls, and procedures. Deciding which cloud security solution makes the best sense and crafting processes to protect data and infrastructure is a 24-hour a day job. Anyone tasked with ensuring the security of a cloud environment will want to attend this robust discussion of cloud security essentials.
Attend this session to learn what might be missing from your security, data center and cloud infrastructure, and:
Chief Information Officer
From data access and stability issues to lack of transparency, SaaS requires strong agreements between organizations and technology providers. A SaaS agreement is a legal contract, and failure to include the right risk and security related language and clauses could land your enterprise in a hack-laden crisis situation.
In this session, you will learn:
Almost one-third of all U.S. businesses have suffered a data breach, and attacks are on the rise. Although cybersecurity is top of mind of every CISO, the most secure enterprises have taken cybersecurity to a culture level. Employees are often the first line of defense to avoid a cyber intrusion and that’s why building a cybersecurity culture in the workplace is more important than just pushing policies.
In this session, topics of discussion will include, yet will not be limited to:
Deputy CISO, Global Information Security
The universal challenge of securing top tech talent rages on! Finding IT employees with the skillsets you require is no easy task in an everchanging tech-centric culture and economy. Job candidates have a vast array of employment choices and offers - and your organization must employ innovative hiring technique to remain competitive.
In this session, we will conduct a very lively group discussion regarding:
From propaganda, to espionage and the threat of election tampering, national cybersecurity risk is at an all-time high. State-sponsored attacks are operations that include direct nation-state activity and proxy activity carried out by criminals, governments, political parties, and “hacktivists”. Attend this session and learn more about the latest national threats, responses and how to best defend your enterprise in 2020 and beyond.
Topics of conversation will include, yet not be limited to:
Ransomware attacks bring companies to their knees! One of the most damaging cyberattacks, ransomware worries top every CISO’s nightmare scenario list. According to most industry estimates, ransomware cost Americans over 7.5 billion dollars in 2019 alone. This session will delve into the latest ransomware attacks and how to defend your organization.
In this timely session, you will learn:
Chief Information Security Officer
New Jersey Court System
We are proud to share with you the following Argyle Industry Influencers. Their contributions to Argyle help keep the programs we offer our membership current and relevant, so we can continue delivering you premiere experiences, content development, and membership engagement.