This is a event spanned across the month of October 2022 with 60 minute event sessions on each saturday,
every week.
Session start time is always at 11 AM EST / 4 PM BST / 8 AM PST / 10 AM CST / 08:30 PM IST
Welcome remarks by Nehal Mehta. Event overview by Dr. Shashi Karhail.
Cyber attacks has been all over the news. Its the number one threat faced by business today. There have been instances where water pipleline got attacked or hospitals had to postpone their surgeries. Panel will touch upon few of the recent cyber attacks, how it unfolded and what course correction can be attempted to eliminate or reduce such cyber threats. How to reduce possible impact from such attacks. Panel will further discuss best practices and new innovations available to answer the most important question faced by every CISO. How to protect business from account takeover attacks?
Panel will talk on recent cyber incidents, and how it has shaped the incident response. How the business can operate with efficiency, resiliency, stay secure and compliant. Also panel will touch upon human factor in digital workflow and cyber security. How new innovations and best practices get shaped that now helps business to stay one step ahead. Join us and get some valuable insights from our experts.
Learn how to set up and secure your business with organization wide threat modeling program.
Comprehensive panel talk by renowned speakers and security experts Ken Fishkin and Christopher Callahan on managing your cyber risks, liabilities and some tips on reducing cyber insurance, all while keep it afloat while minimizing impact of cyber threats on business health.
With the increase in the number of the dependencies on the external parties, the risk within organisations is increasing tremendously. Around 51% of the breaches are caused by Third Parties. As a preventive measure, organisations shall start defining business responsibilities and enforces best practices like by prioritizing network transparency, implementing least privileged or zero trust access, and constantly evaluating existing third-party security practices.
Follow & Watch live on Social Media.Subscribe to our newsletter to get the latest news